NEWSLETTER

Database Management System

BI 1123

New

According to New Revised Syllabus w.e.f. 2008 PUNE, Maharashtra (INDIA)

Text Book of Database Management System

MCA Sem-I

Author : Anjali Bhatnagar

Book ID : 1123

More details

Rs.144

Rs.160

-10%

Contents

1. Basic Concepts   

1.1 Database and database users  

1.2 Data Independence

2. Database Design Using ER MODEL

2.1 Data models     

2.2 ER model for conceptual design     

2.3 Relationships, Relationship sets   

2.4 Mapping cardinalities  

2.5 Types of keys    

2.6 ER – diagram

3. Relational Model 

3.1 Relational data model  

3.2 Relational algebra     

3.3 SQL- A relational database language

3.4 Indexing   

3.5 Views

3.6 Security in SQL  

3.7 Triggers

4. Conventional Data Models and Systems     

4.1 Network Data Models and IDMS Systems     

4.2 Hierarchical data model

5. Relational Database Design   

5.1 Introduction     

5.2 Functional dependencies

5.3 Undesirable properties of a bad database design

5.4 E.F. codd’s rules

5.5 Steps followed by application developer….      

5.6 Normalization process  

5.7 Denormalisation  

5.8 Loseless joins   

5.9 Decompositions

6. Storage and File Structure   

6.1 Introduction     

6.2 Overview of physical storage media 

6.3 Magnetic disks   

6.4 Raid 

6.5 Tertiary storage 

6.6 Storage access   

6.7 File organization

6.8 Organization of records in files   

6.9 Data dictionary storage

6.10 Factors used for evaluation of the above techniques

7. Transaction and Concurrency Control

7.1 Concept of transaction     

7.2 Properties of transaction    

7.3 State of transaction   

7.4 Implementation of atomicity and durability     

7.5 Concurrent executions  

7.6 Concurrency control techniques     

7.7 Concurrency control

8. Crash Recovery and Backup

8.1 Why recover is needed? 

8.2 Storage structure

8.3 Recovery and atomicity 

8.4 Failure with loss of nonvolatile storage 

8.5 Recovery from catastrophic failure 

8.6 Remote backup systems

9. Security and Privacy

9.1 Introduction     

9.2 Discretionary access control method

9.3 Mandatory access control method

9.4 Uses of views in security enforcement    

9.5 Overview of encryption technique for database  

9.6 Statistical database security

Solved Question Paper

No customer comments for the moment.

Write a review

Write a review

20 other products

20 other products in the same category: