0% found this document useful (0 votes)
4 views2 pages

Syllabas

Uploaded by

Monalia ghosh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views2 pages

Syllabas

Uploaded by

Monalia ghosh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Basic Concept (5L)

Database Management System , File based system, Advantages of DBMS over file based
system,Database Approach, Logical DBMS Architecture, Three level architecture of DBMS or logical
DBMS architecture, Need for three level architecture, Physical DBMS Architecture, Database
Administrator (DBA) Functions & Role, Data files indices and Data Dictionary,

Types of Database, Relational and ER Models: Data Models , Relational Model, Domains, Tuple and
Relation, Super keys, Candidate keys , Primary keys and foreign key for the Relations, Relational
Constraints, Domain Constraint, Key Constraint , Integrity Constraint,- Update Operations and Dealing
with Constraint Violations, Relational Operations

Entity Relationship (ER) Model: Entities, Attributes, Relationships, More about Entities and

Relationships, Defining Relationship for College Database, Conversion of E-R Diagram to

Module II:

Relational Database: Database Integrity And Normalization (7L)

Relational Database Integrity, The Keys, Referential Integrity, Entity Integrity, Redundancy and
Associated Problems, Single Valued Dependencies, Normalization, Rules of Data Normalization, The First
Normal Form, The Second Normal Form, The Third Normal Form, Boyce CODD Normal Form, The Fourth
Normal Form, The Fifth Normal Form, Multi-valued Functional Dependency, Attribute Preservation,
Lossless join Decomposition, Dependency Preservation.

MODULE III

File Organization (4L)

Physical Database Design Issues, Storage of Database on Hard Disks, File Organization and Its

Types, Heap files (Unordered files), Sequential File Organization, Indexed (Indexed Sequential) File
Organization, Hashed File Organization, Types of Indexes, Index and Tree Structure, Multikey File
Organization, Need for Multiple Access Paths, Multi-list File Organization, Inverted File Organization.

MODULE IV

Structure Query Language (SQL) (6L)

Meaning, SQL commands, Data Definition Language, Data Manipulation Language, Data

Control Language, Transaction Control Language, Queries using Order by, Where, Group by,

Nested Queries. Joins, Views, Sequences, Indexes and Synonyms, Table Handling.
MODULE V

Transaction and Concurrency Management (8L) {gate smashers 74 to}

Transactions, Concurrent Transactions, Locking Protocol, Serializable Schedules, Locks Two

Phase Locking (2PL), Deadlock and its Prevention, Optimistic& Pessimistic Concurrency

Control.

Database Recovery and Security: Database Recovery meaning, Kinds of failures, Failure controlling
methods, Database errors, Backup & Recovery Techniques, Security & Integrity, Database Security
Authorization.

MODULE VI

PL/SQL (6L)

Introduction to PL/SQL, Variables & Data types, Basic blocks, Conditional & branching

statement, Handling of Cursor, Trigger, Function, Procedure, Package and Exception.

MODULE VII

Distributed & Object Oriented Databases (4L)

Centralized Versus Non-Centralized Databases, Heterogeneous and Homogeneous Distributed


Databases

Reference Architecture of DDBMS, Distributed Database Design Query Processing,

Distributed Concurrency Control: Serializability, Locking Protocols, Timestamp Protocols,

Distributed Deadlock Management, Distributed Commit Protocols: Two-Phase Commit (2PC) & Three-
Phase Commit (3PC).Basic Concept, Limitation of Relational Databases and Need for Object Oriented
Databases.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy