=-=-=-==-=-Overview of the Talk-=-=-=-=-=
Introduction to the Subject
Database
Rational Database
Object Rational Database
Database Management System
History
Programming
SQL,
Connecting Java, Matlab to a Database
Advance DBMS
Data Grid
BigTable
Demo
Products
MySQL, SQLite, Oracle,
DB2, Microsoft Access,
Microsoft SQL Server
Products Comparison.
=-=-=-==-=-Overview of the Talk-=-=-=-=-=
Introduction to the Subject
Database
Rational Database
Object Rational Database
Database Management System
History
Programming
SQL,
Connecting Java, Matlab to a Database
Advance DBMS
Data Grid
BigTable
Demo
Products
MySQL, SQLite, Oracle,
DB2, Microsoft Access,
Microsoft SQL Server
Products Comparison.
Database Management Software or DBM software is used for storing, manipulating, and managing data, such as format, names of fields, and record and file structures in a database environment. Users can construct their own databases using a DBMS to satisfy their business requirements. Database design also supports the creation, design, implementation, and maintenance of an organization-wide data management system.
To interact with a database, a DBMS package generally uses SQL queries. It receives a command from a database administrator (DBA) and prompts the system to perform the necessary action. These instructions can be about loading, retrieving, or modifying existing data in the system. We have explained about DMl Commands such as INSERT, DELETE, SELECT, commands
Database Management Software or DBM software is used for storing, manipulating, and managing data, such as format, names of fields, and record and file structures in a database environment. Users can construct their own databases using a DBMS to satisfy their business requirements. Database design also supports the creation, design, implementation, and maintenance of an organization-wide data management system.
To interact with a database, a DBMS package generally uses SQL queries. It receives a command from a database administrator (DBA) and prompts the system to perform the necessary action. These instructions can be about loading, retrieving, or modifying existing data in the system. We have explained about DMl Commands such as INSERT, DELETE, SELECT, commands
New folderIMAG2318.jpgNew folderIMAG2319.jpgNew folder.docxhenrymartin15260
New folder/IMAG2318.jpg
New folder/IMAG2319.jpg
New folder/IMAG2320.jpg
New folder/IMAG2321.jpg
Task 1.
1. Use case is a type of tool that is used for analyzing systems in order to identify, organize and clarify systems and their requirements. A use case diagram will thus be defined as a graphical presentation of the elements of a system and how these elements interact in performing the required objectives.
Use case has two types of actors:
Primary actors. These are the ones that the system shall provide services to. They include customers.
Secondary actors are those that manage the system in providing services to the customers, and they include system administrators.
2. <<include>> relationship is used in extraction of use case duplicated use case fragments in multiple use cases. An example is where a user accesses the ATM. The first step is pin, which then grants them access to main menu.
<<extend>> relationship applies where a conditional step is to be added to another use case step that is first class, and is not necessarily a step requirement. An example is when a user in an ATM wants to monitor their accounts. Once the main menu is provided, he or she would be able to monitor the balance, and another option of withdrawing would be an extension or addition to the base use class.
3. Encapsulation is the process of combining data and functions of a program into one component. It is used in protecting codes and data from being accessed randomly by other codes that are defined outside the class. An example in java is where getters and setters are used by the public methods in order to access class fields from outside the java.
Information hiding is the process of differentiating design functions and decisions in a computer program which are vulnerable to change, from modification by other programs. An example is where a programmer decides to create an application for managing a database. The programmer retains the information to modify the program while only releasing the part of the program used to access basic database functions to the public.
Polymorphism refers to the use of one interface to access various entities of different types. An example of polymorphism is where various data types are defined for a particular function, and the computation or data modification done using the best data type method among those defined.
Data abstraction is a methodology used in defining the methods of interaction with the system, starting from easiest tending to the most complex interaction method, with the very difficult ones suppressed. An example is where a programmer inputs data for coding, all the data input is basically plain, and the complex part of data representation by the code is not portrayed on the screen for the programmer.
4. Difference between USDP and Waterfall life Cycles.
In USDP, the stages followed from analysis to testing, are conducted in iterative and concurrent manner while in Waterfall, these processes are done in sequ.
This chapter will help you to demonstrate the working of the online blood bank system with the help of the diagrams, it includes DFD's ,architecture,block diagrams,ER-diagrams and state transition,table structure Etc.
subject- database management system (dbms)
topic ppt present-
Transaction Concept
Transaction State
Implementation of Atomicity and Durability
Concurrent Executions
Recoverability
Serializability and schedule also types
ACID Properties
Transaction Operations
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2. Transactions
A transaction is an operation carried out on the database.
Transactions can generally be identified as retrievals, inserts, updates
and deletes. This is remembered by the acronym CRUD (Create,
Retrieve, Update and Delete).
Transactions can be made up of one or more operations.
3. Identify Transactions
What do they do?
What tables do they affect?
What attributes do they affect?
How often do they run?
How many rows do they affect?
4. Transactions of Appointment System
Transaction 1 – Add a new patient
Transaction 2 – Delete a patient
Transaction 3 – Record a appointment
Transaction 4 – Show a detail list of patient and the appointments they
have had with the doctors
Transaction 5 – Show a list of patients
Transaction 6 – Update a patient record to change their address
The tables required for this system are Patient, Appointment and
Doctor.
5. CRUD Matrix of Appointment System (Blank)
Transaction
Relation
Patient Appointment Doctor
T1
T2
T3
T4
T5
T6
6. CRUD Matrix of Appointment System
Transaction
Relation
Patient Appointment Doctor
T1 C
T2 D
T3 C
T4 R R R
T5 R
T6 U
7. Transactions in the Boat Hire System
a. Enter the details of all the boats. Update any details for boats. Delete
boats.
b. Enter the details for customers. Update any details for customers.
c. Enter the details for hiring of boats.
d. Enter the details for any damage to boats.
e. List the details of all the boats.
f. List the details of all the customers; their hire and for which boats.
g. List the details for damage, to which boats, during which hire periods and
for which customers.
h. Provide a summary of the hires for a particular period.
10. Literary agent
Fill in the CRUD matrix below to show the following transactions.
Transaction 1. Add a new Author.
Transaction 2. Create a new agent and set up an appointment for her.
Transaction 3. Delete an author and all the appointments they have
had.
Transaction 4. Show a list of Agents details and the Appointments they
have had and with which Authors.
Transaction 5. Update an Agent’s address
Transaction 6. Delete an Appointment.
11. Roles in a System
Not every user is the same.
Users will need to access different parts of the system and access it
in different ways.
12. Boat Hire System - Roles
Manager – should be able to access all parts of the system, because
their role means that they might have to add and delete any data and
be able to see anything.
Admin Assistant – just carries out routine tasks, such as adding any
new customers and recording damage to boats.
Table/User Boat Customer Rental Damage
Manager CRUD CRUD CRUD CRUD
Admin
Assistant
R CRU CRU CRU
13. SQL Facilities to Manage Roles
Grant – gives a particular role or user in the database system access
to an object (such as a table).
Revoke – removes access to an object (such as a table) from a
particular role or user in the database system.
14. Grant
GRANT CREATE ON Boat TO Admin;
This command will give the role of Admin the right to create data on
the table Boat.
GRANT ALL ON Boat TO Manager;
This command will give the role of Manager the right to carry out any
operation on the table Boat.
15. Revoke
REVOKE ALL ON Boat FROM Admin;
– this command will take away any access rights from the role of Admin
on the table Boat.
REVOKE DELETE ON Boat FROM Manager;
– this command will take away the right to delete data from the Boat
table by the Manager.
16. Performance
The term ‘Performance’ is generally used by database professionals to
refer to the way in which a query behaves when run against a
database.
Increasingly, databases contain large amounts of data...
The rate at which a query can return an answer can be slowed when it
has to sort though large numbers of records.
Performance becomes an issue...
17. Indexes
An index is a structure in a database that helps queries run more
quickly.
An index is a data structure that stores the values for a specific
column in a table that makes easier to find a record.
Improves performance
Index can also be unique which will prevent a duplicate value from
being added to that column.
18. Improving Performance with the Use of Views
View of
selected rows
or columns of
these tables
Table 1
Table 2
Table 3
Query
19. View
A view is a virtual table which
completely acts as a real table.
The use of view as a way to improve
performance.
Views can be used to combine tables,
so that instead of joining tables in a
query, the query will just access the
view and thus be quicker.
20. View
We can perform different SQL queries.
DESC department_worker_view;
21. De-Normalisation
Normalising our data model means we will have the minimum amount
of redundancy.
If we are running a query that joins tables, this will be slower than
running a query against a single table or view. This can have an effect
on performance.
Denormalisation can be done by including an attribute in a table that
should not be there according to the rules of normalisation.