The document provides an overview of database management systems (DBMS). It discusses that a DBMS stores and retrieves user data with efficiency and security. It has a 3-tier architecture with the database tier containing the database and query processing, the logical tier containing business logic, and the presentation tier for user interfaces. The document also covers data models, schemas, normalization, transactions, concurrency control, and other DBMS concepts.
Data Structures and Algorithms (DSA) Tutorial for Beginners - Learn Data Structures and Algorithm using c, C++ and Java in simple and easy steps starting from basic to advanced concepts with examples
This document provides an overview of cryptography. It begins by explaining the origins of cryptography in ancient civilizations and how it has evolved over time. It then discusses the components of a cryptosystem, including plaintext, encryption/decryption algorithms and keys. Finally, it outlines different types of cryptosystems and their basic functions in encrypting and decrypting data to provide confidentiality during transmission.
This document provides an overview of wireless communication. It discusses key topics such as features of wireless communication including transmission distance and applications. It also outlines some advantages of wireless communication such as mobility and lack of need for wires. Finally, it introduces various terms used in mobile telephony and multiple access techniques including FDMA, TDMA, CDMA and more that allow multiple users to access the network simultaneously.
This document provides an overview of data communication and computer networks. It discusses different types of computer networks including personal area networks (PAN), local area networks (LAN), metropolitan area networks (MAN), wide area networks (WAN) and internetworks. It also describes common LAN technologies like Ethernet, Fast Ethernet and Gigabit Ethernet. Additionally, it covers various network topologies, models, security aspects and layers of the OSI model.
MyBatis is a persistence framework that automates mapping between SQL databases and objects in Java. This tutorial provides an overview of MyBatis and teaches how to perform CRUD operations using MyBatis including configuration files, mapping files, POJOs, and Java code. It also covers more advanced topics like annotations, stored procedures, and dynamic SQL.
Computer Organization refers to the level of abstraction above the digital logic level, but below the operating system level.
At this level, the major components are functional units or subsystems that correspond to specific pieces of hardware built
from the lower level building blocks described in the previous module.
This tutorial gives a complete understanding on Computer Logical Organization starting from basic computer overview till its
advanced architecture
The document provides an overview of database management systems and related concepts. It discusses the characteristics of DBMS, including storing data in a structured way to facilitate retrieval and manipulation. It also describes the main users of a DBMS, including administrators, designers, and end users. Additionally, it outlines the common 3-tier architecture of a DBMS, separating the database, application, and user tiers.
D3.js is a JavaScript library used for manipulating documents based on data. It allows binding arbitrary data to Document Object Model (DOM) elements. The key aspects covered in the document include:
- D3.js allows creating interactive data visualizations in the browser. It uses widely supported standards like HTML, CSS, SVG and JavaScript.
- The document discusses installing D3.js library, setting up an editor and web server for development.
- Core concepts like DOM, SVG, and how D3.js uses them to render visualizations are explained. This provides background for working with D3.js.
This document provides an overview of data communication and computer networks. It discusses different types of computer networks including personal area networks (PAN), local area networks (LAN), metropolitan area networks (MAN), wide area networks (WAN) and internetworks. It also describes common LAN technologies like Ethernet, Fast Ethernet and Gigabit Ethernet. Additionally, it covers various network topologies, models, security aspects and layers of the OSI model.
This document provides an overview of data communication and computer networks. It discusses different types of computer networks including personal area networks (PAN), local area networks (LAN), metropolitan area networks (MAN), wide area networks (WAN) and internetworks. It also describes common LAN technologies like Ethernet, Fast Ethernet and Gigabit Ethernet. Additionally, it covers various network topologies, models, security aspects and layers of the OSI model.
Data communication computer_network_tutorialMaulen Bale
This document provides an overview of data communication and computer networks. It discusses different types of computer networks including personal area networks (PAN), local area networks (LAN), metropolitan area networks (MAN), wide area networks (WAN) and internetworks. It also describes common LAN technologies like Ethernet, Fast Ethernet and Gigabit Ethernet. Additionally, it covers various network topologies and the layered network model including the OSI model and TCP/IP model. The document serves as an introduction to data communication and computer networks.
This document provides instructions for installing DB2 database software on Linux. It outlines hardware and software requirements, describes how to check for system compatibility, and provides step-by-step instructions for installing DB2. The installation process involves running prerequisite checks, accepting license agreements, selecting installation options like directory locations and user authentication, and configuring the initial DB2 instance and partitions.
iBATIS is a lightweight framework for mapping SQL and objects in Java. This document discusses how to perform CRUD operations using iBATIS. It describes creating a POJO class for an Employee table with fields like id, name, salary. An Employee.xml file defines SQL mappings - the <insert> tag maps an "insert" method to insert a record. The IbatisInsert Java file calls this method to insert a sample employee. Reading is similar, with <select> defining a method mapped to a SELECT query. The document covers all CRUD operations and additional iBATIS features.
This document provides an overview of basics of computers including definitions, components, types, and software concepts. It defines a computer as an electronic device that receives input, processes it according to instructions, and provides output. The main components are the input, output, control unit, arithmetic logic unit, and memory. Computers are classified based on size and use as desktops, laptops, tablets, servers, mainframes, and supercomputers. The document also distinguishes between system software, application software, and utility software.
This document provides an introduction to basic computer concepts. It discusses that a computer receives input, processes it based on instructions, and provides output. It also notes that computers can perform repetitive tasks without error. The document then outlines that it will discuss the parts of a computer and microprocessors that enable efficient and correct task completion. It provides information on intended audience and prerequisites. Finally, it includes copyright information and a table of contents to guide the reader.
BDD focuses on providing a shared process and tools to promote communication between software developers and business analysts. It uses examples written in a readable language to illustrate desired system behaviors. BDD emerged from test-driven development, which uses automated tests to drive development. A key BDD practice is specification by example, which involves collaboratively writing examples to illustrate requirements and then automating these examples as tests.
This document provides an overview of SQL (Structured Query Language). It covers topics such as what SQL is, the SQL process, common SQL commands, relational database concepts, different RDBMS databases that use SQL, SQL syntax, data types, operators, expressions, and how to create, manipulate and drop databases and tables using SQL statements. It also discusses SQL constraints, data integrity, database normalization forms, and provides examples of SQL queries for tasks like selecting, inserting, updating and deleting data.
This document provides an overview and introduction to SQL (Structured Query Language). It covers topics such as what SQL is, its basic commands, RDBMS concepts like database normalization, different SQL syntax like CREATE, SELECT, INSERT, and different SQL operators. It also provides examples of creating databases and tables, inserting, selecting, updating and deleting data from tables. The document is intended to give beginners a basic understanding of SQL and how it works.
W3.CSS is a CSS framework developed by w3schools.com that helps create faster, beautiful, and responsive websites. It is inspired by Google's Material Design and includes features like responsive design, standard CSS formatting, and pre-built components like grids, forms, buttons and more. The document provides an overview of W3.CSS and its features before outlining the steps to set up the environment and use various W3.CSS components to build responsive web pages.
This document provides an overview and tutorial for Microsoft Excel. It explains that Excel is a commercial spreadsheet program distributed by Microsoft for Windows and Mac OS X. It describes Excel's capabilities for calculations, data analysis, and integrating information. It outlines the audience as computer users new to Excel and the prerequisites of basic computer and file management skills. It also provides a copyright notice and table of contents for the tutorial sections to follow.
The document provides an overview of the Microsoft Excel interface, describing key elements like the File tab, Ribbon, sheet area, and status bar. It explains how to access the Backstage view in Excel 2010, which centralizes file management tasks like creating, opening, saving, and printing worksheets. The Backstage view replaces the Office button and provides options for file operations in a single location.
This document provides an overview of network security at the application layer. It discusses common application layer protocols like email, DNS, and web browsing. It describes security measures for these protocols, including PGP and S/MIME for encrypting email, DNSSEC for securing DNS queries, and SSL/TLS for securing HTTPS web browsing sessions. The goal of application layer security is to encrypt data in transit and authenticate communicating parties.
This presentation provides a detailed overview of air filter testing equipment, including its types, working principles, and industrial applications. Learn about key performance indicators such as filtration efficiency, pressure drop, and particulate holding capacity. The slides highlight standard testing methods (e.g., ISO 16890, EN 1822, ASHRAE 52.2), equipment configurations (such as aerosol generators, particle counters, and test ducts), and the role of automation and data logging in modern systems. Ideal for engineers, quality assurance professionals, and researchers involved in HVAC, automotive, cleanroom, or industrial filtration systems.
The document provides an overview of database management systems and related concepts. It discusses the characteristics of DBMS, including storing data in a structured way to facilitate retrieval and manipulation. It also describes the main users of a DBMS, including administrators, designers, and end users. Additionally, it outlines the common 3-tier architecture of a DBMS, separating the database, application, and user tiers.
D3.js is a JavaScript library used for manipulating documents based on data. It allows binding arbitrary data to Document Object Model (DOM) elements. The key aspects covered in the document include:
- D3.js allows creating interactive data visualizations in the browser. It uses widely supported standards like HTML, CSS, SVG and JavaScript.
- The document discusses installing D3.js library, setting up an editor and web server for development.
- Core concepts like DOM, SVG, and how D3.js uses them to render visualizations are explained. This provides background for working with D3.js.
This document provides an overview of data communication and computer networks. It discusses different types of computer networks including personal area networks (PAN), local area networks (LAN), metropolitan area networks (MAN), wide area networks (WAN) and internetworks. It also describes common LAN technologies like Ethernet, Fast Ethernet and Gigabit Ethernet. Additionally, it covers various network topologies, models, security aspects and layers of the OSI model.
This document provides an overview of data communication and computer networks. It discusses different types of computer networks including personal area networks (PAN), local area networks (LAN), metropolitan area networks (MAN), wide area networks (WAN) and internetworks. It also describes common LAN technologies like Ethernet, Fast Ethernet and Gigabit Ethernet. Additionally, it covers various network topologies, models, security aspects and layers of the OSI model.
Data communication computer_network_tutorialMaulen Bale
This document provides an overview of data communication and computer networks. It discusses different types of computer networks including personal area networks (PAN), local area networks (LAN), metropolitan area networks (MAN), wide area networks (WAN) and internetworks. It also describes common LAN technologies like Ethernet, Fast Ethernet and Gigabit Ethernet. Additionally, it covers various network topologies and the layered network model including the OSI model and TCP/IP model. The document serves as an introduction to data communication and computer networks.
This document provides instructions for installing DB2 database software on Linux. It outlines hardware and software requirements, describes how to check for system compatibility, and provides step-by-step instructions for installing DB2. The installation process involves running prerequisite checks, accepting license agreements, selecting installation options like directory locations and user authentication, and configuring the initial DB2 instance and partitions.
iBATIS is a lightweight framework for mapping SQL and objects in Java. This document discusses how to perform CRUD operations using iBATIS. It describes creating a POJO class for an Employee table with fields like id, name, salary. An Employee.xml file defines SQL mappings - the <insert> tag maps an "insert" method to insert a record. The IbatisInsert Java file calls this method to insert a sample employee. Reading is similar, with <select> defining a method mapped to a SELECT query. The document covers all CRUD operations and additional iBATIS features.
This document provides an overview of basics of computers including definitions, components, types, and software concepts. It defines a computer as an electronic device that receives input, processes it according to instructions, and provides output. The main components are the input, output, control unit, arithmetic logic unit, and memory. Computers are classified based on size and use as desktops, laptops, tablets, servers, mainframes, and supercomputers. The document also distinguishes between system software, application software, and utility software.
This document provides an introduction to basic computer concepts. It discusses that a computer receives input, processes it based on instructions, and provides output. It also notes that computers can perform repetitive tasks without error. The document then outlines that it will discuss the parts of a computer and microprocessors that enable efficient and correct task completion. It provides information on intended audience and prerequisites. Finally, it includes copyright information and a table of contents to guide the reader.
BDD focuses on providing a shared process and tools to promote communication between software developers and business analysts. It uses examples written in a readable language to illustrate desired system behaviors. BDD emerged from test-driven development, which uses automated tests to drive development. A key BDD practice is specification by example, which involves collaboratively writing examples to illustrate requirements and then automating these examples as tests.
This document provides an overview of SQL (Structured Query Language). It covers topics such as what SQL is, the SQL process, common SQL commands, relational database concepts, different RDBMS databases that use SQL, SQL syntax, data types, operators, expressions, and how to create, manipulate and drop databases and tables using SQL statements. It also discusses SQL constraints, data integrity, database normalization forms, and provides examples of SQL queries for tasks like selecting, inserting, updating and deleting data.
This document provides an overview and introduction to SQL (Structured Query Language). It covers topics such as what SQL is, its basic commands, RDBMS concepts like database normalization, different SQL syntax like CREATE, SELECT, INSERT, and different SQL operators. It also provides examples of creating databases and tables, inserting, selecting, updating and deleting data from tables. The document is intended to give beginners a basic understanding of SQL and how it works.
W3.CSS is a CSS framework developed by w3schools.com that helps create faster, beautiful, and responsive websites. It is inspired by Google's Material Design and includes features like responsive design, standard CSS formatting, and pre-built components like grids, forms, buttons and more. The document provides an overview of W3.CSS and its features before outlining the steps to set up the environment and use various W3.CSS components to build responsive web pages.
This document provides an overview and tutorial for Microsoft Excel. It explains that Excel is a commercial spreadsheet program distributed by Microsoft for Windows and Mac OS X. It describes Excel's capabilities for calculations, data analysis, and integrating information. It outlines the audience as computer users new to Excel and the prerequisites of basic computer and file management skills. It also provides a copyright notice and table of contents for the tutorial sections to follow.
The document provides an overview of the Microsoft Excel interface, describing key elements like the File tab, Ribbon, sheet area, and status bar. It explains how to access the Backstage view in Excel 2010, which centralizes file management tasks like creating, opening, saving, and printing worksheets. The Backstage view replaces the Office button and provides options for file operations in a single location.
This document provides an overview of network security at the application layer. It discusses common application layer protocols like email, DNS, and web browsing. It describes security measures for these protocols, including PGP and S/MIME for encrypting email, DNSSEC for securing DNS queries, and SSL/TLS for securing HTTPS web browsing sessions. The goal of application layer security is to encrypt data in transit and authenticate communicating parties.
This presentation provides a detailed overview of air filter testing equipment, including its types, working principles, and industrial applications. Learn about key performance indicators such as filtration efficiency, pressure drop, and particulate holding capacity. The slides highlight standard testing methods (e.g., ISO 16890, EN 1822, ASHRAE 52.2), equipment configurations (such as aerosol generators, particle counters, and test ducts), and the role of automation and data logging in modern systems. Ideal for engineers, quality assurance professionals, and researchers involved in HVAC, automotive, cleanroom, or industrial filtration systems.
Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensi...ManiMaran230751
Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensics Process – Introduction – The
Identification Phase – The Collection Phase – The Examination Phase – The Analysis Phase – The
Presentation Phase.
DIY Gesture Control ESP32 LiteWing Drone using PythonCircuitDigest
Build a gesture-controlled LiteWing drone using ESP32 and MPU6050. This presentation explains components, circuit diagram, assembly steps, and working process.
Read more : https://circuitdigest.com/microcontroller-projects/diy-gesture-controlled-drone-using-esp32-and-python-with-litewing
Ideal for DIY drone projects, robotics enthusiasts, and embedded systems learners. Explore how to create a low-cost, ESP32 drone with real-time wireless gesture control.
Optimize Indoor Air Quality with Our Latest HVAC Air Filter Equipment Catalogue
Discover our complete range of high-performance HVAC air filtration solutions in this comprehensive catalogue. Designed for industrial, commercial, and residential applications, our equipment ensures superior air quality, energy efficiency, and compliance with international standards.
📘 What You'll Find Inside:
Detailed product specifications
High-efficiency particulate and gas phase filters
Custom filtration solutions
Application-specific recommendations
Maintenance and installation guidelines
Whether you're an HVAC engineer, facilities manager, or procurement specialist, this catalogue provides everything you need to select the right air filtration system for your needs.
🛠️ Cleaner Air Starts Here — Explore Our Finalized Catalogue Now!
Bituminous binders are sticky, black substances derived from the refining of crude oil. They are used to bind and coat aggregate materials in asphalt mixes, providing cohesion and strength to the pavement.
Better Builder Magazine brings together premium product manufactures and leading builders to create better differentiated homes and buildings that use less energy, save water and reduce our impact on the environment. The magazine is published four times a year.
Kevin Corke Spouse Revealed A Deep Dive Into His Private Life.pdfMedicoz Clinic
Kevin Corke, a respected American journalist known for his work with Fox News, has always kept his personal life away from the spotlight. Despite his public presence, details about his spouse remain mostly private. Fans have long speculated about his marital status, but Corke chooses to maintain a clear boundary between his professional and personal life. While he occasionally shares glimpses of his family on social media, he has not publicly disclosed his wife’s identity. This deep dive into his private life reveals a man who values discretion, keeping his loved ones shielded from media attention.
MODULE 5 BUILDING PLANNING AND DESIGN SY BTECH ACOUSTICS SYSTEM IN BUILDINGDr. BASWESHWAR JIRWANKAR
: Introduction to Acoustics & Green Building -
Absorption of sound, various materials, Sabine’s formula, optimum reverberation time, conditions for good acoustics Sound insulation:
Acceptable noise levels, noise prevention at its source, transmission of noise, Noise control-general considerations
Green Building: Concept, Principles, Materials, Characteristics, Applications
"The Enigmas of the Riemann Hypothesis" by Julio ChaiJulio Chai
In the vast tapestry of the history of mathematics, where the brightest minds have woven with threads of logical reasoning and flash-es of intuition, the Riemann Hypothesis emerges as a mystery that chal-lenges the limits of human understanding. To grasp its origin and signif-icance, it is necessary to return to the dawn of a discipline that, like an incomplete map, sought to decipher the hidden patterns in numbers. This journey, comparable to an exploration into the unknown, takes us to a time when mathematicians were just beginning to glimpse order in the apparent chaos of prime numbers.
Centuries ago, when the ancient Greeks contemplated the stars and sought answers to the deepest questions in the sky, they also turned their attention to the mysteries of numbers. Pythagoras and his followers revered numbers as if they were divine entities, bearers of a universal harmony. Among them, prime numbers stood out as the cornerstones of an infinite cathedral—indivisible and enigmatic—hiding their ar-rangement beneath a veil of apparent randomness. Yet, their importance in building the edifice of number theory was already evident.
The Middle Ages, a period in which the light of knowledge flick-ered in rhythm with the storms of history, did not significantly advance this quest. It was the Renaissance that restored lost splendor to mathe-matical thought. In this context, great thinkers like Pierre de Fermat and Leonhard Euler took up the torch, illuminating the path toward a deeper understanding of prime numbers. Fermat, with his sharp intuition and ability to find patterns where others saw disorder, and Euler, whose overflowing genius connected number theory with other branches of mathematics, were the architects of a new era of exploration. Like build-ers designing a bridge over an unknown abyss, their contributions laid the groundwork for later discoveries.
Structural Health and Factors affecting.pptxgunjalsachin
Structural Health- Factors affecting Health of Structures,
Causes of deterioration in RC structures-Permeability of concrete, capillary porosity, air voids, Micro cracks and macro cracks, corrosion of reinforcing bars, sulphate attack, alkali silica reaction
Causes of deterioration in Steel Structures: corrosion, Uniform deterioration, pitting, crevice, galvanic, laminar, Erosion, cavitations, fretting, Exfoliation, Stress, causes of defects in connection
Maintenance and inspection of structures.
Structural Health and Factors affecting.pptxgunjalsachin
Dbms tutorial2020
2. DBMS
i
AbouttheTutorial
Database Management System or DBMS in short refers to the technology of
storing and retrieving users’ data with utmost efficiency along with appropriate
security measures. DBMS allows its users to create their own databases as per
their requirement. These databases are highly configurable and offer a bunch of
options.
This tutorial explains the basics of DBMS such as its architecture, data models,
data schemas, data independence, E-R model, relation model, relational database
design, and storage and file structure. In addition, it covers a few advanced topics
such as indexing and hashing, transaction and concurrency, and backup and
recovery.
Audience
This tutorial will especially help computer science graduates in understanding the
basic-to-advanced concepts related to Database Management Systems.
Prerequisites
Before you start proceeding with this tutorial, it is recommended that you have a
good understanding of basic computer concepts such as primary memory,
secondary memory, and data structures and algorithms.
Copyright&Disclaimer
Copyright 2015 by Tutorials Point (I) Pvt. Ltd.
All the content and graphics published in this e-book are the property of Tutorials
Point (I) Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy,
distribute or republish any contents or a part of contents of this e-book in any
manner without written consent of the publisher.
We strive to update the contents of our website and tutorials as timely and as
precisely as possible, however, the contents may contain inaccuracies or errors.
Tutorials Point (I) Pvt. Ltd. provides no guarantee regarding the accuracy,
timeliness or completeness of our website or its contents including this tutorial. If
you discover any errors on our website or in this tutorial, please notify us at
[email protected]
3. DBMS
ii
TableofContents
About the Tutorial .....................................................................................................................................i
Audience....................................................................................................................................................i
Prerequisites..............................................................................................................................................i
Copyright & Disclaimer ..............................................................................................................................i
Table of Contents......................................................................................................................................ii
1. OVERVIEW ............................................................................................................................1
Characteristics ..........................................................................................................................................1
Users.........................................................................................................................................................2
2. ARCHITECTURE .....................................................................................................................4
3-tier Architecture ....................................................................................................................................4
3. DATA MODELS ......................................................................................................................6
Entity-Relationship Model ........................................................................................................................6
Relational Model ......................................................................................................................................7
4. DATA SCHEMAS ....................................................................................................................9
Database Schema......................................................................................................................................9
Database Instance...................................................................................................................................10
5. DATA INDEPENDENCE.........................................................................................................11
Data Independence.................................................................................................................................11
Logical Data Independence .....................................................................................................................11
Physical Data Independence ...................................................................................................................12
6. ER MODEL – BASIC CONCEPTS............................................................................................13
Entity ......................................................................................................................................................13
Attributes ...............................................................................................................................................13
4. DBMS
iii
Relationship............................................................................................................................................14
7. ER DIAGRAM REPRESENTATION..........................................................................................17
Entity ......................................................................................................................................................17
Attributes ...............................................................................................................................................17
Relationship............................................................................................................................................19
8. GENERALIZATION & SPECIALIZATION..................................................................................22
Generalization ........................................................................................................................................22
Specialization..........................................................................................................................................22
Inheritance .............................................................................................................................................23
9. CODD’S 12 RULES................................................................................................................25
Rule 1: Information Rule.........................................................................................................................25
Rule 2: Guaranteed Access Rule..............................................................................................................25
Rule 3: Systematic Treatment of NULL Values.........................................................................................25
Rule 4: Active Online Catalog..................................................................................................................25
Rule 5: Comprehensive Data Sub-Language Rule ....................................................................................25
Rule 6: View Updating Rule.....................................................................................................................26
Rule 7: High-Level Insert, Update, and Delete Rule.................................................................................26
Rule 8: Physical Data Independence........................................................................................................26
Rule 9: Logical Data Independence .........................................................................................................26
Rule 10: Integrity Independence .............................................................................................................26
Rule 11: Distribution Independence........................................................................................................26
Rule 12: Non-Subversion Rule.................................................................................................................26
10. RELATIONAL DATA MODEL..................................................................................................27
Concepts.................................................................................................................................................27
Constraints..............................................................................................................................................27
5. DBMS
iv
11. RELATIONAL ALGEBRA.........................................................................................................29
Relational Algebra ..................................................................................................................................29
Relational Calculus..................................................................................................................................31
12. ER MODEL TO RELATIONAL MODEL ....................................................................................33
Mapping Entity .......................................................................................................................................33
Mapping Relationship.............................................................................................................................34
Mapping Weak Entity Sets ......................................................................................................................34
Mapping Hierarchical Entities .................................................................................................................35
13. SQL OVERVIEW....................................................................................................................37
Data Definition Language........................................................................................................................37
Data Manipulation Language ..................................................................................................................38
14. NORMALIZATION ................................................................................................................41
Functional Dependency ..........................................................................................................................41
Armstrong's Axioms................................................................................................................................41
Trivial Functional Dependency................................................................................................................41
Normalization .........................................................................................................................................42
First Normal Form...................................................................................................................................42
Second Normal Form ..............................................................................................................................43
Third Normal Form..................................................................................................................................44
Boyce-Codd Normal Form.......................................................................................................................45
15. JOINS...................................................................................................................................46
Theta (θ) Join ..........................................................................................................................................46
Equijoin...................................................................................................................................................47
Natural Join (⋈) ......................................................................................................................................47
Outer Joins..............................................................................................................................................49
6. DBMS
v
16. STORAGE SYSTEM ...............................................................................................................52
Memory Hierarchy..................................................................................................................................52
Magnetic Disks........................................................................................................................................53
RAID........................................................................................................................................................53
17. FILE STRUCTURE..................................................................................................................56
File Organization.....................................................................................................................................56
File Operations........................................................................................................................................57
18. INDEXING............................................................................................................................59
Dense Index ............................................................................................................................................59
Sparse Index ...........................................................................................................................................60
Multilevel Index......................................................................................................................................60
B+
Tree....................................................................................................................................................61
19. HASHING.............................................................................................................................63
Hash Organization...................................................................................................................................63
Static Hashing .........................................................................................................................................63
Bucket Overflow .....................................................................................................................................64
Dynamic Hashing ....................................................................................................................................65
Organization ...........................................................................................................................................66
Operation ...............................................................................................................................................66
20. TRANSACTION.....................................................................................................................68
ACID Properties.......................................................................................................................................68
Serializability ..........................................................................................................................................69
Equivalence Schedules............................................................................................................................69
States of Transactions.............................................................................................................................71
21. CONCURRENCY CONTROL...................................................................................................72
7. DBMS
vi
Lock-based Protocols ..............................................................................................................................72
Timestamp-based Protocols....................................................................................................................74
Timestamp Ordering Protocol.................................................................................................................74
22. DEADLOCK ..........................................................................................................................76
Deadlock Prevention...............................................................................................................................76
Deadlock Avoidance................................................................................................................................77
23. DATA BACKUP .....................................................................................................................79
Loss of Volatile Storage...........................................................................................................................79
Database Backup & Recovery from Catastrophic Failure.........................................................................79
Remote Backup.......................................................................................................................................80
24. DATA RECOVERY .................................................................................................................81
Crash Recovery .......................................................................................................................................81
Failure Classification ...............................................................................................................................81
Storage Structure....................................................................................................................................82
Recovery and Atomicity..........................................................................................................................82
Log-based Recovery ................................................................................................................................83
Recovery with Concurrent Transactions..................................................................................................83
8. DBMS
7
Database is a collection of related data and data is a collection of facts and figures
that can be processed to produce information.
Mostly data represents recordable facts. Data aids in producing information, which is
based on facts. For example, if we have data about marks obtained by all students,
we can then conclude about toppers and average marks.
A database management system stores data in such a way that it becomes easier
to retrieve, manipulate, and produce information.
Characteristics
Traditionally, data was organized in file formats. DBMS was a new concept then, and
all the research was done to make it overcome the deficiencies in traditional style of
data management. A modern DBMS has the following characteristics:
Real-world entity: A modern DBMS is more realistic and uses real-world
entities to design its architecture. It uses the behavior and attributes too. For
example, a school database may use students as an entity and their age as an
attribute.
Relation-based tables: DBMS allows entities and relations among them to
form tables. A user can understand the architecture of a database just by
looking at the table names.
Isolation of data and application: A database system is entirely different
than its data. A database is an active entity, whereas data is said to be passive,
on which the database works and organizes. DBMS also stores metadata, which
is data about data, to ease its own process.
Less redundancy: DBMS follows the rules of normalization, which splits a
relation when any of its attributes is having redundancy in values.
Normalization is a mathematically rich and scientific process that reduces data
redundancy.
Consistency: Consistency is a state where every relation in a database
remains consistent. There exist methods and techniques, which can detect
attempt of leaving database in inconsistent state. A DBMS can provide greater
1. OVERVIEW
9. DBMS
8
consistency as compared to earlier forms of data storing applications like file-
processing systems.
Query Language: DBMS is equipped with query language, which makes it
more efficient to retrieve and manipulate data. A user can apply as many and
as different filtering options as required to retrieve a set of data. Traditionally
it was not possible where file-processing system was used.
ACID Properties: DBMS follows the concepts of Atomicity, Consistency,
Isolation, and Durability (normally shortened as ACID). These concepts are
applied on transactions, which manipulate data in a database. ACID properties
help the database stay healthy in multi-transactional environments and in case
of failure.
Multiuser and Concurrent Access: DBMS supports multi-user environment
and allows them to access and manipulate data in parallel. Though there are
restrictions on transactions when users attempt to handle the same data item,
but users are always unaware of them.
Multiple views: DBMS offers multiple views for different users. A user who is
in the Sales department will have a different view of database than a person
working in the Production department. This feature enables the users to have
a concentrate view of the database according to their requirements.
Security: Features like multiple views offer security to some extent where
users are unable to access data of other users and departments. DBMS offers
methods to impose constraints while entering data into the database and
retrieving the same at a later stage. DBMS offers many different levels of
security features, which enables multiple users to have different views with
different features. For example, a user in the Sales department cannot see the
data that belongs to the Purchase department. Additionally, it can also be
managed how much data of the Sales department should be displayed to the
user. Since a DBMS is not saved on the disk as traditional file systems, it is
very hard for miscreants to break the code.
Users
A typical DBMS has users with different rights and permissions who use it for different
purposes. Some users retrieve data and some back it up. The users of a DBMS can
be broadly categorized as follows:
10. DBMS
9
[Image: DBMS Users]
Administrators: Administrators maintain the DBMS and are responsible for
administrating the database. They are responsible to look after its usage and
by whom it should be used. They create access profiles for users and apply
limitations to maintain isolation and force security. Administrators also look
after DBMS resources like system license, required tools, and other software
and hardware related maintenance.
Designers: Designers are the group of people who actually work on the
designing part of the database. They keep a close watch on what data should
be kept and in what format. They identify and design the whole set of entities,
relations, constraints, and views.
End Users: End users are those who actually reap the benefits of having a
DBMS. End users can range from simple viewers who pay attention to the logs
or market rates to sophisticated users such as business analysts.
11. DBMS
10
The design of a DBMS depends on its architecture. It can be centralized or
decentralized or hierarchical. The architecture of a DBMS can be seen as either single
tier or multi-tier. An n-tier architecture divides the whole system into related but
independent n modules, which can be independently modified, altered, changed, or
replaced.
In 1-tier architecture, the DBMS is the only entity where the user directly sits on the
DBMS and uses it. Any changes done here will directly be done on the DBMS itself.
It does not provide handy tools for end-users. Database designers and programmers
normally prefer to use single-tier architecture.
If the architecture of DBMS is 2-tier, then it must have an application through which
the DBMS can be accessed. Programmers use 2-tier architecture where they access
the DBMS by means of an application. Here the application tier is entirely independent
of the database in terms of operation, design, and programming.
3-tierArchitecture
A 3-tier architecture separates its tiers from each other based on the complexity of
the users and how they use the data present in the database. It is the most widely
used architecture to design a DBMS.
2. ARCHITECTURE
12. DBMS
11
[Image: 3-tier DBMS architecture]
Database (Data) Tier: At this tier, the database resides along with its query
processing languages. We also have the relations that define the data and their
constraints at this level.
13. DBMS
12
End of ebook preview
If you liked what you saw…
Buy it from our store @ https://store.tutorialspoint.com