Week 1 |
1 |
ntroduction to Database Differences between data and information. FileBased file system Limitations of the file-based system Database Management systems. DDL & DML(Introduction) History of Database Management System. Advantages & Disadvantages of Database systems. |
|
2 |
Data Models Views Components of DBMS Environment Roles in Databases |
Week 2 |
3 |
The Three-Level ANSI-SPARC Architecture External Level, Conceptual, Internal Level. Schemas, Mapping, and instances Data Independence Database Languages Functions of a DBMS |
|
4 |
Components of a DBMS Multi-User DBMS Architecture Teleprocessing FileServer Architectures Traditional Two-Tier Client-Server Architecture ThreeTier Client-Server Architecture Transaction Processing Monitors |
Week 3 |
5 |
Relationship Types Degree of Relationship Types Recursive Relationship Attributes Simple and composite Attributes Single-Valued and Multi-Valued Attributes Derived Attributes |
|
6 |
Strong and Weak Entity Types Attributes on Relationship Structural Constraints One-toOne (1:1) Relationships Oneto-Many (1:*) Relationships Many-to-Many (*:*) Relationships Multiplicity for Complex Relationships Cardinality and Participation Constraints |
Week 4 |
7 |
Introduction to Relational Database Model A Logic View of Data Characteristics of a Relational Table |
|
8 |
Types of Keys, Relational Database keys. Integrity Rules Views Updating Views |
Week 5 |
9 |
In the relational model, keys are important because they are used to ensure that each row in a table is uniquely identifiable. They are also used to establish relationships among tables and to ensure the integrity of the data. Therefore, a proper understanding of the concept and use of keys in the relational model is very important. The keys role is based on a concept known as determination, when the statement" A determines B" indicates that if you know the value of attribute A, you can loop up (determine) the value of attribute B, for example as in table student Students will learn the Views in database systems. Views are used for security purposes because they provide encapsulation of the name of the table. Data is in the virtual table, not stored permanently. Views display only selected data. |
|
10 |
Inheritance Subtype Discriminator The Extended Entity-Relationship Mode |
Week 6 |
11 |
Introduction to SQL Objectives of SQL History of SQL Importance of SQL Terminology Writing SQL Commands Data Manipulation |
|
12 |
Simple Queries Sorting Results (ORDER BY Clause) Using the SQL Aggregate Functions Grouping Results (GROUP BY Clause) Subqueries ANY and ALL Multi-Table Queries EXISTS and NOT EXISTS Combining Result Tables |
Week 7 |
13 |
The Relational Algebra Unary Operations Set Operations |
|
14 |
Join Operations Division Operation Aggregation and Grouping Operations Summary of the Relational Algebra Operations |
Week 8 |
1 hours |
Mid Term |
Week 9 |
15 |
Cartesian /Cross Product , Joins |
|
16 |
Types of Joins (Natural, theta, outer joins) Query trees Translating relational algebra to query trees |
Week 10 |
17 |
Normalization Its Purpose (to remove redundancy) Anomalies related to Normalization Normal Forms |
|
18 |
Conversion to First Normal Form Conversion to Second Normal Form |
Week 11 |
19 |
Conversion to Third Normal Form Higher-Level Normal Forms Fourth Normal Form(4NF) |
|
20 |
Normalization and Database Design Normalization Practice |
Week 12 |
21 |
Introduction to SQL Objectives of SQL History of SQL Importance of SQL Terminology Writing SQL Commands Data Manipulation Simple Queries Sorting Results(ORDER BY Clause) |
|
22 |
Using the SQL Aggregate Functions Grouping Results (GROUP BY Clause) Subqueries ANY and ALL Multi-Table Queries EXISTS and NOT EXISTS Combining Result Tables |
Week 13 |
23 |
The Relational Algebra Unary Operations Set Operations Join Operations Division Operation |
|
24 |
Aggregation and Grouping Operations Summary of the Relational Algebra Operation |
Week 14 |
25 |
|
|
26 |
|
Week 15 |
27 |
|
|
28 |
|
Week 16 |
29 |
|
|
30 |
|
Week 17 |
2 hours |
Final Term |