Database Management System (DMBS)
• Collection of interrelated data • Set of programs to access the data • DMBS contains information about a particular enterprise • DBMS provides an environment that it both convenient and efficient to use
The document provides an overview of database management systems (DBMS). It discusses DBMS applications, why DBMS are used, different users of databases, data models and languages like SQL. It also summarizes key components of a DBMS including data storage, query processing, transaction management and database architecture.
Integrity constraints are rules used to maintain data quality and ensure accuracy in a relational database. The main types of integrity constraints are domain constraints, which define valid value sets for attributes; NOT NULL constraints, which enforce non-null values; UNIQUE constraints, which require unique values; and CHECK constraints, which specify value ranges. Referential integrity links data between tables through foreign keys, preventing orphaned records. Integrity constraints are enforced by the database to guard against accidental data damage.
Codd's 12 rules are a set of rules proposed by Edgar Codd to define what is required for a database management system to be considered relational. The rules include that all data must be represented in tables and columns, all data must be logically addressable, null values must be supported systematically, the database structure must be accessible through queries, and the system must support set-based operations like inserts, updates and deletes. The rules also require physical and logical independence between the application, data and constraints.
The document discusses the relational database model. It was introduced in 1970 and became popular due to its simplicity and mathematical foundation. The model represents data as relations (tables) with rows (tuples) and columns (attributes). Keys such as primary keys and foreign keys help define relationships between tables and enforce integrity constraints. The relational model provides a standardized way of structuring data through its use of relations, attributes, tuples and keys.
Integrity constraints are rules that help maintain data quality and consistency in a database. The main types of integrity constraints are:
1. Domain constraints specify valid values and data types for attributes to restrict what data can be entered.
2. Entity constraints require that each row have a unique identifier and prevent null values in primary keys.
3. Referential integrity constraints maintain relationships between tables by preventing actions that would invalidate links between foreign and primary keys.
4. Cascade rules extend referential integrity by automatically propagating updates or deletes from a primary table to its related tables.
The document discusses transactions and the ACID properties that ensure transaction integrity in a database management system (DBMS). It defines a transaction as a logical unit of work that can include operations like insert, delete, update, or retrieve data from a database. ACID properties - Atomicity, Consistency, Isolation, and Durability - guarantee that transactions are processed reliably and data integrity is maintained. It provides examples to illustrate how each ACID property functions and its importance for transaction processing.
Database Management System IntroductionSmriti Jain
The document discusses key concepts in databases including:
- Data refers to raw facts and details, while entities are things that data describes with attributes.
- A record combines all details of an entity, files group related records, and a database collects logically related files and records.
- A database management system (DBMS) enables users to define, create and maintain databases and provides flexible data management.
- DBMS benefits include centralized data control, consistency, sharing, and independence from applications.
Database systems that were based on the object data model were known originally as object-oriented databases (OODBs).These are mainly used for complex objects
The document provides an overview of database management systems (DBMS). It discusses DBMS applications, why DBMS are used, different users of databases, data models and languages like SQL. It also summarizes key components of a DBMS including data storage, query processing, transaction management and database architecture.
Integrity constraints are rules used to maintain data quality and ensure accuracy in a relational database. The main types of integrity constraints are domain constraints, which define valid value sets for attributes; NOT NULL constraints, which enforce non-null values; UNIQUE constraints, which require unique values; and CHECK constraints, which specify value ranges. Referential integrity links data between tables through foreign keys, preventing orphaned records. Integrity constraints are enforced by the database to guard against accidental data damage.
Codd's 12 rules are a set of rules proposed by Edgar Codd to define what is required for a database management system to be considered relational. The rules include that all data must be represented in tables and columns, all data must be logically addressable, null values must be supported systematically, the database structure must be accessible through queries, and the system must support set-based operations like inserts, updates and deletes. The rules also require physical and logical independence between the application, data and constraints.
The document discusses the relational database model. It was introduced in 1970 and became popular due to its simplicity and mathematical foundation. The model represents data as relations (tables) with rows (tuples) and columns (attributes). Keys such as primary keys and foreign keys help define relationships between tables and enforce integrity constraints. The relational model provides a standardized way of structuring data through its use of relations, attributes, tuples and keys.
Integrity constraints are rules that help maintain data quality and consistency in a database. The main types of integrity constraints are:
1. Domain constraints specify valid values and data types for attributes to restrict what data can be entered.
2. Entity constraints require that each row have a unique identifier and prevent null values in primary keys.
3. Referential integrity constraints maintain relationships between tables by preventing actions that would invalidate links between foreign and primary keys.
4. Cascade rules extend referential integrity by automatically propagating updates or deletes from a primary table to its related tables.
The document discusses transactions and the ACID properties that ensure transaction integrity in a database management system (DBMS). It defines a transaction as a logical unit of work that can include operations like insert, delete, update, or retrieve data from a database. ACID properties - Atomicity, Consistency, Isolation, and Durability - guarantee that transactions are processed reliably and data integrity is maintained. It provides examples to illustrate how each ACID property functions and its importance for transaction processing.
Database Management System IntroductionSmriti Jain
The document discusses key concepts in databases including:
- Data refers to raw facts and details, while entities are things that data describes with attributes.
- A record combines all details of an entity, files group related records, and a database collects logically related files and records.
- A database management system (DBMS) enables users to define, create and maintain databases and provides flexible data management.
- DBMS benefits include centralized data control, consistency, sharing, and independence from applications.
Database systems that were based on the object data model were known originally as object-oriented databases (OODBs).These are mainly used for complex objects
The document discusses data modeling and different data models. It describes the evolution of data models from hierarchical to network to relational models. It also covers the entity relationship and object-oriented models. The key points are that data modeling helps reconcile different views of data, business rules inform database design, and the conceptual model provides an integrated global view of the database.
This document discusses different database models including hierarchical, network, entity-relationship, and relational models. The hierarchical model organizes data in a tree-like structure with parent-child relationships. The network model extends the hierarchical model by allowing nodes to have more than one parent. The entity-relationship model divides data into entities and attributes and represents relationships visually. The relational model, introduced by E.F. Codd in 1970, organizes data into two-dimensional tables related through common fields and is the most widely used database model today.
Normalization is a process that organizes data to minimize redundancy and dependency. It divides tables to relate data without duplicating information. There are three common normal forms. The first normal form structures data into tables without repeating groups. The second normal form removes attributes not dependent on the primary key. The third normal form removes transitive dependencies so each non-key attribute depends directly on the primary key. Examples show how data can be normalized through multiple forms to eliminate anomalies and inconsistencies.
Functional dependency defines a relationship between attributes in a table where a set of attributes determine another attribute. There are different types of functional dependencies including trivial, non-trivial, multivalued, and transitive. An example given is a student table with attributes Stu_Id, Stu_Name, Stu_Age which has the functional dependency of Stu_Id->Stu_Name since the student ID uniquely identifies the student name.
This document provides an overview of data modeling concepts. It discusses the importance of data modeling, the basic building blocks of data models including entities, attributes, and relationships. It also covers different types of data models such as conceptual, logical, and physical models. The document discusses relational and non-relational data models as well as emerging models like object-oriented, XML, and big data models. Business rules and their role in database design are also summarized.
Object Query Language is a query language standard for object-oriented databases modeled after SQL. OQL was developed by the Object Data Management Group. Because of its overall complexity nobody has ever fully implemented the complete OQL.
Database recovery is the process of restoring a database to its most recent consistent state before a failure occurred. The purpose is to preserve the ACID properties of transactions and bring the database back to the last consistent state prior to the failure. Database failures can occur due to transaction failures, system failures, or media failures. A good recovery plan is important for making a quick recovery from failures.
This document discusses SQL commands for creating tables, adding data, and enforcing integrity constraints. It covers the core SQL commands: DDL for defining schema, DML for manipulating data, DCL for controlling access, DQL for querying data, and TCL for transactions. Specific topics summarized include data types, primary keys, foreign keys, indexes, views, stored procedures, functions and triggers. Integrity constraints like NOT NULL, UNIQUE, CHECK, DEFAULT are explained. The document also covers SQL queries with filtering, sorting, patterns and ranges. Authorization using GRANT and REVOKE commands is briefly covered.
The document discusses query processing and optimization. It describes several key activities in query processing including translating queries to a format executable by the database, applying optimization techniques, and evaluating the queries. It then provides details on three specific operations: selection using linear searches and indices, sorting, and join operations. It explains different algorithms for implementing each operation and factors to consider when choosing algorithms such as indexing and data sizes.
Concurrency control mechanisms use various protocols like lock-based, timestamp-based, and validation-based to maintain database consistency when transactions execute concurrently. Lock-based protocols use locks on data items to control concurrent access, with two-phase locking being a common approach. Timestamp-based protocols order transactions based on timestamps to ensure serializability. Validation-based protocols validate that a transaction's writes do not violate serializability before committing its writes.
The document discusses object-oriented databases and the need for complex data types that traditional databases cannot support well. It covers the core concepts of the object-oriented data model including objects, classes, inheritance, and object identity. Key advantages of the object-oriented approach include its ability to model complex relationships and enable persistence of programming language objects.
Companies and institutions use database software to organize and integrate their data in a centralized location. A database allows different departments and users to efficiently access and share common information. Key benefits of a database approach include reducing data redundancy, avoiding inconsistencies, enabling data sharing, enforcing standards, applying security restrictions, and maintaining data integrity.
Chapter-2 Database System Concepts and ArchitectureKunal Anand
This document provides an overview of database management systems concepts and architecture. It discusses different data models including hierarchical, network, relational, entity-relationship, object-oriented, and object-relational models. It also describes the 3-schema architecture with external, conceptual, and internal schemas and explains components of a DBMS including users, storage and query managers. Finally, it covers database languages like DDL, DML, and interfaces like menu-based, form-based and graphical user interfaces.
The document discusses R-trees, a data structure used to index multi-dimensional spatial data. R-trees allow for efficient searching of spatial data by grouping data into minimum bounding rectangles (MBRs) and storing them in a tree structure based on these envelopes. The tree structure resembles a B+-tree, with internal nodes containing pointers to child nodes or data records. R-trees provide efficient search, insertion, and deletion of spatial data objects through operations on the tree structure and splitting or merging of nodes as needed.
The document provides an overview of databases and database design. It defines what a database is, what databases do, and the components of database systems and applications. It discusses the database design process, including identifying fields, tables, keys, and relationships between tables. The document also covers database modeling techniques, normalization to eliminate redundant or inefficient data storage, and functional dependencies as constraints on attribute values.
1) The document discusses different types of database users and the role of the database administrator. There are four types of database users: naive users, application programmers, sophisticated users, and specialized users.
2) The database administrator is responsible for defining the database schema, storage structure, granting access authorizations, and performing routine maintenance like backups and monitoring performance.
3) The roles and responsibilities of each user type and the database administrator are outlined. Naive users interact through simple programs, application programmers create interfaces, sophisticated users use query languages, and specialized users build custom applications.
A database management system (DBMS) is software that allows organizations to develop databases for applications and control their creation, organization, and use. A DBMS consists of a collection of persistent data and programs to access, update, and manage that data. Early DBMS used hierarchical and network data models, while most modern DBMS are relational and use SQL. A DBMS provides data independence, security, integrity, and concurrent access. It addresses issues like data redundancy, inconsistency, and isolation that arise without a DBMS.
The document discusses the introduction to database management systems (DBMS). It describes DBMS as a collection of data, programs to access the data, and an environment to conveniently and efficiently use them. It then discusses the purposes of DBMS, including solving issues with file systems like data redundancy, difficulty in accessing data, data isolation, and integrity and security problems. Finally, it briefly outlines some key DBMS concepts like physical and logical data levels, data models, data definition and manipulation languages, the relational model, and database application architectures.
Object oriented programming
• Object Oriented Programming (OOP) is an approach to program organization and development that attempts to eliminate some of the pitfalls of conventional programming methods by incorporating the best of structured programming features with several powerful new concepts.
The document discusses data modeling and different data models. It describes the evolution of data models from hierarchical to network to relational models. It also covers the entity relationship and object-oriented models. The key points are that data modeling helps reconcile different views of data, business rules inform database design, and the conceptual model provides an integrated global view of the database.
This document discusses different database models including hierarchical, network, entity-relationship, and relational models. The hierarchical model organizes data in a tree-like structure with parent-child relationships. The network model extends the hierarchical model by allowing nodes to have more than one parent. The entity-relationship model divides data into entities and attributes and represents relationships visually. The relational model, introduced by E.F. Codd in 1970, organizes data into two-dimensional tables related through common fields and is the most widely used database model today.
Normalization is a process that organizes data to minimize redundancy and dependency. It divides tables to relate data without duplicating information. There are three common normal forms. The first normal form structures data into tables without repeating groups. The second normal form removes attributes not dependent on the primary key. The third normal form removes transitive dependencies so each non-key attribute depends directly on the primary key. Examples show how data can be normalized through multiple forms to eliminate anomalies and inconsistencies.
Functional dependency defines a relationship between attributes in a table where a set of attributes determine another attribute. There are different types of functional dependencies including trivial, non-trivial, multivalued, and transitive. An example given is a student table with attributes Stu_Id, Stu_Name, Stu_Age which has the functional dependency of Stu_Id->Stu_Name since the student ID uniquely identifies the student name.
This document provides an overview of data modeling concepts. It discusses the importance of data modeling, the basic building blocks of data models including entities, attributes, and relationships. It also covers different types of data models such as conceptual, logical, and physical models. The document discusses relational and non-relational data models as well as emerging models like object-oriented, XML, and big data models. Business rules and their role in database design are also summarized.
Object Query Language is a query language standard for object-oriented databases modeled after SQL. OQL was developed by the Object Data Management Group. Because of its overall complexity nobody has ever fully implemented the complete OQL.
Database recovery is the process of restoring a database to its most recent consistent state before a failure occurred. The purpose is to preserve the ACID properties of transactions and bring the database back to the last consistent state prior to the failure. Database failures can occur due to transaction failures, system failures, or media failures. A good recovery plan is important for making a quick recovery from failures.
This document discusses SQL commands for creating tables, adding data, and enforcing integrity constraints. It covers the core SQL commands: DDL for defining schema, DML for manipulating data, DCL for controlling access, DQL for querying data, and TCL for transactions. Specific topics summarized include data types, primary keys, foreign keys, indexes, views, stored procedures, functions and triggers. Integrity constraints like NOT NULL, UNIQUE, CHECK, DEFAULT are explained. The document also covers SQL queries with filtering, sorting, patterns and ranges. Authorization using GRANT and REVOKE commands is briefly covered.
The document discusses query processing and optimization. It describes several key activities in query processing including translating queries to a format executable by the database, applying optimization techniques, and evaluating the queries. It then provides details on three specific operations: selection using linear searches and indices, sorting, and join operations. It explains different algorithms for implementing each operation and factors to consider when choosing algorithms such as indexing and data sizes.
Concurrency control mechanisms use various protocols like lock-based, timestamp-based, and validation-based to maintain database consistency when transactions execute concurrently. Lock-based protocols use locks on data items to control concurrent access, with two-phase locking being a common approach. Timestamp-based protocols order transactions based on timestamps to ensure serializability. Validation-based protocols validate that a transaction's writes do not violate serializability before committing its writes.
The document discusses object-oriented databases and the need for complex data types that traditional databases cannot support well. It covers the core concepts of the object-oriented data model including objects, classes, inheritance, and object identity. Key advantages of the object-oriented approach include its ability to model complex relationships and enable persistence of programming language objects.
Companies and institutions use database software to organize and integrate their data in a centralized location. A database allows different departments and users to efficiently access and share common information. Key benefits of a database approach include reducing data redundancy, avoiding inconsistencies, enabling data sharing, enforcing standards, applying security restrictions, and maintaining data integrity.
Chapter-2 Database System Concepts and ArchitectureKunal Anand
This document provides an overview of database management systems concepts and architecture. It discusses different data models including hierarchical, network, relational, entity-relationship, object-oriented, and object-relational models. It also describes the 3-schema architecture with external, conceptual, and internal schemas and explains components of a DBMS including users, storage and query managers. Finally, it covers database languages like DDL, DML, and interfaces like menu-based, form-based and graphical user interfaces.
The document discusses R-trees, a data structure used to index multi-dimensional spatial data. R-trees allow for efficient searching of spatial data by grouping data into minimum bounding rectangles (MBRs) and storing them in a tree structure based on these envelopes. The tree structure resembles a B+-tree, with internal nodes containing pointers to child nodes or data records. R-trees provide efficient search, insertion, and deletion of spatial data objects through operations on the tree structure and splitting or merging of nodes as needed.
The document provides an overview of databases and database design. It defines what a database is, what databases do, and the components of database systems and applications. It discusses the database design process, including identifying fields, tables, keys, and relationships between tables. The document also covers database modeling techniques, normalization to eliminate redundant or inefficient data storage, and functional dependencies as constraints on attribute values.
1) The document discusses different types of database users and the role of the database administrator. There are four types of database users: naive users, application programmers, sophisticated users, and specialized users.
2) The database administrator is responsible for defining the database schema, storage structure, granting access authorizations, and performing routine maintenance like backups and monitoring performance.
3) The roles and responsibilities of each user type and the database administrator are outlined. Naive users interact through simple programs, application programmers create interfaces, sophisticated users use query languages, and specialized users build custom applications.
A database management system (DBMS) is software that allows organizations to develop databases for applications and control their creation, organization, and use. A DBMS consists of a collection of persistent data and programs to access, update, and manage that data. Early DBMS used hierarchical and network data models, while most modern DBMS are relational and use SQL. A DBMS provides data independence, security, integrity, and concurrent access. It addresses issues like data redundancy, inconsistency, and isolation that arise without a DBMS.
The document discusses the introduction to database management systems (DBMS). It describes DBMS as a collection of data, programs to access the data, and an environment to conveniently and efficiently use them. It then discusses the purposes of DBMS, including solving issues with file systems like data redundancy, difficulty in accessing data, data isolation, and integrity and security problems. Finally, it briefly outlines some key DBMS concepts like physical and logical data levels, data models, data definition and manipulation languages, the relational model, and database application architectures.
Object oriented programming
• Object Oriented Programming (OOP) is an approach to program organization and development that attempts to eliminate some of the pitfalls of conventional programming methods by incorporating the best of structured programming features with several powerful new concepts.
This document discusses object oriented programming (OOP) and C++. It provides an overview of procedure oriented programming versus OOP, highlighting that OOP emphasizes data over procedures and uses objects and classes. Characteristics of OOP like encapsulation, inheritance, and polymorphism are covered. The document then discusses C++ features like classes, objects, constructors, destructors, static class members, friend functions, and inline functions. Finally, it introduces templates in C++ as a way to write generic functions and classes that can work with multiple data types.
OVERVIEW OF CODD’s RULE
• A relational database management system (RDBMS) is a database management system (DBMS) that is based on the relational model as introduced by E. F. Codd.
• A short definition of an RDBMS may be a DBMS in which data is stored in the form of tables and the relationship among the data is also stored in the form of tables.
• E.F. Codd, the famous mathematician has introduced 12 rules (0-12)for the relational model for databases commonly known as Codd's rules. The rules mainly define what is required for a DBMS for it to be considered relational, i.e., an RDBMS.
What is Data Mining? Data Mining is defined as extracting information from huge sets of data. In other words, we can say that data mining is the procedure of mining knowledge from data.
The document is a lecture on database management systems (DBMS) by Neelam Sharma, an assistant professor. It covers key topics in DBMS including the definition of a DBMS, data models like hierarchical, network and relational, database concepts such as schema and instance, and advantages of using a DBMS over flat files. It also discusses database administration and the three levels of schema - physical, logical and external.
Management Management covers the planning, control, and administration of the operations of a concern. The top management handles planning; the middle management concentrates on controlling; and the lower management is concerned with actual administration. Information Information, in MIS, means the processed data that helps the management in planning, ontrolling and operations. Data means all the facts arising out of the operations of the concern. Data is processed i.e. recorded, summarized, compared and finally presented to the management in the form of MIS report. System Data is processed into information with the help of a system. A system is made up of inputs, processing, output and feedback or control. Thus MIS means a system for processing data in order to give proper information to the management for performing its functions.
Planning and Designing for .NET – Programming Language Hierarchy – The .NET Infrastructure – .NET ProjectTypes – Designing for .NET – Application Design Issues
What Is A Computer?
A computer is an electronic device, operating under the control of instructions (software) stored in its own memory unit, that can accept data (input), manipulate data (process), and produce information (output) from the processing. Generally, the term is used to describe a collection of devices that function together as a system.
This document contains lecture notes from a class on VB.NET programming and the .NET architecture. It discusses the .NET infrastructure including the common language runtime and portable executable files. It also covers topics like .NET project types, designing applications for .NET, variable scope, arrays and collections, object passing and parameters, inheritance control, threading, delegates, exception handling, object-oriented features in .NET, and ADO.NET concepts like data connections, adapters, datasets and data readers.
Management Management covers the planning, control, and administration of the operations of a concern. The top management handles planning; the middle management concentrates on controlling; and the lower management is concerned with actual administration. Information Information, in MIS, means the processed data that helps the management in planning, ontrolling and operations. Data means all the facts arising out of the operations of the concern. Data is processed i.e. recorded, summarized, compared and finally presented to the management in the form of MIS report. System Data is processed into information with the help of a system. A system is made up of inputs, processing, output and feedback or control. Thus MIS means a system for processing data in order to give proper information to the management for performing its functions.
The document discusses various topics related to web servers and web development including:
- The difference between local and remote servers, with local servers hosting files on the user's own machine and remote servers hosting files on another computer accessed over the internet.
- Popular web server software like Internet Information Services (IIS) which is used to host ASP.NET and ASP web applications, and Personal Web Server (PWS) which allows individuals to publish and share content.
- The difference between static websites with fixed HTML pages and dynamic websites whose content changes based on a database or CMS.
- Other topics covered include installing web servers, client-side vs server-side scripting, and introducing HTML.
A computer is an electronic device, operating under the control of instructions (software) stored in its own memory unit, that can accept data (input), manipulate data (process), and produce information (output) from the processing. Generally, the term is used to describe a collection of devices that function together as a system.
DEFINITION
• An operating system is an intermediary between a computer user and the hardware. • Make the hardware convenient to use. • Manages system resources. • Use the hardware in an efficient manner
The document provides an overview of databases and database management systems. It defines what a database is and provides examples. It discusses the objectives and purpose of databases, including controlling redundancy, ease of use, data independence, accuracy, recovery from failure, privacy and security. Key terms related to database design and structure are explained, such as tables, rows, indexes, primary keys and foreign keys. The document also covers data definition language, data manipulation language, SQL, users and types of databases. Factors to consider when selecting a database management system are outlined.
This document discusses the basics of data integration. It covers concepts like ETL (extract, transform, load), data mapping, data staging, data extraction, transformation, and loading. It also discusses metadata and its types, data quality, and data profiling concepts. The key objectives are to understand data integration approaches, metadata, data quality, and perform data cleaning/profiling. The document is from a chapter about data integration in the textbook "Fundamentals of Business Analytics".
This document provides an overview of fundamental databases and SQL. It defines what a database and DBMS are, and describes their key characteristics like using real-world entities, relation-based tables, normalization to reduce redundancy, and ACID properties. The document also introduces entity-relationship and relational data models, and covers the different sublanguages of SQL like DDL, DML, and DCL. It provides examples of SQL commands for schema definition, data manipulation, and access control.
Management • The act, art, or manner of managing, handling, controlling directing, etc. • Origin: to train (a horse) in his paces; cause to do exercises of the manage • To control the movement or behavior of; handle; manipulate • To have charge of; direct; conduct; administer • To get (a person) to do what one wishes
Similar to Introduction To Database Management System (20)
The document is a lecture note on basic concepts of taxation from Chanderprabhu Jain College of Higher Studies & School of Law. It defines key terms like taxes, direct and indirect taxes, income, assessment year, financial year. It distinguishes between capital and revenue receipts and discusses the differences between direct and indirect taxes. It also explains the concepts of application of income versus diversion of income and gives examples. Finally, it provides an overview of the different sections related to assessment under the Income Tax Act.
This paper intends to sensitize the students about the changing
dimensions of gender and also familiarizes them with the subtle manifestations of inequality rooted in our society.
The objective of the paper is to apprise the students with the laws relating to marriage, dissolution, matrimonial remedies, adoption, contemporary trends in family institutions in India, in particular the Hindus and Muslims.
Alternative Dispute Resolution has become the primary means by which cases are resolved now days, especially commercial, business disputes. It has emerged as the preferred method for resolving civil cases, with litigation as a last resort. Alternative Dispute Resolution provides an overview of the statutory, procedural, and case law underlining these processes and their interplay with litigation. A significant theme is the evolving role of
professional ethics for attorneys operating in non-adversarial settings. Clients and courts increasingly express a preference for attorneys who are skilled not only in litigation but in problem-solving, which costs the clients less in terms of time, money and relationship. The law of ADR also provides an introduction to negotiation and mediation theory.
The objective of this paper is to acquaint the students with the environmental issues and the measures taken for its protection along with the norms prevailing at international and national
level
The paper will focus on the civil procedures followed in instituting a suit. The students will be familiarised with certain important concepts and practical skill development activity will provide insights into the actual working of the court procedures.
The objective of this paper is to provide an understanding of basic concepts of Indian Constitution and various organs created by the Constitution and their functions.
The document discusses various topics related to corporate law including types of companies, forms of business organization, shares, debentures, and securities. It provides information on sole proprietorships, partnerships, corporations, limited liability companies (LLCs), and different types of companies such as private companies and public companies. The document also defines key terms like shares, share capital, debentures, debenture bonds, and classifications of company securities.
It is an indispensable complementary part of our legal system without the study of which no advocate is suitably equipped with the basic requisites required to go to the court.
This document provides an overview of key concepts in international relations discussed in a political science class, including:
- Democracy and its key principles such as majority rule, protection of minority rights, and consent of the governed.
- Federalism and its features such as division of powers between central and state/provincial governments.
- The parliamentary system in India and features such as a ceremonial head of state, executive drawn from the legislature, and collective responsibility of ministers.
- Concepts in international relations like power, sovereignty, and the elements and limitations of national power, including international law, morality, and world public opinion.
This paper focuses on various aspects of health care law including the constitutional perspective, obligations, and negligence of medical professionals and remedies available to
consumers of health care.
The object of this paper is to focus on land reforms in India, Constitutional provisions related to land reforms, Land Acquisition, Rehabilitation, and Resettlement Act,2013, Urban Real Estate Development Laws and the Provisions of the Rent Laws under the
Delhi Rent Control Act, 1958.
The objective of the course is to familiarize students with the different aspects of business environment and ethical practices to be adopted by organizations in conducting their business.
The document provides information about human resource management (HRM) including definitions of HRM, its components, nature, scope, importance, evolution, policies, challenges, and trends. It also discusses the differences between personnel management and HRM as well as HRM and strategic HRM. Additionally, it covers topics related to human resource planning such as meaning, importance, job analysis, and future personnel needs. The document appears to be lecture notes on an introduction to HRM course provided by Ms. Pallavi Sharma.
More from CHANDERPRABHU JAIN COLLEGE OF HIGHER STUDIES & SCHOOL OF LAW (20)
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
How Barcodes Can Be Leveraged Within Odoo 17Celine George
In this presentation, we will explore how barcodes can be leveraged within Odoo 17 to streamline our manufacturing processes. We will cover the configuration steps, how to utilize barcodes in different manufacturing scenarios, and the overall benefits of implementing this technology.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
1. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Semester: SECOND Semester
Name of the Subject:
DATABASE MANAGEMENT SYSTEM
INTRODUCTION TO DBMS
UNIT-I
2. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Introduction to DBMS
• Purpose of Database Systems
• View of Data
• Data Models
• Data Definition Language
• Data Manipulation Language
• Transaction Management
• Storage Management
• Database Administrator
• Database Users
• Overall System Structure
3. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Unit 1
Introduction to DBMS
(Database Management Systems)
Application
program End-user
DBMS
4. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Database Management System (DMBS)
• Collection of interrelated data
• Set of programs to access the data
• DMBS contains information about a particular enterprise
• DBMS provides an environment that it both convenient and efficient to
use
5. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
• Major components of a database system:
• Data: integrated and shared.
• Hardware: disk, CPU, Main Memory, ...
• Software: DBMS
• Users:
1. Application programmers
2. End users
3. Database administrator (DBA)
» Defining external schema
» Defining conceptual schema
» Defining internal schema
» Liaison with users
» Defining security and integrity checks
» Defining backup and recovery procedures
6. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Purpose of Database Systems
Database management systems were developed to handle the
following difficulties of typical file-processing systems
supported by conventional operating systems:
• Data redundancy and inconsistency
• Difficulty in accessing data
• Data isolation – multiple files and formats
• Integrity problems
• Atomicity of updates
• Concurrent access by multiple users
• Security problems
7. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Why Database ?
• Redundancy can be reduced
• Inconsistency can be avoided
• The data can be shared
• Standards can be enforced
• Security restrictions can be applied
• Integrity can be maintained
• Provision of data independence
8. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Functions of the DBMS
• Data Definition Language (DDL)
• Data Manipulation Language (DML)
• Data Security and Integrity
• Data Recovery and Concurrency
• Data Dictionary
• Performance
9. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Levels of Abstraction
• Physical level: describes how a record (e.g. customer) is stored.
• Logical level: describes data stored in database, and the relationships
among the data.
type customer = record
name: string;
street: string;
city: integer;
end;
• View level: application programs hide details of data types. Views can
also hide information (e.g. salary) for security purposes.
10. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Instances and Schemas
• Similar to types and variables in programming languages
• Schema – the logical structure of the database (e.g., set of customers
and accounts and the relationship between them)
• Instance – the actual content of the database at a particular point in
time
11. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Data Independence
• Ability to modify a schema definition in one level without affecting a
schema definition in the other levels.
• The interfaces between the various levels and components should be
well defined so that changes in some parts do not seriously influence
others.
• Two levels of data independence
– Physical data independence
– Logical data independence
12. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Data Models
• A collection of tools for describing:
– Data
– Data relationships
– Data semantics
– Data constraints
• Object-based logical models
– Entity-relationship model
– Object-oriented model
– Semantic model
– Functional model
• Record-based logical models
– Relational model (e.g., SQL/DS, DB2)
– Network model
13. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Distributed Databases
Database Distributed System
• Distributed database is a database that is not stored in its entirety at a
single physical location, but rather is spread across a network of
computer.
14. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Distributed Databases
• Advantages:
– efficiency of local processing
– data sharing
• Disadvantages:
– communication overhead
– implementation difficulties
15. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Data Definition Language (DDL)
• Specification notation for defining the database schema
• DDL compiler generates a set of tables stored in a data dictionary
• Data dictionary contains metadata (data about data)
• Data storage and definition language – special type of DDL in which
the storage structure and access methods used by the database system
are specified.
16. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Data Manipulation Language (DML)
• Language for accessing and manipulating the data organized by the
appropriate data model
• Two classes of languages
– Procedural – user specifies what data is required and how to get
those data
– Nonprocedural – user specifies what data is required without
specifying how to get those data
17. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Transaction Management
• A transaction is a collection of operations that performs a single logical
function in a database application.
• Transaction-management component ensures that the database remains
in a consistent (correct) state despite system failures (e.g. power
failures and operating system crashes) and transaction failures.
• Concurrency-control manager controls the interaction among the
concurrent transactions, to ensure the consistency of the database.
18. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Storage Management
• A storage manager is a program module that provides the interface
between the low-level data stored in the database and the application
programs and queries submitted to the system.
• The storage manager is responsible for the following tasks:
– Interaction with the file manager
– Efficient storing, retrieving, and updating of data
19. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Database Administrator
• Coordinates all the activities of the database system; the database
administrator has a good understanding of the enterprise’s information
resources and needs:
• Database administrator’s duties include:
– Schema definition
– Storage structure and access method definition
– Schema and physical organization modification
– Granting user authority to access the database
– Specifying integrity constraints
– Acting as liaison with users
– Monitoring performance and responding to changes in requirements
20. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Semester: Second Semester
Name of the Subject:
DATABASE MANAGEMENT SYSTEM
INTRODUCTION TO SQL
UNIT-II
21. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
History of SQL
• SQL: Structured Query Language
• SQL is based on the relational tuple calculus
• SEQUEL: Structured English QUEry Language; part of SYSTEM R, 1974
• SQL/86: ANSI & ISO standard
• SQL/89: ANSI & ISO standard
• SQL/92 or SQL2: ANSI & ISO standard
• SQL3: in the works.
22. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
SQL
SQL consists of the following parts:
• Data Definition Language (DDL)
• Interactive Data Manipulation Language (Interactive DML)
• Embedded Data Manipulation Language (Embedded DML)
• Views
• Integrity
23. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Objectives
• Explore basic commands and functions of SQL
• How to use SQL for data administration (to create tables, indexes, and
views)
• How to use SQL for data manipulation (to add, modify, delete, and retrieve
data)
• How to use SQL to query a database to extract useful information
24. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Introduction to SQL
• SQL functions fit into two broad categories:
– Data definition language
• SQL includes commands to:
– Create database objects, such as tables, indexes, and views
– Define access rights to those database objects
– Data manipulation language
• Includes commands to insert, update, delete, and retrieve data
within database tables
25. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
• SQL is relatively easy to learn
• Basic command set has vocabulary of less than 100 words
• Nonprocedural language
• American National Standards Institute (ANSI) prescribes a standard SQL
• Several SQL dialects exist
26. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Introduction to SQL
27. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Introduction to SQL (continued)
28. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Introduction to SQL (continued)
29. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Data Definition Commands
• Examine simple database model and database tables that will form basis for
many SQL examples
• Understand data environment
30. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
The Database Model
31. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Creating the Database
• Following two tasks must be completed:
– Create database structure
– Create tables that will hold end-user data
• First task:
– RDBMS creates physical files that will hold database
– Tends to differ substantially from one RDBMS to another
32. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
The Database Schema
• Authentication
– Process through which DBMS verifies that only registered users
are able to access database
– Log on to RDBMS using user ID and password created by
database administrator
• Schema
– Group of database objects—such as tables and indexes—that are
related to each other
33. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Data Types
• Data type selection is usually dictated by nature of data and by intended use
• Pay close attention to expected use of attributes for sorting and data
retrieval purposes
34. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Data Types (continued)
35. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Creating Table Structures
• Use one line per column (attribute) definition
• Use spaces to line up attribute characteristics and constraints
• Table and attribute names are capitalized
• NOT NULL specification
• UNIQUE specification
36. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
SQL Constraints
• NOT NULL constraint
– Ensures that column does not accept nulls
• UNIQUE constraint
– Ensures that all values in column are unique
• DEFAULT constraint
– Assigns value to attribute when a new row is added to table
• CHECK constraint
– Validates data when attribute value is entered
37. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
SQL Indexes
• When primary key is declared, DBMS automatically creates unique index
• Often need additional indexes
• Using CREATE INDEX command, SQL indexes can be created on basis of
any selected attribute
• Composite index
– Index based on two or more attributes
– Often used to prevent data duplication
38. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Summary
• Many SQL constraints can be used with columns.
• The column list represents one or more column names separated by
commas.
• WHERE clause can be used with SELECT, UPDATE, and DELETE
statements to restrict rows affected by the DDL command.
39. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Semester: SECOND Semester
Name of the Subject:
DBMS
RELATIONAL DATA MODEL
UNIT-III
40. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Relational Data Model
• In the relational data model the database is represented as a group of
related tables.
• The relational data model was introduced in 1970 by E. F. Codd of IBM
published a paper in CACM entitled "A Relational Model of Data for
Large Shared Data Banks".
• It is currently the most popular model. The mathematical simplicity and
ease of visualization of the relational data model have contributed to its
success.
41. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Definitions of Terminology
Formal relational term Informal equivalents
relation table
tuple row or record
cardinality number of rows
attribute column or field
degree number of columns
(unique) identifier Primary key
domain pool of legal values
42. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Characteristics of a Relation (table)
• Two-dimensional structure with rows and columns
• A relation represent a single entity
• Each table must have an attribute to uniquely identify each row
• Column values all have same data type
• Order of the rows and columns is immaterial to the DBMS
43. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Properties of a Relation
• Based on the set theory
• 1. There are no duplicate tuples (rows).
– The body of the relation is a mathematical set (i.e., a set of
tuples), and sets in mathematics by definition do not include
duplicate elements.
– If a "relation" contains duplicate tuples, then it is not a relation.
44. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Properties of a Relation
• 2. Tuples (rows) are unordered (top to bottom).
– Sets in mathematics are not ordered. So, even if a relation A's
tuples are reversely ordered, it is still the same relation.
– Thus, there is no such thing as "the 5th tuple" or the last tuple.
In other words, there is no concept of positional addressing.
45. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Properties of a Relation
• Based on the set theory
• 1. There are no duplicate tuples (rows).
– The body of the relation is a mathematical set (i.e., a set of
tuples), and sets in mathematics by definition do not include
duplicate elements.
– If a "relation" contains duplicate tuples, then it is not a relation.
46. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Properties of a Relation
4. All attribute values are atomic.
– At every row-and-column position within the table, there always
exists precisely one value, never a list of values. Or equivalently,
relations do not contain repeating groups.
– A relation satisfying this condition is said to be in First Normal Form.
47. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Primary Key
• A PK is an attribute, or collection of attributes, whose values
uniquely identify each tuple in a relation.
• To being unique, a PK must be minimal (contain no
unnecessary attributes)
• and must not change in value.
48. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Entity Integrity Rule
• Guarantees that each entity will have a unique identity and ensures that
foreign key values can properly reference primary key values.
• Requirement
– No component of the primary key is allowed to accept nulls.
– By "null" here, we mean that information is missing for some reason.
49. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Foreign Key
• An attribute in one table whose values must either match the
primary key in another table or be null.
• Attribute FK of base relation R2 is a foreign key if and only if it
satisfies the following two time-independent properties:
– Each value of FK is either wholly null or wholly non-null.
– Each non-null value of FK is identical to the value of PK in
some tuple of R1.
50. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Referential Integrity Rule
• The database must not contain any unmatched foreign key values.
• Just as primary key values represent entity identifiers, so foreign key
values represent entity references.
• The referential integrity rule simply says that if B references A, then
A must exist.
51. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Select Operation
• Notation: p(r) lowercase Greek sigma
• p is called the selection predicate
• Defined as:
p(r) = {t | t r and p(t)}
Where p is a formula in propositional calculus consisting of terms connected by :
(and), (or), (not)
Each term is one of:
<attribute> op <attribute> or <constant>
where op is one of: =, , >, . <.
52. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Union Operation
• Notation: r s
• Defined as:
r s = {t | t r or t s}
For r s to be valid.
1. r, s must have the same arity (same number of attributes)
2. The attribute domains must be compatible (e.g., 2nd column
of r deals with the same type of values as does the 2nd
column of s).
Although the field types must be the same, the names can be different. For example
I can union professor and lecturer where:
53. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
The Data Normalization Process
• A methodology for organizing attributes into tables so that
redundancy among the nonkey attributes is eliminated.
• The output of the data normalization process is a properly structured
relational database.
54. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
The Data Normalization Technique
• Input:
– all the attributes that must be incorporated into the database
– a list of all the defining associations between the attributes (i.e.,
the functional dependencies).
• a means of expressing that the value of one particular
attribute is associated with a single, specific value of another
attribute.
• If we know that one of these attributes has a particular value,
then the other attribute must have some other value.
55. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Full Functional dependency:
• If A and B are attributes(columns)of a table, B is fully functionally dependent
on A if B is functionally dependent on A, but not on any proper subset of A.
SalesPerson#--SalesPersonName
•Partial Functional Dependency:
• If A and B are attributes of a table, B is partially dependent on A if there is
some attribute that can be removed from A and yet the dependency still holds.
SP#, SPName -------> Comm%
•Transitive Functional Dependency:
• A , B and C are attributes of a table. If A is functionally dependent on B, and B
is functionally dependent on C, then C is Transitively dependent on A via B.
.
56. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Logical Design of Relational Database Systems
• The conversion of E-R diagrams into relational tables.
• The data normalization technique.
• The use of the data normalization technique to test the tables resulting from the E-
R diagram conversions.
57. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Second Normal Form
A Table is said to be in 2NF if it is in 1NF and there are no partial
dependencies
No Partial Functional Dependencies
Every non primary key attribute of the table must be fully functionally
dependent on the entire primary key of that table.
A non-key attribute cannot depend on only part of the key.
58. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Third Normal Form
• A Table that is in 1NF and 2NF and in which no non primary key attribute is
transitively dependent on the primary key.
• Does not allow transitive dependencies in which one nonkey attribute is
functionally dependent on another.
• Nonkey attributes are not allowed to define other nonkey attributes.
• "Each attribute must be a fact about the key, the whole key, and nothing but the
key."
59. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Boyce-codd Normal Form (BCNF)
• A Table is in BCNF if and only if every determinant (i.e., the attribute or a
group of attributes on which some other attribute is fully functionally
dependent) is a candidate key. BCNF is a stronger form of 3NF.
• The difference between 3NF and BCNF is that for a Functional dependency
A--->B, 3NF allows this dependency in a table if attribute B is a primary key
attribute and attribute A is not a candidate key, where as BCNF insists that
for this dependency to remain in a table, attribute A must be a candidate key.
60. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Semester: SECOND Semester
Name of the Subject:
DBMS
TRANSACTION PROCESSING AND
CONCURRENCY CONTROL
UNIT-IV
61. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Transaction
• Any action that reads from and/or writes to a database may consist of:
– Simple SELECT statement to generate list of table contents
– Series of related UPDATE statements to change values of attributes in
various tables
– Series of INSERT statements to add rows to one or more tables
– Combination of SELECT, UPDATE, and INSERT statements
62. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
• Transaction is logical unit of work that must be either entirely completed
or aborted
• Successful transaction changes database from one consistent state to
another
– One in which all data integrity constraints are satisfied
• Most real-world database transactions are formed by two or more
database requests
– Equivalent of a single SQL statement in an application program or
transaction
63. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Evaluating Transaction Results
• Not all transactions update database
• SQL code represents a transaction because database was accessed
• Improper or incomplete transactions can have devastating effect on
database integrity
– Some DBMSs provide means by which user can define enforceable
constraints
– Other integrity rules are enforced automatically by the DBMS
64. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
The ACID Properties
• Atomicity
– Requires that all operations (SQL requests) of a transaction be
completed
• Consistency
– Indicates the permanence of database’s consistent state
65. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
• Isolation
– Data used during execution of a transaction cannot be used by
second transaction until first one is completed
• Durability
– Indicates permanence of database’s consistent state Isolation
66. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Transaction Management with SQL
• ANSI standards require that, when a transaction sequence is initiated by a user
or an application program, it must continue through all succeeding SQL
statements until one of four events occurs
– COMMIT statement is reached
– ROLLBACK statement is reached
– Program is abnormally terminated
67. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Concurrency Control
• Coordination of simultaneous transaction execution in a
multiprocessing database system
• Objective is to ensure serializability of transactions in a multiuser
database environment
68. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Scheduling Algorithms
• Modify concurrency control schemes for use in distributed environment.
There are 3 basic methods for transaction concurrency control.
• Locking (two phase locking - 2PL).
• Timestamp ordering
• Optimistic
• Hybrid
69. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Locking Protocols
• Majority Protocol
• Local lock manager at each site administers lock and unlock requests for
data items stored at that site.
• When a transaction wishes to lock an un replicated data item Q residing
at site Si, a message is sent to Si ‘s lock manager.
• If Q is locked in an incompatible mode, then the request is delayed
until it can be granted.
• When the lock request can be granted, the lock manager sends a
message back to the initiator indicating that the lock request has been
granted.
70. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Timestamp Ordering
• Timestamp (TS): a number associated with each transaction
– Not necessarily real time
• Can be assigned by a logical counter
– Unique for each transaction
– Should be assigned in an increasing order for each new transaction
71. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Concurrency Control
with Locking Methods
• Lock
– Guarantees exclusive use of a data item to a current transaction
– Required to prevent another transaction from reading inconsistent
data
• Lock manager
– Responsible for assigning and policing the locks used by
transactions
72. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Lock Granularity
• Indicates level of lock use
• Locking can take place at following levels:
– Database
– Table
– Page
– Row
– Field (attribute)
73. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Lock Types
• Binary lock
– Has only two states: locked (1) or unlocked (0)
• Exclusive lock
– Access is specifically reserved for transaction that locked object
– Must be used when potential for conflict exists
• Shared lock
– Concurrent transactions are granted Read access on basis of a
common lock
74. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Serializability Challenges
Given a set of transactions that execute concurrently, the goal is:
• to find a schedule equivalent to some serial order
• maximize throughput and concurrency
Thus, exclude the trivial solution of running transactions one at a time.
But, theory is not perfect:
• given an arbitrary mix of reads and writes from different transactions,
finding out all possible serializable orders is NP-complete.
75. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Serializability
Given all the reads and writes from all active transactions, a scheduling
of these operations is serializable if the schedule produces the same
effect on the database as some serial execution of the same transactions.
Why does it help?
By definition, a serial execution of transactions does not have any
concurrency control problem, since each transaction executes to
completion before the next one is allowed to start
If we can find a serializable schedule, then the isolation property is
satisfied.
76. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Concurrency Control
with Time Stamping Methods
• Assigns global unique time stamp to each transaction
• Produces explicit order in which transactions are submitted to DBMS
• Uniqueness
– Ensures that no equal time stamp values can exist
• Monotonicity
– Ensures that time stamp values always increase
77. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Wait/Die and Wound/Wait Schemes
• Wait/die
– Older transaction waits and younger is rolled back and
rescheduled
• Wound/wait
– Older transaction rolls back younger transaction and
reschedules it
78. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Lock-Based Concurrency Control
• A DBMS ensures that only serializable schedules are allowed by using a
suitable CC protocol.
• Strict Two-phase Locking (Strict 2PL) Protocol
• Strict 2PL does however allow deadlocks, i.e. cycles of transactions
waiting for locks to be released. A DBMS must either prevent or detect
(and resolve) deadlocks.
79. Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council of India)
Summary
• Concurrency control and recovery are among the most important functions
provided by a DBMS.
• Users need not worry about concurrency.
– System automatically inserts lock/unlock requests and schedules actions
of different Xacts in such a way as to ensure that the resulting execution
is equivalent to executing the Xacts one after the other in some order.
• Write-ahead logging (WAL) is used to undo the actions of aborted
transactions and to restore the system to a consistent state after a crash.
– Consistent state: Only the effects of commited Xacts seen.