Process of minimizing the resource usage.
Aims of Query Decomposition
To transform a high-level query into a Relational Algebra query
&
To check the query is syntactically and semantically correct
It is efficient way to retrieve data
from database.
http://phpexecutor.com
Query Processing : Query Processing Problem, Layers of Query Processing Query Processing in Centralized Systems – Parsing & Translation, Optimization, Code generation, Example Query Processing in Distributed Systems – Mapping global query to local, Optimization,
Query Processing : Query Processing Problem, Layers of Query Processing Query Processing in Centralized Systems – Parsing & Translation, Optimization, Code generation, Example Query Processing in Distributed Systems – Mapping global query to local, Optimization,
This presentation several topics of subjects RDBMS and DBMS including Distributed Database Design,Architecture of Distributed database processing system,Data Communication concept,Concurrency control and recovery. All the topics are briefly described according to syllabus of BCA II and BCA III year subjects.
Transaction concept, ACID property, Objectives of transaction management, Types of transactions, Objectives of Distributed Concurrency Control, Concurrency Control anomalies, Methods of concurrency control, Serializability and recoverability, Distributed Serializability, Enhanced lock based and timestamp based protocols, Multiple granularity, Multi version schemes, Optimistic Concurrency Control techniques
DDBMS, characteristics, Centralized vs. Distributed Database, Homogeneous DDBMS, Heterogeneous DDBMS, Advantages, Disadvantages, What is parallel database, Data fragmentation, Replication, Distribution Transaction
comprehensive lecture on join odering fragments queries. it is the topic of DDBMS and the content are taken from multiple sources including google, book, class lecture.
prepared by IFZAL HUSSAIN student of CS in SHAHEED BENAZIR BHUTTO UNIVERSITY SHERINGAL DIR UPPER KPK, PAKISTAN.
This presentation several topics of subjects RDBMS and DBMS including Distributed Database Design,Architecture of Distributed database processing system,Data Communication concept,Concurrency control and recovery. All the topics are briefly described according to syllabus of BCA II and BCA III year subjects.
Transaction concept, ACID property, Objectives of transaction management, Types of transactions, Objectives of Distributed Concurrency Control, Concurrency Control anomalies, Methods of concurrency control, Serializability and recoverability, Distributed Serializability, Enhanced lock based and timestamp based protocols, Multiple granularity, Multi version schemes, Optimistic Concurrency Control techniques
DDBMS, characteristics, Centralized vs. Distributed Database, Homogeneous DDBMS, Heterogeneous DDBMS, Advantages, Disadvantages, What is parallel database, Data fragmentation, Replication, Distribution Transaction
comprehensive lecture on join odering fragments queries. it is the topic of DDBMS and the content are taken from multiple sources including google, book, class lecture.
prepared by IFZAL HUSSAIN student of CS in SHAHEED BENAZIR BHUTTO UNIVERSITY SHERINGAL DIR UPPER KPK, PAKISTAN.
Chapter 55.1 Describe the circumstances in which you would c.docxDinahShipman862
Chapter 5
5.1 Describe
the circumstances in which you would choose to use embedded
SQL
rather than
SQL
alone or only a general-purpose programming language.
Answer:
5.2
Write a Java function using
JDBC
metadata features that takes a
ResultSet
as an input parameter, and prints out the result in tabular form, with appropriate names as column headings.
Answer:
5.3
Write a Java function using
JDBC
metadata features that prints a list of all relations in the database, displaying for each relation the names and types of its attributes.
Answer:
5.4
Show how to enforce the constraint
“
an instructor cannot teach in two different classrooms in a semester in the same time slot.
”
using a trigger (remember that the constraint can be violated by changes to the
teaches
relation as well as to the
section
relation).
Answer:
5.5
Write triggers to enforce the referential integrity constraint from
section
to
time
slot
, on updates to
section
, and
time
in Figure 5.8 do not cover the
update
operation.
slot
. Note that the ones we wrote
5.6
To maintain the
tot cred
attribute of the
student
relation, carry out the fol-
lowing:
a. Modify the trigger on updates of
takes
, to handle all updates that can
affect the value of
tot
b. Write a trigger to handle inserts to the
takes
relation.
cred
.
c. Under what assumptions is it reasonable not to create triggers on the
course
relation?
Answer:
5.7
Consider the bank database of Figure 5.25. Let us define a view
branch cust
as follows:
create view
branch cust
as
select
branch name, customer name
from
depositor, account
where
depositor.account number
=
account.account number
Answer:
5.8
Consider the bank database of Figure 5.25. Write an
SQL
trigger to carry out the following action: On
delete
of an account, for each owner of the account, check if the owner has any remaining accounts, and if she does not, delete her from the
depositor
relation.
Answer:
5.9
Show how to express
group by cube
(
a
,
b
,
c
,
d
) using
rollup
; your answer should have only one
group by
clause.
Answer:
5.10
Given a relation
S
(
student
,
subject
,
marks
), write a query to find the top
n
students by total marks, by using ranking.
Answer:
5.11
Consider the
sales
relation from Section 5.6.Write an
SQL
query to compute the cube operation on the relation, giving the relation in Figure 5.21. Do not use the
cube
construct.
Answer:
5.12
Consider the following relations for a company database:
•
emp
(
ename
,
dname
,
salary
)
•
mgr
(
ename
,
mname
) and the Java code in Figure 5.26, which uses the JDBC API. Assume that the userid, password, machine name, etc. are all okay. Describe in concise
English what the Java program does. (That is, produce an English sentence like “It finds the manager of the toy department,” not a line-by-line description of what each Java statement does.)
Answer:
5.13
Suppose you were asked to define a class
MetaDisp.
Organizations are “collections of people working together, in divisions of labor, to achieve a common purpose.”
“Synergy” = the creation of a whole that is greater than the sum of its parts.
Open systems exchange input and output with the environment.
http://phpexecutor.com
Topics that will be emphasized in this class include
Technology Strategy
Development of Technological capability
Innovation management
Technology management and business competitiveness interface
Technology adoption
E-business and Virtual Corporation
http://phpexecutor.com
Align Information Technology and Business Strategy Salman Memon
Align Information Technology and Business Strategy
The mission critical, long-term IT choices made by a firm.
Commitment to build IT capability
http://phpexecutor.com
WHITE BOX & BLACK BOXTESTING IN DATABASESalman Memon
White box & black box are software testing methods.
Software testing is a process that should be done during the development process. In other words software testing is a verification and validation process.
Verification : is the process to make sure the product satisfies the conditions imposed at the start of the development phase. In other words, to make sure the product behaves the way we want it to.
http://phpexecutor.com
E-Mail Electronic mail
A method of exchanging messages in digital form.
E-mail systems are based on a store-and-forward method in which e-mail server accept, forwards, delivers and stores messages on behalf of users.
Users only need to connect to the internet through a computer for the duration of message submission or retrieval
http://phpexecutor.com
Electronic mail, most commonly called email or e-mail since around 1993
E-mail is one of the most widely used forms of communication today.
E-mail is faster and cheaper than traditional postal mail, but at least when you seal that envelope and stick a stamp on it, you can have some confidence that only the intended recipient will open it.
With e-mail, however, your message could be intercepted midstream, and you might never realize it. You have to take steps to secure and protect your e-mail messages.
http://phpexecutor.com
Time management is an art. It is arranging, organizing and budgeting time for the purpose of accomplishing something within a time.
Time management is having control over the amount of time spent on a particular activity.
Hence, time management helps an individual to be more organized and more productive.
http://phpexecutor.com
What is video conferencing
A videoconference is a live connection between people in separate locations for the purpose of communication, usually involving audio and often text as well as video. At its simplest, videoconferencing provides transmission of static images and text between two locations. At its most sophisticated, it provides transmission of full-motion video images and high-quality audio between multiple locations.
http://phpexecutor.com
A hash function usually means a function that compresses, meaning the output is shorter than the input
A hash function takes a group of characters (called a key) and maps it to a value of a certain length (called a hash value or hash).
The hash value is representative of the original string of characters, but is normally smaller than the original.
This term is also known as a hashing algorithm or message digest function.
Hash functions also called message digests or one-way encryption or hashing algorithm.
http://phpexecutor.com
DATA
Data is any raw material or unorganized information.
CLUSTER
Cluster is group of objects that belongs to a same class.
Cluster is a set of tables physically stored together as one table that shares common columns.
http://phpexecutor.com
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
2. Process of minimizing the resource usage.
Aims of Query Decomposition
To transform a high-level query into a Relational
Algebra query
&
To check the query is syntactically and
semantically correct
It is efficient way to retrieve data
from database.
2
3. select * from staff s, branch b
where s.branchNo=b.branchNo And
(s.position=‘Manager’ And b.city=‘London’);
Three equivalent relational algebra queries
1. σ(position=‘Manager’)^(staff.branchNo=branc
h.branchNo)(staff x branch)
• Suppose staff have 1000 records and branch have 50 records
3
4. • This query calculates the Cartesian product of staff and branch,
(1000 + 50) disk accesses to read and creates relation with (1000*50)
tuples. We then have to read each of these tuples again to test them
against the selection predicate so it gives total cost of :
(1000+50)+2*(1000*50)=101050 disk access
2. σ(position=‘Manager’)^(city=‘London’)(staff∞staff.branchNo=bran
ch.branchNo branch)
Gives total cost of:
• 2*1000+(1000+50)=3050 disk accesses
3. (σposition=‘manager’(staff))∞staff.branchNo=branch.branchNo(σci
ty=‘London’(branch))
Gives total cost of:
• 1000+2*50+5+(50+5)=1160 disk accesses
4
6. In this stage query is syntactically analyzed
Verifies that the relations and attributes specified in
the query are defined in the system catalog
Verifies that any operations applied to database
objects are appropriate for the object type
6
7. • SELECT staffNumber
FROM staff
where position >10;
This query would be rejected on two grounds
1. in SELECT list the attribute staffNumber is not defended for
staff relation(should be staffNo)
2. in WHERE clause comparison ’>10’ is incompatible with the
data type position, which is a variable character string
After completion this stage ,high level query has been transformed
internal representation that is some kind of query tree.
7
8. ∞s.branchNo=b.branchNo Root
intermediate operations
σs.position=‘manager’ σb.city=‘london’
leaves
staff branch
• A leaf node is created for each base relation in query
• Each intermediate relation produced by a relational algebra operation
• The Root of the tree represents the result of the query
• The sequence of operation is directed from the leaves to the root
8
9. It normalizes query for easy manipulation
Arbitrarily complex predicate (in SQL, the WHERE
condition) can be converted into one of two forms by
applying few transformation rules:
1. Conjunctive Normal form:- A sequence of conjuncts that are
connected with the ^ (AND) operator. Each conjunct contains
one or more terms connected by the v (OR) operator
For Example :-
(position=‘manager’ v salary > 20000) ^ branchNo=‘B003’
A conjunctive selection contains only those tuples that satisfy all
conjuncts.
9
10. 2. Disjunctive Normal form:- A sequence of disjuncts that
are connected with the v (OR) operator. Each disjunct
contains one or more terms connected by the ^ (AND)
operator
For Example : we can rewrite the above conjunctive
normal form into disjunctive
(position=‘manager’^ branchNo=‘B003’) v (salary >20000
^ branchNo=‘B003’)
A disjunctive selection contains those tuples formed by
the union of all tuples that satisfy the disjuncts
10
11. It reject normalized queries that are incorrectly formulated or
contradictory.
A query is incorrectly formulated if components do not contribute
to the generation of the result, a query is contradictory if its
predicate cannot be satisfied by any tuple.
For Example: the predicate (position=‘manager’ ^
position=‘assistant’)on staff relation is contradictory b/c a person
can not the both manager and assistant simultaneously
However, the predicate((position=‘manager’ ^position=‘assistant’)
v salary >2000) could be simplified
11
12. Simplifying the qualification of user query to
eliminate redundancy
Transform the query to a semantically equivalent
but more easily and efficiently computed form
Queries on relation that satisfy certain integrity
and security constraints (access restriction)
12
13. Before elimination of Redundancy
SELECT Position
FROM staff s, branch b
WHERE (NOT(b.Position = ‘manager’)
AND (b.Position = ‘manager’ OR b.Position=‘assistant’)
AND NOT(b.Position = ‘assistant’))
OR (b.BID = s.SID
AND s.Name = ‘Ali’)
After Elimination of Redundancy
SELECT b.Position
FROM staff s, branch b
WHERE b.BID = s.SID AND s.Name = ‘ali
13
14. The final stage of query decomposition.
The query is restructured to provide a more
efficient implementation.
14
15. Advantages:-
all information required to select an optimum
strategy is up to date
Disadvantage:
It takes time to decompose the query has to be
parsed, validated, and optimized before it can
be executed
15
16. Query is optimized ,data can be retrieve easily
and more efficiently
16