Theme Options

NEWSLETTER

Database Management System

1688

New

As per revised Syllabus of Pune University for MCA

Database Management System

Author : Anjali Bhatnagar, Dipali Mahajan (Mali)

Book ID : 1688

ISBN : 978-93-5016-347-4

Edition : 1st 2015

Solved Question Papers upto 2014 April

More details

Rs.190

Contents

1 Basic Concepts 

1.1 Database and Database Users    

1.2 Data Independence

2 Database Design Using ER MODEL

2.1 Data Models  

2.2 ER Model for Conceptual Design 

2.3 Relationships, Relationship Sets     

2.4 Mapping Cardinalities    

2.5 Types of Keys

2.6 ER – Diagram

3 Relational Model

3.1 Relational Data Model

3.2 Relational Algebra 

3.3 SQL- A Relational Database Language  

3.4 Indexing

3.5 Views

3.6 Security in SQL

3.7 Triggers

4 Conventional Data Models and Systems 

4.1 Network Data Models and IDMS Systems

4.2 Hierarchical Data Model

5 Relational Database Design 

5.1 Introduction 

5.2 Functional Dependencies  

5.3 Undesirable Properties of A Bad Database Design  

5.4 E.F. Codd’s Rules  

5.5 Steps followed By Application Developer….        

5.6 Normalization Process    

5.7 Denormalisation    

5.8 Loseless Joins     

5.9 Decompositions

6 Storage and File Structure 

6.1 Introduction 

6.2 Overview of Physical Storage Media   

6.3 Magnetic Disks     

6.4 Raid   

6.5 Tertiary Storage   

6.6 Storage Access     

6.7 File Organization  

6.8 Organization of Records in Files     

6.9 Data Dictionary Storage  

6.10 Factors Used for Evaluation of the Above Techniques

7 Transaction and Concurrency Control    

7.1 Concept of Transaction   

7.2 Properties of Transaction

7.3 State of Transaction     

7.4 Implementation of Atomicity and Durability 

7.5 Concurrent Executions    

7.6 Concurrency Control Techniques 

7.7 Concurrency Control

8 Crash Recovery and Backup

8.1 Why Recover Is Needed?   

8.2 Storage Structure  

8.3 Recovery and Atomicity   

8.4 Failure with Loss of Nonvolatile Storage   

8.5 Recovery from Catastrophic Failure   

8.6 Remote Backup Systems

9 Security and Privacy 

9.1 Introduction 

9.2 Discretionary Access Control Method  

9.3 Mandatory Access Control Method

9.4 Uses of Views in Security Enforcement

9.5 Overview of Encryption Technique for Database    

9.6 Statistical Database Security

10 NON-SQL DATABASE    

10.1 A Relational Database Management System   

10.2 NoSQL Emerged From a Need     

10.3 What is NoSQL

No customer comments for the moment.

Write a review

Write a review

3 other products in the same category:

Customers who bought this product also bought: