- -35%
Unlock a world of knowledge with Vision Publications—where every page brings you closer to your educational goals!
Unlock a world of knowledge with Vision Publications—where every page brings you closer to your educational goals!
Author: Ajit Gedam, Megha Dhotay
Book Id: 1474
ISBN No: 9789350161784
Contents
1. Database System Concept
1. An Introduction To Database
1.1 Database System
1.2 Database System versus File System
1.3 Disadvantages of File-Processing System
1.4 Advantages of DBMS
1.5 Applications of Database
1.6 Characteristics of DBMS
2. What is RDBMS
2.1 Differences between a DBMS and a RDBMS
2.2 Names of various DBMS and RDBMS Softwares
3. Data Abstraction
3.1 Database Languages
3.2 Instances and Schemas
3.3 Data Independence
4. Components of DBMS and Overall Structure of DBMS
4.1 Database System Structure
4.2 Database Users
4.3 Database Administrator
4.4 Database Management System Functions
5. Introduction to Client Server Architecture
5.1 Two-tier Architecture
5.2 Three-tier Architecture
6. The 12 Rules (Codd’s Laws) for Fully Functional RDBMS
7. An Introduction to Distributed Databases
7.1 Overview and Types of DDBMS
7.2 Clients, Servers and Nodes
7.3 Introduction to Data Warehousing
7.4 An Introduction to Data Mining
2. Relational Database Model and Security and Integrity Specification
1. Data Models
1.1 The Network Model
1.2 The Hierarchical Model
1.3 The Relational Model
2. Relational Model
2.1 Basic Concept
2.2 Keys Concepts
3. E-R Model
3.1 Components of E-R Model
3.2 Types of Attributes
3.3 Role Indicator
3.4 Weak and Strong Entity Sets
3.5 Cardinality of Relationship (Mapping Constraints)
3.6 Steps to Start an E-R Diagram
4. Enhanced E-R Model
5. Relational Algebra and Relational Calculus
5.1 The Relational Algebra
5.2 Relational Calculus
6. Database Design
6.1 Relational Database Design
6.2 Purpose of Normalization
6.3 Functional Dependencies
6.4 Normalization based on Functional Dependencies
6.5 Normal Forms
6.6 Normalization based on Multivalued Dependencies
6.7 Normalization based on Join Dependencies
7. Integrity Constraint
7.1 Domain Integrity Constraint
7.2 Entity Integrity Constraint
7.3 Referential Integrity Constraint
7.4 On Delete Cascade
8. Database Security
8.1 Database Authorization
8.2 Data Security Requirements
3. Interactive SQL
1. Introduction to SQL
1.1 SQL - a Brief History
1.2 Why SQL?
1.3 Characteristics of SQL
1.4 Advantages of SQL
1.5 Types of SQL
2. Data Types in Oracle
3. Data Definition Language (DDL) Commands
4. Data Manipulation Language (DML) Commands
5. Rename Attribute
6. SQL Operators
6.1 Arithmetic Operators
6.2 Logical Operators
6.3 Comparison Operators
6.4 Set Operators
6.5 Range Searching Operator
6.6 Pattern Matching Operator
7. Oracle Functions
7.1 Aggregate Function (Group Function)
7.2 Single Row Function (Scalar Function)
7.3 Miscellaneous Function
8. Queries
8.1 Order By Clause
8.2 Group By Clause
8.3 Having Clause
8.4 Nested Sub Queries
8.5 An Introduction to Join
9. Transaction Control Language
10. Data Control Language
11. Concept of Transaction Processing
11.1 Transaction
11.2 Transaction Properties
11.3 Transaction States
11.4 Concurrent Execution of Multiple Transaction
11.5 Schedule
11.6 Serializability
11.7 Recoverability
11.8 Transaction Management with SQL
12. Lock Granularity
12.1 Lock Based Protocol
12.2 Two Phases Locking
12.3 Timestamp Based Protocol
12.4 Validation Based Protocols
13. Deadlocks
13.1 Deadlock Handling
13.2 Deadlock Recovery
13.3 Controls for Deadlock
13.4 Recovery Techniques for Databases
13.5 Different Methods for Database Recovery
4. Advance SQL: Performance Tuning
1. View
1.1 Advantages of Views
1.2 Disadvantages of Views
1.3 Creating a View
1.4 A View Functions
1.5 Use of the View
1.6 Updating Views
1.7 Creating a Join View
1.8 Views and Subqueries
1.9 Views cannot do (Restrictions on Views)
1.10 Dropping Views
1.11 Functionalities/Function that Views support
1.12 Purpose of View?
2. Sequences
2.1 Creating Sequences
2.2 Altering a Sequence
2.3 Dropping a Sequence
3. Indexes
3.1 Create an Index
3.2 Dropping Indexes
4. Snapshot
4.1 Creating a Snapshot
4.2 Altering a Snapshot
4.3 Dropping a Snapshot
5. Synonym
5.1 Creating a Synonym
5.2 Dropping Synonym
5. PL/SQL, Database Objects and Security
1. PL/SQL Introduction
1.1 Advantages of PL/SQL
1.2 The PL/SQL Block Structure
1.3 PL/SQL Execution Environment
1.4 PL/SQL Data Types
1.5 PL/SQL Variables
1.6 PL/SQL Constants
1.7 Output and Input Statement (Accepted from User)
1.8 Simple Program using emp Table
2. Control Structure
2.1 Conditional Control: IF and CASE Statements
2.2 Iterative Control: LOOP and EXIT Statements
2.3 Sequential Control: GOTO and NULL Statements
3. Cursor
3.1 Cursor for Loops
3.2 Parameterized Cursor
4. Procedure
4.1 Advantages of Procedures
4.2 Creating, Executing and Deleting a Stored Procedure
5. Functions
5.1 Advantages
5.2 Function Creation
5.3 Calling Program
6. Database Triggers
6.1 Use of Database Triggers
6.2 Types of Triggers
6.3 How to apply Database Triggers
6.4 Creating Triggers
6.5 PL/SQL Triggers Syntax Description
6.6 Modifying Trigger
6.7 Enabling or Disabling a Trigger
6.8 Deleting Trigger
7. PL/SQL Security
solved paper of winter 2013
diploma, Vision, publications, relational database & management
No customer reviews for the moment.