0% found this document useful (0 votes)
70 views

CS3492 DBMS Key Notes

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
70 views

CS3492 DBMS Key Notes

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

CS3492 Syllabus - Database Management Systems - 2021 Regulation Anna University

UNIT I RELATIONAL DATABASES

1. Data Models
 Definition of data models
 Types of Data Models in DBMS
 Hierarchical Model
 Network Model
 Entity-Relationship Model
 Relational Model
 Object-Oriented Data Model
 Object-Relational Data Model
 Flat Data Model
 Semi-Structured Data Model
 Associative Data Model
 Context Data Model

2. Database System Architecture

 Definition of database
 Draw the architecture diagram
 Explain it
1. Query Processor
 DML Compiler
 DDL Interpreter
 Embedded DML Pre-compiler
 Query Optimizer
2. Storage Manager
 Authorization Manager
 Integrity Manager
 Transaction Manager
 File Manager
 Buffer Manager
3. Disk Storage
 Data Files
 Data Dictionary
 Indices
3. Different Types of Keys in the Relational Model

Types of Keys
 Candidate Key
 Primary Key
 Super Key
 Alternate Key
 Foreign Key
 Composite Key

4. Relational Algebra

The fundamental operations of relational algebra are as follows –


 Select
 Project
 Union
 Set different
 Cartesian product
 Rename
5. SQL fundamentals
DDL - Data Definition Language
CREATE
ALTER
DROP
DML - Data Manipulation Language
SELECT
INSERT
UPDATE
DELETE
DCL - Data Control Language
GRANT
REVOKE

6. Advanced SQL
-Embedded SQL
-Structure of Embedded SQL
- Give an example coding
-Need Embedded SQL
-Advantages of Embedded SQL
-Dynamic SQL
-Structure of dynamic SQL
- Give an example coding
UNIT II DATABASE DESIGN
1. Entity Relationship (ER) Diagram Model

-Components of the ER Diagram


 Entities, Attributes, Relationships
-ER Diagrams Symbols & Notations
- ER model structure
-How to Create an ER Diagram (ERD) with an example
2. Relational Decomposition
Types of Decomposition
1. Lossless Decomposition
-Practice Problems on Lossless Decomposition
2. Lossy decomposition
3. Dependency Preserving
3. Normalization
- Definition of Normalization
-Normalization Rule
-Types of normalization give an example

4. Boyce/Code Normal Form


-Definition of BCNF
-Rules for BCNF
-Practice Problems of BCNF
5. Multi-valued Dependencies and Fourth Normal Form
- Definition of Multivalue Dependency & 4NF
-Rules for 4NF
-Practice Problems of 4NF give an example.
6. Join Dependencies and Fifth Normal Form
-Definition of 5NF
-Rules for 5NF
-Practice Problems of 5NF give an example

UNIT III TRANSACTIONS


1) ACID Properties in DBMS
 i)A – Atomicity C – Consistency I – Isolation D – Durability
 ii) Uses of ACID Properties
 iii) Practice Problems on ACID Properties in DBMS
2) Concurrency control
 Definition of Concurrency control
 need of Concurrency control
 Problems with the concurrent execution
3. Concurrency control protocols
 Lock Based Concurrency Control Protocol
 Time Stamp Concurrency Control Protocol
 Validation Based Concurrency Control Protocol
4. Types of Lock Protocols
 Simplistic lock protocol
 Pre-claiming lock protocol
 Two Phase locking protocol (2PL)
 Strict Two Phase Locking Protocol (Strict – 2PL)
5. Deadlock in DBMS

 Deadlock Handling
 Deadlock detection
 Deadlock prevention
 Deadlock Avoidance

6. ARIES Algorithm
 Analysis pas
 Redo pass
 undo pass
UNIT IV IMPLEMENTATION TECHNIQUES

1. RAID –Redundant Array of independent disk

-improvement in reliability of RAID by Redundancy

- Improvement in performance of RAID by parallelism

-RAID levels

 RAID level 0
 RAID level 1
 RAID level 2
 RAID level 3
 RAID level 4
 RAID level 5
-Factor in determining RAID level
2. B+ tree Index Files
 Definition of B+ Tree in DBMS?
 B+ Tree Properties
 B+ Tree Structure
 Searching Records in B+ Tree
 Insertion in B+ Tree
 Deletion in B+ Tree
 Update on B+ Tree
 Practice Problems on B+ Tree
3. Indexing
-Indexing can be of the following types
-Primary Index
-Secondary Index
-Clustering Index
-Ordered Indexing is of two types −
 Dense Index
 Sparse Index
4. Hashing

 Definition of Hashing in DBMS?


 Properties of Hashing in DBMS
 Hash Organization
 Types of Hashing

 Static Hashing
 Dynamic Hashing
5. Sorting

-Definition of sorting
-Types of sorting
Adaptive sorting algorithms:
-Quick sort.
-Bubble Sort.
-Insertion Sort.
-Practice Problems

Non-adaptive sorting algorithms:


-Selection Sort.
-Heap Sort.
-Merge sort.
-Radix Sort.
-Bucket Sort.
-Practice Problems
6. Heuristic optimization
-Definition of heuristic
-query optimization
-cost based optimization in heuristic
7. B+ tree Index Files
 Definition of B Tree in DBMS?
 B+ Tree Structure
 Insertion in B+ Tree
 Deletion in B+ Tree
 Update on B+ Tree
 Practice Problems on B Tree

UNIT V DBMS ADVANCED TOPICS

1. Distributed Databases management Architecture


- Definition of Distributed Databases management

- Types of Distributed Databases

-Homogeneous Distributed Databases


-Heterogeneous Distributed Databases
-Draw the Distributed DBMS Architectures

-Architectural Models

 Client - Server Architecture for DDBMS


 Peer - to - Peer Architecture for DDBMS
 Multi - DBMS Architecture(three tier)
-Advantages and Disadvantages of Distributed Database System
2. NOSQL systems
-characteristic of NOSQL system
-categories of NOSQL system

3. Document based NOSQL system and MongoDB

- MongoDB data model


- MongoDB CRUD operation (creates, read, update, delete)
- MongoDB Distributed system characteristic
4. Database Security
Definition of data base security
-Types of security
-thread to database
 Availability loss
 Integrity loss
 Confidentiality loss

-Measures of Control
 Access Control
 Flow Control
 Data Encryption
5. SQL Injection
-Definition of SQL Injection
-SQL Injection method
-Risk Associated with SQL Injection
-production technique against SQL Injection
-Example of SQL Injection
 Retrieving hidden data,
 Subverting application logic
 UNION attacks,
 Examining the database,
 Blind SQL injection
 Retrieving
6. Encryption and Public Key infrastructures
-The Data Encryption and Advanced Encryption Standards
 ciphertext:
 Plaintext
 Encryption
 Decryption
-Symmetric Key Algorithms
-Public (Asymmetric) Key Encryption
-Digital Signatures
-Digital Certificates

You might also like