Ado.net session07
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,383
On Slideshare
1,376
From Embeds
7
Number of Embeds
1

Actions

Shares
Downloads
74
Comments
0
Likes
0

Embeds 7

http://niitcourseslides.blogspot.in 7

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Introduce the students to the course by asking them what they know about forensics. Next, ask the students what they know about system forensics and why is it required in organizations dependent on IT. This could be a brief discussion of about 5 minutes. Lead the discussion to the objectives of this chapter.
  • Introduce the students to the different types of threats that systems face by: Asking the students to give examples of what they think are environmental and human threats. Asking the students to give instances of what they think are malicious and non-malicious threats. Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
  • Introduce the students to the different types of threats that systems face by: Asking the students to give examples of what they think are environmental and human threats. Asking the students to give instances of what they think are malicious and non-malicious threats. Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
  • Introduce the students to the different types of threats that systems face by: Asking the students to give examples of what they think are environmental and human threats. Asking the students to give instances of what they think are malicious and non-malicious threats. Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
  • Introduce the students to the different types of threats that systems face by: Asking the students to give examples of what they think are environmental and human threats. Asking the students to give instances of what they think are malicious and non-malicious threats. Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
  • Introduce the students to the different types of threats that systems face by: Asking the students to give examples of what they think are environmental and human threats. Asking the students to give instances of what they think are malicious and non-malicious threats. Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
  • Introduce the students to the different types of threats that systems face by: Asking the students to give examples of what they think are environmental and human threats. Asking the students to give instances of what they think are malicious and non-malicious threats. Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
  • Introduce the students to the different types of threats that systems face by: Asking the students to give examples of what they think are environmental and human threats. Asking the students to give instances of what they think are malicious and non-malicious threats. Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
  • Introduce the students to the different types of threats that systems face by: Asking the students to give examples of what they think are environmental and human threats. Asking the students to give instances of what they think are malicious and non-malicious threats. Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
  • In this slide you need to show the calculation to determine the sum of an arithmetic progression for bubble sort algorithm. Refer to student guide.
  • Introduce the students to the different types of threats that systems face by: Asking the students to give examples of what they think are environmental and human threats. Asking the students to give instances of what they think are malicious and non-malicious threats. Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
  • Introduce the students to the different types of threats that systems face by: Asking the students to give examples of what they think are environmental and human threats. Asking the students to give instances of what they think are malicious and non-malicious threats. Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
  • Introduce the students to the different types of threats that systems face by: Asking the students to give examples of what they think are environmental and human threats. Asking the students to give instances of what they think are malicious and non-malicious threats. Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
  • Introduce the students to the different types of threats that systems face by: Asking the students to give examples of what they think are environmental and human threats. Asking the students to give instances of what they think are malicious and non-malicious threats. Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
  • Introduce the students to the different types of threats that systems face by: Asking the students to give examples of what they think are environmental and human threats. Asking the students to give instances of what they think are malicious and non-malicious threats. Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
  • Introduce the students to the different types of threats that systems face by: Asking the students to give examples of what they think are environmental and human threats. Asking the students to give instances of what they think are malicious and non-malicious threats. Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
  • Introduce the students to the different types of threats that systems face by: Asking the students to give examples of what they think are environmental and human threats. Asking the students to give instances of what they think are malicious and non-malicious threats. Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
  • Introduce the students to the different types of threats that systems face by: Asking the students to give examples of what they think are environmental and human threats. Asking the students to give instances of what they think are malicious and non-malicious threats. Conclude the discussion on the different types of threats by giving additional examples of malicious and non malicious threats.
  • In this slide you need to show the calculation to determine the sum of an arithmetic progression for bubble sort algorithm. Refer to student guide.
  • While explaining the definition of system forensics, ask the students to note the following key words in the definition: Identify Extract Process Analyze Digital and hardware evidence Tell the students that these form an integral aspect of system forensics and would be discussed in detail. Before moving on to the next slide, hold a brief discussion on why is it important for organizations to take the help of system forensics. The discussion should be focused on: The role that system forensics plays in organizations having an IT set up. This discussion will serve as a precursor to the next slide.

Transcript

  • 1. Developing Database Applications Using ADO.NET and XMLObjectives In this session, you will learn to: Working in a disconnected environment Ver. 1.0 Session 7 Slide 1 of 23
  • 2. Developing Database Applications Using ADO.NET and XMLWorking with Datasets and Datatables In a disconnected environment, data is stored in datasets and manipulations are performed in the datasets. After the data has been manipulated in the dataset, the changes are updated to the database. A dataset is a disconnected, cached set of records that are retrieved from a database. The dataset acts like a virtual database containing tables, rows, and columns. The two main types of datasets are: Typed dataset Untyped dataset Let us discuss each of these types in detail. Ver. 1.0 Session 7 Slide 2 of 23
  • 3. Developing Database Applications Using ADO.NET and XMLWorking with Datasets and Datatables (Contd.) Typed Dataset:  A typed dataset is derived from the DataSet class and has an associated XML schema, which is created at the time of creation of the dataset.  The XML schema contains information about the dataset structure such as the tables, columns, and rows.  The XML Schema Definition (XSD) language is used to define the elements and attributes of XML documents.  The structure of a typed dataset is decided at the time of its creation.  When a typed dataset is created, the data commands are generated automatically by using the column names from the data source. Ver. 1.0 Session 7 Slide 3 of 23
  • 4. Developing Database Applications Using ADO.NET and XMLWorking with Datasets and Datatables (Contd.) Untyped Dataset: An untyped dataset does not have any associated XML schema. In an untyped dataset, the tables and columns are represented as collections. Because an XML schema is not created for an untyped dataset, the structure of an untyped dataset is not known during compilation. Untyped datasets find their use in cases where the structure of the schema is not decided during compilation or the data being used does not have a definite structure. Ver. 1.0 Session 7 Slide 4 of 23
  • 5. Developing Database Applications Using ADO.NET and XMLWorking with Datasets and Datatables (Contd.) A dataset has its own object model, as shown in the following figure. Ver. 1.0 Session 7 Slide 5 of 23
  • 6. Developing Database Applications Using ADO.NET and XMLWorking with Datasets and Datatables (Contd.) • A dataset is created with the help of a DataSet object. • The DataSet object is present in a DataSet class and is defined in the System.Data namespace. • The DataSet object contains a collection of DataTable objects, each containing one or more tables. • A DataTable object contains one or more columns, each represented by a DataColumn object. • To add a column to a DataTable, create a DataColumn object and call the Add() method on the Columns collection, which enables you to access the columns in a datatable. Ver. 1.0 Session 7 Slide 6 of 23
  • 7. Developing Database Applications Using ADO.NET and XMLWorking with Datasets and Datatables (Contd.) The following list describes some parameters that can be specified for a column: The name of the column The data type of the column Whether the column is read only Whether the column permits null values Whether the value of the column must be different in each row Whether the column is an auto-increment column Whether the column is an expression column Ver. 1.0 Session 7 Slide 7 of 23
  • 8. Developing Database Applications Using ADO.NET and XMLWorking with Datasets and Datatables (Contd.) • Consider the following code snippet used for adding columns in a DataTable: DataSet ds = new DataSet(); Creating a DataSet object DataTable dt = ds.Tables.Add(); Creating a DataTable object dt.Columns.Add(“Store Id”, typeof(string)); Adding columns in a DataTable dt.Columns.Add(“Store Name”, typeof(string)); dt.Columns.Add(“Address”, typeof(string)); Ver. 1.0 Session 7 Slide 8 of 23
  • 9. Developing Database Applications Using ADO.NET and XMLWorking with Datasets and Datatables (Contd.) • A DataTable object also has a Rows collection that allows rows to be accessed in a dataset. • The various methods performed on a row by using the DataRow object are: Add() Appends the row to the end of the table InsertAt() Inserts the row at a specified position Find() Accesses a row in a table by its primary key value Select() Finds rows that match a specified condition Remove() Removes the specified DataRow object RemoveAt() Removes the row at a specified position Delete() Removes a row provisionally from a table Ver. 1.0 Session 7 Slide 9 of 23
  • 10. Developing Database Applications Using ADO.NET and XMLJust a minute Which method of the DataRow object accesses a row in a table by its primary key value? 1. Find() 2. Select() 3. InsertAt() 4. Add() Answer: 1. Find() Ver. 1.0 Session 7 Slide 10 of 23
  • 11. Developing Database Applications Using ADO.NET and XMLWorking with Datasets and Datatables (Contd.) • In ADO.NET, you can navigate through multiple tables to validate and summarize the data by using the DataRelation object. • By using primary key and foreign key constraints that use a DataRelation object, you can create the relationship between multiple tables. • The primary key is a unique index and ensures the uniqueness of data stored in that table for that particular row. • The foreign key is a constraint on a table that can reference one or more columns in that table. • The table that has a primary key constraint is known as the Parent table, and the table that has a foreign key constraint is known as the Child table. Ver. 1.0 Session 7 Slide 11 of 23
  • 12. Developing Database Applications Using ADO.NET and XMLWorking with Datasets and Datatables (Contd.) A DataSet.Relations property gets the collection of relations that link tables and allow navigation from Parent tables to Child tables. The Rule enumeration indicates the action that occurs when a foreign key constraint is enforced. The various Rule enumeration values are: Cascade Deletes or updates the child DataRow object when the parent DataRow object is deleted or its unique key is changed None Throws an exception if the parent DataRow object is deleted or its unique key is changed SetDefault Sets the foreign key column(s) value to the default value of the DataColumn object(s), if the parent DataRow object is deleted or its unique key is changed Sets the foreign key column(s) value to DbNull, if the parent SetNull DataRow object is deleted or its unique key is changed Ver. 1.0 Session 7 Slide 12 of 23
  • 13. Developing Database Applications Using ADO.NET and XMLWorking with Datasets and Datatables (Contd.) • Sometimes, the data available in one DataSet can be merged with another DataSet. Or, a copy of the DataTable objects can be created so that the user can edit or modify data, which can then be merged back to the original dataset. • The Merge() method is used to combine data from multiple DataSet, DataTable, and DataRow objects. • During merging of data within datasets, the MissingSchemaAction enumeration specifies the action to be taken when the data added to the dataset and the required DataTable or DataColumn is missing. Ver. 1.0 Session 7 Slide 13 of 23
  • 14. Developing Database Applications Using ADO.NET and XMLWorking with Datasets and Datatables (Contd.) The various values of MissingSchemaAction enumeration are: Add Adds the DataTable and DataColumn objects to complete the schema AddWithPrimaryKey Adds the DataTable, DataColumn, and PrimaryKey objects to complete the schema Error Throws an exception if the DataColumn does not exist in the DataSet that is being updated Ignore Ignores data that resides in DataColumns that are not in the DataSet being updated Ver. 1.0 Session 7 Slide 14 of 23
  • 15. Developing Database Applications Using ADO.NET and XMLWorking with Dataviews • A dataview provides a dynamic view of data stored in a datatable. • If any data is modified in the datatable, the dataview associated with the datatable will also show the modified data. Let us understand the object model of a dataview. Ver. 1.0 Session 7 Slide 15 of 23
  • 16. Developing Database Applications Using ADO.NET and XMLWorking with Dataviews (Contd.) The following figure shows the object model of a dataview. DataSet Object DataTable Object DataView Object DefaultView Default Sort/Filter Criteria DataView Objects Additional Views Alternative Sort/Filter Criteria Ver. 1.0 Session 7 Slide 16 of 23
  • 17. Developing Database Applications Using ADO.NET and XMLWorking with Dataviews (Contd.) • A DataView object creates a fixed customized view of a given DataTable object. • You can create a DataView object to display the data based on a criterion and another DataView object to display the data based on a different criterion. • The following figure shows how customized data is displayed through dataviews. Filter3 Filter2 Filter1 DataView1 Windows DataTable Application DataView2 DataView3 Ver. 1.0 Session 7 Slide 17 of 23
  • 18. Developing Database Applications Using ADO.NET and XMLWorking with Dataviews (Contd.) • A dataview provides a sorted or filtered view of data in a datatable. • Sorting in a DataTable by using a DataView object is done by using the Sort property. • Filtering a DataTable by using the DataView object is done by using the RowFilter and RowStateFilter properties. Ver. 1.0 Session 7 Slide 18 of 23
  • 19. Developing Database Applications Using ADO.NET and XMLJust a minute Which property of the DataView object returns a subset of rows on the basis of the column values? 1. FindRows 2. RowFilter 3. RowStateFilter 4. Find Answer: 2. RowFilter Ver. 1.0 Session 7 Slide 19 of 23
  • 20. Developing Database Applications Using ADO.NET and XMLDemo: Manipulating Data in a Disconnected Environment Problem Statement: Jane, a member of the HR team at Tebisco, needs to store the details of employees who have recently joined the organization. You need to create an application for Jane that will enable her to add and save the details of new employees, and if required, delete records of employees who are no longer working in the organization. The employee code should get automatically generated based on the format in the table. The employee details will be stored in the empdetails table of the HR database. Ver. 1.0 Session 7 Slide 20 of 23
  • 21. Developing Database Applications Using ADO.NET and XMLSummary In this session, you learned that:  A dataset, which is a part of disconnected environment, is a disconnected, cached set of records that are retrieved from a database.  The two main types of datasets are:  Typed datasets  Untyped datasets A typed dataset is derived from the DataSet class and has an associated XML schema, which is created at the time of creation of a dataset. An untyped dataset does not have any associated XML schema. As a result, the structure of an untyped dataset is not known during compilation. Ver. 1.0 Session 7 Slide 21 of 23
  • 22. Developing Database Applications Using ADO.NET and XMLSummary (Contd.)  The DataSet object contains a collection of DataTable objects, each containing one or more tables.  A DataTable object contains one or more columns, each represented by a DataColumn object.  A DataTable object also has a Rows collection, which allows rows to be accessed in a dataset. A DataTable object contains one or more rows, each represented by a DataRow object.  The DataRelation object is used to navigate through multiple tables to validate and summarize the data.  The primary key and foreign key constraints in a DataRelation object create the relationship between the tables in a schema. Ver. 1.0 Session 7 Slide 22 of 23
  • 23. Developing Database Applications Using ADO.NET and XMLSummary (Contd.)  The Merge() method is used to combine data from multiple DataSet, DataTable, and DataRow objects.  A dataview, which is a part of the disconnected environment, enables you to create a dynamic view of data stored in a datatable.  A DataTable can have multiple DataView objects assigned to it, allowing the data to be viewed in different ways without having to re-read from the database.  Sorting in a DataTable by using the DataView object is done by using the Sort property.  Filtering in DataTable using DataView object is done by using the RowFilter and RowStateFilter properties. Ver. 1.0 Session 7 Slide 23 of 23