Managing data, a historical perspective, File systems versus DBMS, Advantages of DBMS, Describing and Storing Data in DBMS, Queries in DBMS, Transaction management, Structure of DBMS, People who work with databases.
Using high-Level Conceptual Data Models for Database Design, An example of Database Application, Entity types, Entity Sets, Attributes and Keys, Relationship types, Relationship Sets, Roles and Structural Constraints, Weak Entity Types, Refining the ER Design for the COMPANY database, ER Diagrams, Naming Conventions and Design Issues
Relational model concepts, relational model constraints and relational database schemes, update operations and dealing with Constraint Violations, Unary relational Operations, SELECT and PROJECT, Relational Algebra Operations from Set Theory, Binary Relational Operations, JOIN and DIVISION, Additional Relational Operations, examples of Queries in Relational algebra, relational database design using ER – to-Relational mapping
SQL Data definition and data types, specifying basic constraints in SQL, Schemes, Change statements in SQL, basic Queries in SQL, more complex SQL queries, Insert, Delete and update statements in SQL, additional features of SQL, specifying general constraints as assertion, views (virtual tables) in SQL, database Programming, issues and Techniques, Embedded SQL, Dynamic SQL.
Informal Design Guidelines for Relation Schemes, Functional Dependencies, Normal Forms based on Primary Keys, General Definitions of Second and Third Normal Forms, Boyce-Codd Normal Form, Properties of Relational Decompositions, Algorithms for Relational Database Scheme Design, Multivalued Dependencies and Fourth Normal Form, Join Dependencies and Fifth Normal Form, Inclusion Dependencies, Other Dependencies and Normal Forms.
Introduction Security, Access control, Discretionary Access, Mandatory Access Control
The ACID properties, Transactions and Schedules, Concurrent Execution of transactions, Lock-based Concurrency control, performance of locking, Transaction support In SQL, Introduction to crash recovery; 2PL, ss for 4rializability and recoverability, Introduction to lock management, Lock Conversions, Dealing with Deadlocks, Specialized locking Techniques, Concurrency control without locking, Introduction to ARIES, The log, Other Recovery related Data Structures, The write-ahead log Protocol, Check pointing, Recovering from a System Crash, Media Recovery, Other Algorithms and Interaction with Concurrency control.