Wednesday, September 16, 2020

IT 202 Introductory Database


IT 202 Introductory Database










Total hours
Days Chapter 1: 



5
1 Introduction to DBMS





Introduction to Database Management System





DBMS vs File System




2 View of data





Data models





Database Languages: DML, DDL




3 Database users and administrators




4 Transaction Management




5 Database System Structure





Application architectures





Chapter 2: 




6 Types of DBMS



2

Types of DBMS




7 Relational DBMS





Object-oriented Database Management System





Chapter 3: 



5
8 Data Models





Basic concepts





Constraints





Keys




9 Design issues





The Entity Relationship Database Model





Weak entity sets




10 Extended E-R Features




11 Design of an E-R database schema




12 Reduction of an R-R schema to tables





Chapter 4: 




13 Relational Database Model



5
14 Structure of relational databases (Basic Structures, Database schema, keys, Schema
15 Diagram, query languages, joins (Natural, outer))




16 Data Integrity





Types of Data Integrity (Entity integrity constraint (Primary key), Referential Integrity,
17 Domain Constraints, triggers, assertions)





Relationships within the Relational Database





Chapter 5: 




18 Entity Relationship Modeling



6
19 Entity Relationship modeling




20 Entities, Attributes, Relationships




21 Degree of a relationship




22 Connectivity and Cardinality




23 Specialization and Generalization Entity relationship diagram




Chapter 6: 




24 Structured Query Language 



7

Data Definition Language




25 SQL Constraints





Creating Tables




26 Data Manipulation Languages (Insert, Update, Delete, Select)



27 SELECT Queries




28 Syntax for the SELECT statement




29 SQL Views




30 JOIN





Chaptere 7:




31 Distributed Database Management Systems 



5
32 Characteristics of DDBMS




33 Advantages / Disadvantages of DDBMS




34 Components of Distributed Database system




35 Distributed Database Design





Fragmentation (horizontal and vertical fragmentation)




Chapter 8:




36 Database Security 



5
37 Authorization is SQL (privileges in SQL)




38 Roles




39 The privilege to Grant Privileges




40 Limitations of SQL authorization





Chapter 9: 




41 Designing Good Designed Database 



5

Normalization




42 Funcational Dependencies: partial dependency, transitive dependency, join

43 dependency, multivalued dependency




44 Update Anamolies




45 Normal forms: First, Second, Third, Fourth, Fifth




1 comment:

Reference

https://notesformsc.org/locks-database-management https://mycareerwise.com/content/concept-of-lossless-and-lossy-join-decomposition/content/...