SlideShare ist ein Scribd-Unternehmen logo
1 von 53
Downloaden Sie, um offline zu lesen
Database Management System
Unit-1
Dr. K ADISESHA
Introduction
Data Abstraction
Architecture of DBMS
Data Models
Database Language
2
DATABASE CONCEPTS
Prof. K. Adisesha
Introduction
Prof. K. Adisesha
3
Definition:
➢ Data: Data is a collection of facts, numbers, letters or symbols that the computer
process into meaningful information.
➢ Information: Information is processed data, stored, or transmitted by a computer.
➢ Database: A Database is a collection of logically related data organized in a way
that data can be easily accessed, managed and updated.
➢ Record: a record (sometimes called a row) is a group of fields within a table that are
relevant to a specific entity. It contains fields such as: ID number, name, street address,
city, telephone number and so on.
Introduction
Dr. K ADISESHA
4
Difference between Manual and Computerized data processing:
Manual Data Processing Computerized Data Processing
• The volume of data, which can be
processed, is limited.
• The volume of data, which can be
processed is large
• Requires large quantity of paper • Requires less quantity of paper
• Speed and accuracy is executed is limited • Execution is Faster and Accurate
• Labor cost is high • Labor cost is low
• Storage medium is paper. • Storage medium is Hard disk etc.
Introduction
Prof. K. Adisesha
5
Traditional file-based approach:
➢ File-based approach refers to the situation where data is stored in one or more
separate computer files defined and managed by different application programs.
➢ Example, the details of customers may be stored in one file, orders in another, etc.
➢ The file-based approach might have application programs that deal with purchase
orders, invoices, sales and marketing, suppliers, customers, employees, and so on.
Introduction
Prof. K. Adisesha
6
Traditional file-based approach:
➢ Limitations:
➢ Data duplication: Each program stores its own separate files. If the same data is to be
accessed by different programs, then each program must store its own copy of the
same data.
➢ Data inconsistency: If the data is kept in different files, there could be problems when
an item of data needs updating, as it will need to be updated in all the relevant files; if
this is not done, the data will be inconsistent, and this could lead to errors.
➢ Difficult to implement data security: Data is stored in different files by different
application programs. This makes it difficult and expensive to implement
organisation-wide security procedures on the data.
Introduction
Prof. K. Adisesha
7
DBMS:
Database management systems are software systems used to manage and manipulate
data in a database.
➢ As most application performance issues originate in the database, knowing how to
monitor and optimize your database is essential to your operations..
Introduction
Prof. K. Adisesha
8
History of DBMS:
Charles Bachman’s Integrated Data Store (IDS) is said to be the first DBMS in history.
➢ History of Database Management System
❖ 1960 – Charles Bachman designed first DBMS system.
❖ 1970 – Codd introduced IBM’S Information Management System (IMS).
❖ 1976 – Peter Chen coined and defined the Entity-relationship model also know as the ER model.
❖ 1980 – Relational model becomes a widely accepted database component.
❖ 1985 – Object-oriented DBMS develops.
❖ 1990 – Incorporation of object-orientation in relational DBMS.
❖ 1991 – Microsoft ships MS access, a personal DBMS and that displaces all other personal DBMS
products.
❖ 1995 – First Internet database applications.
❖ 1997 – XML applied to database processing. Many vendors begin to integrate XML into DBMS
products.
Introduction
Prof. K. Adisesha
9
Applications of Database:
➢ Banking: For customer information, accounts and loans, and banking transactions.
➢ Colleges: For student information, course registrations and grades.
➢ Credit card transactions: For purchases on credit cards and generation of monthly
statements.
➢ Finance: For storing information about holdings, sales and purchases of financial
➢ instruments such as stocks and bonds.
➢ Telecommunication: For keeping records of call made, generating monthly bills, and
storing information about the communication networks.
➢ Voter id/Aadhar database: This is the biggest database in the world storing a data about 60
million people residing in India.
➢ Sales: For customer, product, and purchase information.
Data processing cycle
Prof. K. Adisesha
10
Data processing cycle:
The order in which information is processed in a computer information management
system is called data process cycle.
➢ To design, use and maintain the database, Data processing cycle involves.
❖ Data Collection
❖ Data Input
❖ Data Processing
❖ Data storage
❖ Output
❖ Communication
Data processing cycle
Prof. K. Adisesha
11
Data processing cycle:
To design, use and maintain the database, many peoples are involved.
➢ Data Collection: It is the process of systematic gathering of data from various sources that has been
systematically observed, recorded and organized.
➢ Data Input: The raw data is put into the computer using a keyboard, mouse or other devices such as
the scanner, microphone and the digital camera.
➢ Data Processing: Processing is the series of actions or operations on the input data to generate
outputs.
➢ Data storage: Data and information should be stored in memory so that it can be accessed later.
➢ Output: The result obtained after processing the data must be presented to the user in user
understandable form.
➢ Communication: Computers have communication ability in communication connections, data may be
transmitted as an e-mail or posted to the website where the online services are rendered.
Features of Database
Prof. K. Adisesha
12
Features or advantages of Database:
➢ Redundancy can be minimized or controlled: In DBMS environment if redundancy is
present, then it can be controlled by propagating updates in all the places where ever
redundant data is present.
➢ Data Integrity: Data Integrity refers to the correctness of the data in the database. In
other words, the data available in the database is reliable data.
➢ Data Sharing: In DBMS, data is stored in the centralized database and all the
permitted users can access the same piece of information required at the same time.
➢ Database Security: DBMS provides a variety of security mechanisms for the user to
protect his or her data stored in the database.
➢ Supports Concurrent access: DBMS supports concurrent access to the same data
stored in the database by applying locking and time stamp mechanisms.
Database users
Prof. K. Adisesha
13
Database users:
To design, use and maintain the database, many peoples are involved.
➢ The people who work with the database include:
❖ System Analysts
❖ Application programmers
❖ Database Administrators (DBA)
❖ End Users (Database Users)
Database users
Prof. K. Adisesha
14
Database users:
➢ System Analysts: System analysts determine the requirement of end users; (especially
end users), to create a solution for their business need and focus on non-technical and
technical aspects.
➢ Application programmers: These are the computer professionals who implement the
specifications given by the system analysts and develop the application programs.
➢ Database Administrators (DBA): DBA is a person who has central control over both
data and application. The responsibilities of DBA are authorization access, schema
definition and modification, software installation and security enforcement and
administration.
➢ Database users: Are those who interact with the database in order to query and update
the database, and generate reports.
Data Abstraction
Prof. K. Adisesha
15
Data Abstraction:
A major purpose of a database system is to provide users with an abstract view of the data.
➢ That is the system hides certain details of how the data are stored and maintained.
➢ There are three level of data abstraction.
❖ Physical Level( Internal level)
❖ Conceptual Level (Logical level)
❖ View Level(External level)
Data Abstraction
Prof. K. Adisesha
16
Data Abstraction:
Physical Level:
➢ It is the lowest level of abstraction that describes how the data are actually stored.
➢ The physical level describes complex low-level data structures in detail.
➢ It contains the definition of stored record and method of representing the data fields
and access aid used.
Data Abstraction
Prof. K. Adisesha
17
Data Abstraction:
Conceptual Level:
➢ It is the next higher level of abstraction that describes what data are stored in the
database and what relationships exist among those data.
➢ It also contains the method of deriving the objects in the conceptual view from the
objects in the internal view.
Data Abstraction
Prof. K. Adisesha
18
Data Abstraction:
View Level:
➢ It is the highest level of abstraction that describes only part of the entire database.
➢ It also contains the method of deriving the objects in the external view from the objects
in the conceptual view.
DBMS Architecture
Prof. K. Adisesha
19
DBMS Architecture:
The design of Database Management System highly depends on its architecture:
➢ It can be centralized or decentralized or hierarchical.
➢ Database architecture is logically divided into three types.
❖ Logical one-tier in 1-tier Architecture
❖ Logical two-tier Client/Server Architecture.
❖ Logical three-tier Client/Server Architecture.
DBMS Architecture
Prof. K. Adisesha
20
Logical one-tier in 1-tier Architecture:
DBMS is the only entity where user directly sits on DBMS and uses it.
➢ Any changes done here will directly be on DBMS itself.
➢ It does not provide handy tools for end users and preferably database designers and
programmers use single tier architecture
DBMS Architecture
Prof. K. Adisesha
21
Logical two-tier Client/Server Architecture:
Two-tier Client / Server architecture is used for User Interface program and
Application Programs that runs on client side.
➢ An interface called ODBC (Open Database Connectivity) provides an API that allows
client side program to call the DBMS.
➢ Most DBMS vendors provide ODBC drivers.
➢ A client program may connect to several DBMS's.
DBMS Architecture
Prof. K. Adisesha
22
Logical three-tier Client/Server Architecture:
Three-tier Client / Server database architecture is commonly used architecture for web
applications. Intermediate layer called Application server or Web Server stores .
➢ The web connectivity software and the business logic (constraints) part of application
used to access the right amount of data from the database server.
➢ This layer acts like medium for sending partially processed data between the database
server and the client.
DBMS Architecture
Prof. K. Adisesha
23
Logical three-tier Client/Server Architecture:
A 3-tier architecture separates its tiers from each other based on the complexity of the
users and how they use the data present in the database.
➢ Database (Data) Tier − At this tier, the database resides along with
its query processing languages
➢ Application (Middle) Tier − At this tier reside the application server
and the programs that access the database. End-users are unaware of
any existence of the database beyond the application.
➢ User (Presentation) Tier − End-users operate on this tier and they
know nothing about any existence of the database beyond this layer.
At this layer, multiple views of the database can be provided by the
application.
Database Model
Prof. K. Adisesha
24
Database Model:
Data model is a collection of conceptual tools for describing data, data relationship, data
semantics and constraints.
➢ Data model theory, which is a formal description of how data may be structured and used.
➢ Data model instance, which is a practical data model designed for a particular
application.
➢ In history of database design, three models have been in use.
❖ Hierarchical Model
❖ Network Model
❖ Relational Model
❖ Object-Oriented data model
❖ Object-Relational data Model
Database Model
Prof. K. Adisesha
25
Hierarchical data model:
The Hierarchical data model organizes data in a tree structure. In this data model, data is
represented by a collection of records and the relationships are represented by links.
➢ In this model, each entity has only one parent but can have several children.
➢ At the top of hierarchy, there is only one entity, which is called Root node.
Database Model
Prof. K. Adisesha
26
Hierarchical data model:
Advantages:
➢ Simplicity: The relationship between the various layers is logically simple.
➢ Data Security: The data security is provided by the DBMS.
➢ Data Integrity: There is always link between the parent segment and the child segment
under it.
➢ Efficiency: It is very efficient because when the database contains a large number of one
to many relationships and when the user requires large number of transaction.
Database Model
Prof. K. Adisesha
27
Hierarchical data model:
Disadvantages:
➢ Implementation complexity
➢ Database management problem
➢ Lack of structural Independence.
➢ Operational Anomalies
Database Model
Prof. K. Adisesha
28
Network data model:
In 1971, the Conference on Data Systems Languages (CODASYL) formally defined the
network models. In this model, data is represented by a collection of records and the
relationships are represented by links.
➢ Each record is collection of fields, which contains only one data value. A link is an
association between two records. In the network model, entities are organized in a graph,
in which some entities can be accessed through several paths.
Database Model
Prof. K. Adisesha
29
Network data model:
Advantages:
➢ It is simple and easy to implement.
➢ It can handle many relationships within the organization.
➢ It has better data independence compared to hierarchical model.
Disadvantages:
➢ More complex system of database structure
➢ Lack of structural dependence.
Database Model
Prof. K. Adisesha
30
Relation Data Model:
E.F Codd developed the relation data model in 1970. Unlike, hierarchical and network
model, there are no physical links. All data is maintained in the form of tables consisting
of rows and columns.
➢ Each row (record) represents an entity and a column (field) represents an attribute of the
entity.
➢ In this model, data is organized in two-dimensional tables called relations.
➢ The tables or relations are related to each other.
Database Model
Prof. K. Adisesha
31
Object oriented data model:
Object oriented data model is based upon real world situations. These situations are
represented as objects, with different attributes. All these object have multiple
relationships between them.
➢ Elements of Object oriented data model
❖ Objects: The real world entities and situations are represented as objects in the Object oriented database
model.
❖ Attributes and Method: Every object has certain characteristics. These are represented using Attributes.
The behavior of the objects is represented using Methods.
❖ Class: Similar attributes and methods are grouped together using a class. An object can be called as an
instance of the class.
❖ Inheritance: A new class can be derived from the original class. The derived class contains attributes and
methods of the original class as well as its own.
Database Model
Prof. K. Adisesha (Ph. D)
32
Object oriented data model:
Each object data and relationships are contained in a single unit. The attributes are
Name, job_title. Methods are used to perform the operation with the help of attributes.
➢ Advantages
❖ Semantic content is added.
❖ Support for complex objects.
❖ Inheritance promotes data integrity.
❖ Visual representation includes semantic content.
➢ Disadvantages
❖ It is a complex navigational system.
❖ Slow development of standards.
❖ High system overheads.
❖ Slow transactions.
Database Model
Prof. K. Adisesha
33
Object-Relational data Model:
An object-relational database (ORD) is a database management system (DBMS) that's composed
of both a relational database (RDBMS) and an object-oriented database (OODBMS).
➢ Elements of ORD supports the basic components of any object-oriented database model in
its schemas and the query language used, such as objects, classes and inheritance.
➢ One of ORD’s aims is to bridge the gap between conceptual data modeling techniques for
relational and object-oriented databases like the entity-relationship diagram (ERD) and
object-relational mapping (ORM).
➢ It also aims to connect the divide between relational databases and the object-oriented
modeling techniques that are usually used in programming languages like Java, C#,
Python and C++.
Database Model
Prof. K. Adisesha
34
Object-Relational data Model:
An object-relational database (ORD) is a database management system (DBMS) that's composed
of both a relational database (RDBMS) and an object-oriented database (OODBMS).
Database Schema
Prof. K. Adisesha
35
Database Schema:
A database schema is the skeleton structure that represents the logical view of the
entire database.
➢ It defines how the data is organized and how the relations among them are associated.
➢ It formulates all the constraints that are to be applied on the data.
➢ A database schema can be divided broadly into three categories −
❖ Logical Schema
❖ Physical Schema
❖ View Schema
Database Schema
Prof. K. Adisesha
36
Database Schema:
It contains a descriptive detail of the database, which can be depicted by means of
schema diagrams.
➢ Physical Database Schema − This schema pertains to the actual storage of data and its
form of storage like files, indices, etc. It defines how the data will be stored in a
secondary storage.
➢ Logical Database Schema − This schema defines all the logical constraints that need
to be applied on the data stored. It defines tables, views, and integrity constraints.
➢ View Schema- The view level design of a database is known as view schema. This
schema generally describes the end-user interaction with the database systems.
Data Independence
Prof. K. Adisesha
37
Data Independence:
The capacity to change data at one layer does not affect the data at another layer is
called data independence.
➢ Two types of data independence are
❖ Physical Data Independence
✓ File Organization
✓ Data Model
❖ Logical Data Independence
✓ Relational Data Model
✓ Entity Relationship
Data Independence
Prof. K. Adisesha
38
Physical data independence :
It is the capacity to change the internal level without having to change either the
schemas at the conceptual or external level.
➢ Changes to the internal schema may be needed because some physical files had to be
reorganized.
➢ Physical data independence refers to the data insulation of an application from the
physical storage structure only, it is easier to achieve than logical data independence.
➢ The physical data independence are:
❖ File Organization
❖ Database Architecture
❖ Database Models
File organization
Prof. K. Adisesha
39
File organization Methods:
The difference file organization methods are:
➢ Serial File Organization:
➢ Direct Access File Organization
➢ Index sequential file organization (ISAM)
File organization
Prof. K. Adisesha
40
File organization Methods:
The difference between serial and direct access file organization.
➢ Serial File Organization:
❖ Organization is continuous and simple.
❖ Data processing, which requires the use of all records, is best suited to use this
method.
➢ Direct Access File Organization
❖ The type of storage device used is comparatively expensive.
❖ It is less efficient in the usage of storage space compared to the sequential
organization.
File organization
Prof. K. Adisesha
41
Index sequential file organization (ISAM):
The index sequential file organization is a combination of Sequential file organization
and an Index file. It is also referred as ISAM (indexed sequential access method).
➢ Data is stored physically in adjacent storage locations and there exists a logical
relationship among the data stored by using ordering field. An additional file called as
Index file would be created, which contains n number of records.
➢ Each record of index file has two fields:
❖ The field is of the same data type as the ordering key field and
❖ The second field is a pointer to a disk block (a block address).
Database Language
Prof. K. Adisesha
42
Database Language:
A DBMS has appropriate languages and interfaces to express database queries and
updates.
➢ Database languages can be used to read, store and update the data in the database.
➢ Types of Database Language
❖ Data Definition Language (DDL)
❖ Data Manipulation Language (DML)
❖ Data Control Language (DCL)
❖ Transaction Control Language (TCL)
Database Language
Prof. K. Adisesha
43
Data Definition Language:
DDL stands for Data Definition Language. It is used to define database structure or
pattern.
➢ It is used to create schema, tables, indexes, constraints, etc. in the database.
➢ Some tasks that come under DDL:
❖ Create: It is used to create objects in the database.
❖ Alter: It is used to alter the structure of the database.
❖ Drop: It is used to delete objects from the database.
❖ Truncate: It is used to remove all records from a table.
❖ Rename: It is used to rename an object.
❖ Comment: It is used to comment on the data dictionary.
Database Language
Prof. K. Adisesha
44
Data Definition Language:
Create: It is used to create a table or a database.
➢ Syntax: CREATE DATABASE DatabaseName;
➢ Example: CREATE DATABASE Employee;
➢ The ‘CREATE TABLE’ Statement is used to create a table.
➢ Syntax Example:
CREATE TABLE TableName (
Column1 datatype,
Column2 datatype,
Column3 datatype,
.... ColumnN datatype );
ColumnN datatype );
ColumnN datatype );
CREATE TABLE Employee_Info
(
EmployeeID int,
EmployeeName varchar(255),
Emergency ContactName varchar(255),
PhoneNumber int,
Address varchar(255),
);
Database Language
Prof. K. Adisesha
45
Data Definition Language:
Drop: It is used to delete a table or a database.
➢ ‘DROP DATABASE’ Statement: Is used to drop an existing database. When you use
this statement, complete information present in the database will be lost.
❖ Syntax : DROP DATABASE DatabaseName;
❖ Example : DROP DATABASE Employee;
➢ ‘DROP TABLE’ Statement :This statement is used to drop an existing table. When you
use this statement, complete information present in the table will be lost.
❖ Syntax : DROP TABLE TableName;
❖ Example : DROP Table Employee_Info;
ColumnN datatype );
ColumnN datatype );
Database Language
Prof. K. Adisesha
46
Data Definition Language:
➢ TRUNCATE : This command is used to delete the information present in the table but does not
delete the table. So, once you use this command, your information will be lost, but not the
table.
❖ Syntax : TRUNCATE TABLE TableName;
❖ Example : TRUNCATE Table Employee_Info;
➢ ALTER : This command is used to delete, modify or add constraints or columns in an existing
table.
❖ Syntax : ALTER TABLE TableName Example: ALTER TABLE Employee_Info
ADD ColumnName Datatype; ADD BloodGroup varchar(255);
ALTER TABLE TableName Example: ALTER TABLE Employee_Info
DROP COLUMN ColumnName; DROP COLUMN BloodGroup ;
ColumnN datatype );
ColumnN datatype );
Database Language
Prof. K. Adisesha
47
Data Manipulation Language:
DML stands for Data Manipulation Language. It is used for accessing and
manipulating data in a database. It handles user requests in the database.
➢ some tasks that come under DML:
❖ Select: It is used to retrieve data from a database.
❖ Insert: It is used to insert data into a table.
❖ Update: It is used to update existing data within a table.
❖ Delete: It is used to delete all records from a table.
❖ Merge: It performs UPSERT operation, i.e., insert or update operations.
❖ Call: It is used to call a structured query language or a Java subprogram.
❖ Explain Plan: It has the parameter of explaining data.
❖ Lock Table: It controls concurrency.
Database Language
Prof. K. Adisesha
48
Data Manipulation Language:
DML stands for Data Manipulation Language. It is used for accessing and
manipulating data in a database. It handles user requests in the database.
➢ some tasks that come under DML:
❖ Select: It is used to retrieve data from a database.
SQL> Select * from students;
❖ Insert: It is used to insert data into a table.
SQL> Insert into students values(116,’SUNNY',82,85,85,83,82,93);
❖ Update: It is used to update existing data within a table.
SQL> UPDATE Students SET Perc_marks=Total/6.0 WHERE student_id>0;
❖ Delete: It is used to delete all records from a table.
SQL>DELETE from students WHERE student_id=10;
Database Language
Prof. K. Adisesha
49
Data Control Language:
DCL stands for Data Control Language. It is used to retrieve the stored or saved data.
➢ The DCL execution is transactional. It also has rollback parameters.
➢ Some tasks that come under DCL:
❖ Grant: It is used to give user access privileges to a database.
❖ Revoke: It is used to take back permissions from the user.
➢ There are the following operations which have the authorization of Revoke:
❖ CONNECT, INSERT, USAGE, EXECUTE, DELETE, UPDATE and SELECT.
Database Language
Prof. K. Adisesha
50
Transaction Control Language:
TCL is used to run the changes made by the DML statement.
➢ TCL can be grouped into a logical transaction..
➢ Some tasks that come under TCL:
❖ Commit: It is used to save the transaction on the database.
❖ Rollback: It is used to restore the database to original since the last Commit.
User-Interfaces
Prof. K. Adisesha
51
User-Interfaces:
DBMS is essentially a set of applications which support access to the databases
➢ DBMS allows its user to access the data from database using various user-interfaces
provided by DBMS:
DBMS Classification
Prof. K. Adisesha
52
Classification of DBMS:
Database management systems can be classified based on several criteria, such as
➢ The data model
❖ Traditional models
❖ Object-oriented data model
❖ Relational model
➢ Numbers of Users
❖ Single-user database system
❖ Multiuser database system
➢ Database distribution
❖ Centralized systems
❖ Distributed database system
Discussion
Prof. K. Adisesha (Ph. D)
53
Queries ?
Prof. K. Adisesha
9449081542

Weitere ähnliche Inhalte

Was ist angesagt?

Register transfer language
Register transfer languageRegister transfer language
Register transfer languageSanjeev Patel
 
system interconnect architectures in ACA
system interconnect architectures in ACAsystem interconnect architectures in ACA
system interconnect architectures in ACAPankaj Kumar Jain
 
advanced computer architesture-conditions of parallelism
advanced computer architesture-conditions of parallelismadvanced computer architesture-conditions of parallelism
advanced computer architesture-conditions of parallelismPankaj Kumar Jain
 
13. Query Processing in DBMS
13. Query Processing in DBMS13. Query Processing in DBMS
13. Query Processing in DBMSkoolkampus
 
Lecture 1 introduction to parallel and distributed computing
Lecture 1   introduction to parallel and distributed computingLecture 1   introduction to parallel and distributed computing
Lecture 1 introduction to parallel and distributed computingVajira Thambawita
 
program flow mechanisms, advanced computer architecture
program flow mechanisms, advanced computer architectureprogram flow mechanisms, advanced computer architecture
program flow mechanisms, advanced computer architecturePankaj Kumar Jain
 
bus and memory tranfer (computer organaization)
bus and memory tranfer (computer organaization)bus and memory tranfer (computer organaization)
bus and memory tranfer (computer organaization)Siddhi Viradiya
 
Computer architecture instruction formats
Computer architecture instruction formatsComputer architecture instruction formats
Computer architecture instruction formatsMazin Alwaaly
 
Register transfer language & its micro operations
Register transfer language & its micro operationsRegister transfer language & its micro operations
Register transfer language & its micro operationsLakshya Sharma
 
Distributed & parallel system
Distributed & parallel systemDistributed & parallel system
Distributed & parallel systemManish Singh
 
Computer architecture data representation
Computer architecture  data representationComputer architecture  data representation
Computer architecture data representationAnil Pokhrel
 
Unit 1-Data Science Process Overview.pptx
Unit 1-Data Science Process Overview.pptxUnit 1-Data Science Process Overview.pptx
Unit 1-Data Science Process Overview.pptxAnusuya123
 
Basic ops concept of comp
Basic ops  concept of compBasic ops  concept of comp
Basic ops concept of compgaurav jain
 
Deadlock in Distributed Systems
Deadlock in Distributed SystemsDeadlock in Distributed Systems
Deadlock in Distributed SystemsPritom Saha Akash
 
CPU Register Organization.ppt
CPU Register Organization.pptCPU Register Organization.ppt
CPU Register Organization.pptprathamgunj
 
Presentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) BasicsPresentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) BasicsKuber Chandra
 
Network hardware
Network hardwareNetwork hardware
Network hardwaresnoonan
 
2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software conceptsPrajakta Rane
 
Pipeline and data hazard
Pipeline and data hazardPipeline and data hazard
Pipeline and data hazardWaed Shagareen
 

Was ist angesagt? (20)

Register transfer language
Register transfer languageRegister transfer language
Register transfer language
 
system interconnect architectures in ACA
system interconnect architectures in ACAsystem interconnect architectures in ACA
system interconnect architectures in ACA
 
advanced computer architesture-conditions of parallelism
advanced computer architesture-conditions of parallelismadvanced computer architesture-conditions of parallelism
advanced computer architesture-conditions of parallelism
 
13. Query Processing in DBMS
13. Query Processing in DBMS13. Query Processing in DBMS
13. Query Processing in DBMS
 
Lecture 1 introduction to parallel and distributed computing
Lecture 1   introduction to parallel and distributed computingLecture 1   introduction to parallel and distributed computing
Lecture 1 introduction to parallel and distributed computing
 
program flow mechanisms, advanced computer architecture
program flow mechanisms, advanced computer architectureprogram flow mechanisms, advanced computer architecture
program flow mechanisms, advanced computer architecture
 
bus and memory tranfer (computer organaization)
bus and memory tranfer (computer organaization)bus and memory tranfer (computer organaization)
bus and memory tranfer (computer organaization)
 
Computer architecture instruction formats
Computer architecture instruction formatsComputer architecture instruction formats
Computer architecture instruction formats
 
Microoperations
MicrooperationsMicrooperations
Microoperations
 
Register transfer language & its micro operations
Register transfer language & its micro operationsRegister transfer language & its micro operations
Register transfer language & its micro operations
 
Distributed & parallel system
Distributed & parallel systemDistributed & parallel system
Distributed & parallel system
 
Computer architecture data representation
Computer architecture  data representationComputer architecture  data representation
Computer architecture data representation
 
Unit 1-Data Science Process Overview.pptx
Unit 1-Data Science Process Overview.pptxUnit 1-Data Science Process Overview.pptx
Unit 1-Data Science Process Overview.pptx
 
Basic ops concept of comp
Basic ops  concept of compBasic ops  concept of comp
Basic ops concept of comp
 
Deadlock in Distributed Systems
Deadlock in Distributed SystemsDeadlock in Distributed Systems
Deadlock in Distributed Systems
 
CPU Register Organization.ppt
CPU Register Organization.pptCPU Register Organization.ppt
CPU Register Organization.ppt
 
Presentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) BasicsPresentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) Basics
 
Network hardware
Network hardwareNetwork hardware
Network hardware
 
2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts
 
Pipeline and data hazard
Pipeline and data hazardPipeline and data hazard
Pipeline and data hazard
 

Ähnlich wie DBMS unit-1.pdf

Chapter 01 Fundamental of Database Management System (DBMS)
Chapter 01  Fundamental of Database Management System (DBMS)Chapter 01  Fundamental of Database Management System (DBMS)
Chapter 01 Fundamental of Database Management System (DBMS)Abdurehman Mahmud
 
DBS Theory Week 1 including relationships and relational database
DBS Theory Week 1 including relationships and relational databaseDBS Theory Week 1 including relationships and relational database
DBS Theory Week 1 including relationships and relational databasewalaahuluu
 
Introduction to Database Management System
Introduction to Database Management SystemIntroduction to Database Management System
Introduction to Database Management SystemAmiya9439793168
 
Introduction to Databases and Transactions
Introduction to Databases and TransactionsIntroduction to Databases and Transactions
Introduction to Databases and Transactionsنبيله نواز
 
Database Management System.pptx
Database Management System.pptxDatabase Management System.pptx
Database Management System.pptxAaravSharma743156
 
dbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfdbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfhpndegreecollegesklm
 
20MCA21_Module1.ppt
20MCA21_Module1.ppt20MCA21_Module1.ppt
20MCA21_Module1.pptAshokBP1
 
DBMS-1.pptx
DBMS-1.pptxDBMS-1.pptx
DBMS-1.pptxkingVox
 
CC105-REVIEWER-WEEK2-4.docx
CC105-REVIEWER-WEEK2-4.docxCC105-REVIEWER-WEEK2-4.docx
CC105-REVIEWER-WEEK2-4.docxozaixyzo
 
Introduction & history of dbms
Introduction & history of dbmsIntroduction & history of dbms
Introduction & history of dbmssethu pm
 
Unit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteUnit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteRaj vardhan
 

Ähnlich wie DBMS unit-1.pdf (20)

DBMS Part1.pptx
DBMS Part1.pptxDBMS Part1.pptx
DBMS Part1.pptx
 
DBMS.pptx
DBMS.pptxDBMS.pptx
DBMS.pptx
 
Chapter 01 Fundamental of Database Management System (DBMS)
Chapter 01  Fundamental of Database Management System (DBMS)Chapter 01  Fundamental of Database Management System (DBMS)
Chapter 01 Fundamental of Database Management System (DBMS)
 
Dbms
DbmsDbms
Dbms
 
DBS Theory Week 1 including relationships and relational database
DBS Theory Week 1 including relationships and relational databaseDBS Theory Week 1 including relationships and relational database
DBS Theory Week 1 including relationships and relational database
 
Introduction to Database Management System
Introduction to Database Management SystemIntroduction to Database Management System
Introduction to Database Management System
 
Dbms Useful PPT
Dbms Useful PPTDbms Useful PPT
Dbms Useful PPT
 
Data concepts
Data conceptsData concepts
Data concepts
 
Introduction to Databases and Transactions
Introduction to Databases and TransactionsIntroduction to Databases and Transactions
Introduction to Databases and Transactions
 
Database Management System.pptx
Database Management System.pptxDatabase Management System.pptx
Database Management System.pptx
 
Information Management
Information ManagementInformation Management
Information Management
 
Unit1 dbms
Unit1 dbmsUnit1 dbms
Unit1 dbms
 
Database & Database Users
Database & Database UsersDatabase & Database Users
Database & Database Users
 
dbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdfdbms Lesson for the Engineering students.pdf
dbms Lesson for the Engineering students.pdf
 
Unit1 DBMS Introduction
Unit1 DBMS IntroductionUnit1 DBMS Introduction
Unit1 DBMS Introduction
 
20MCA21_Module1.ppt
20MCA21_Module1.ppt20MCA21_Module1.ppt
20MCA21_Module1.ppt
 
DBMS-1.pptx
DBMS-1.pptxDBMS-1.pptx
DBMS-1.pptx
 
CC105-REVIEWER-WEEK2-4.docx
CC105-REVIEWER-WEEK2-4.docxCC105-REVIEWER-WEEK2-4.docx
CC105-REVIEWER-WEEK2-4.docx
 
Introduction & history of dbms
Introduction & history of dbmsIntroduction & history of dbms
Introduction & history of dbms
 
Unit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 CompleteUnit 1: Introduction to DBMS Unit 1 Complete
Unit 1: Introduction to DBMS Unit 1 Complete
 

Mehr von Prof. Dr. K. Adisesha

Software Engineering notes by K. Adisesha.pdf
Software Engineering notes by K. Adisesha.pdfSoftware Engineering notes by K. Adisesha.pdf
Software Engineering notes by K. Adisesha.pdfProf. Dr. K. Adisesha
 
Software Engineering-Unit 1 by Adisesha.pdf
Software Engineering-Unit 1 by Adisesha.pdfSoftware Engineering-Unit 1 by Adisesha.pdf
Software Engineering-Unit 1 by Adisesha.pdfProf. Dr. K. Adisesha
 
Software Engineering-Unit 2 "Requirement Engineering" by Adi.pdf
Software Engineering-Unit 2 "Requirement Engineering" by Adi.pdfSoftware Engineering-Unit 2 "Requirement Engineering" by Adi.pdf
Software Engineering-Unit 2 "Requirement Engineering" by Adi.pdfProf. Dr. K. Adisesha
 
Software Engineering-Unit 3 "System Modelling" by Adi.pdf
Software Engineering-Unit 3 "System Modelling" by Adi.pdfSoftware Engineering-Unit 3 "System Modelling" by Adi.pdf
Software Engineering-Unit 3 "System Modelling" by Adi.pdfProf. Dr. K. Adisesha
 
Software Engineering-Unit 4 "Architectural Design" by Adi.pdf
Software Engineering-Unit 4 "Architectural Design" by Adi.pdfSoftware Engineering-Unit 4 "Architectural Design" by Adi.pdf
Software Engineering-Unit 4 "Architectural Design" by Adi.pdfProf. Dr. K. Adisesha
 
Software Engineering-Unit 5 "Software Testing"by Adi.pdf
Software Engineering-Unit 5 "Software Testing"by Adi.pdfSoftware Engineering-Unit 5 "Software Testing"by Adi.pdf
Software Engineering-Unit 5 "Software Testing"by Adi.pdfProf. Dr. K. Adisesha
 
Computer Networks Notes by -Dr. K. Adisesha
Computer Networks Notes by -Dr. K. AdiseshaComputer Networks Notes by -Dr. K. Adisesha
Computer Networks Notes by -Dr. K. AdiseshaProf. Dr. K. Adisesha
 
CCN Unit-1&2 Data Communication &Networking by K. Adiaesha
CCN Unit-1&2 Data Communication &Networking by K. AdiaeshaCCN Unit-1&2 Data Communication &Networking by K. Adiaesha
CCN Unit-1&2 Data Communication &Networking by K. AdiaeshaProf. Dr. K. Adisesha
 
CCN Unit-3 Data Link Layer by Dr. K. Adisesha
CCN Unit-3 Data Link Layer by Dr. K. AdiseshaCCN Unit-3 Data Link Layer by Dr. K. Adisesha
CCN Unit-3 Data Link Layer by Dr. K. AdiseshaProf. Dr. K. Adisesha
 
CCN Unit-4 Network Layer by Dr. K. Adisesha
CCN Unit-4 Network Layer by Dr. K. AdiseshaCCN Unit-4 Network Layer by Dr. K. Adisesha
CCN Unit-4 Network Layer by Dr. K. AdiseshaProf. Dr. K. Adisesha
 
CCN Unit-5 Transport & Application Layer by Adi.pdf
CCN Unit-5 Transport & Application Layer by Adi.pdfCCN Unit-5 Transport & Application Layer by Adi.pdf
CCN Unit-5 Transport & Application Layer by Adi.pdfProf. Dr. K. Adisesha
 

Mehr von Prof. Dr. K. Adisesha (20)

Software Engineering notes by K. Adisesha.pdf
Software Engineering notes by K. Adisesha.pdfSoftware Engineering notes by K. Adisesha.pdf
Software Engineering notes by K. Adisesha.pdf
 
Software Engineering-Unit 1 by Adisesha.pdf
Software Engineering-Unit 1 by Adisesha.pdfSoftware Engineering-Unit 1 by Adisesha.pdf
Software Engineering-Unit 1 by Adisesha.pdf
 
Software Engineering-Unit 2 "Requirement Engineering" by Adi.pdf
Software Engineering-Unit 2 "Requirement Engineering" by Adi.pdfSoftware Engineering-Unit 2 "Requirement Engineering" by Adi.pdf
Software Engineering-Unit 2 "Requirement Engineering" by Adi.pdf
 
Software Engineering-Unit 3 "System Modelling" by Adi.pdf
Software Engineering-Unit 3 "System Modelling" by Adi.pdfSoftware Engineering-Unit 3 "System Modelling" by Adi.pdf
Software Engineering-Unit 3 "System Modelling" by Adi.pdf
 
Software Engineering-Unit 4 "Architectural Design" by Adi.pdf
Software Engineering-Unit 4 "Architectural Design" by Adi.pdfSoftware Engineering-Unit 4 "Architectural Design" by Adi.pdf
Software Engineering-Unit 4 "Architectural Design" by Adi.pdf
 
Software Engineering-Unit 5 "Software Testing"by Adi.pdf
Software Engineering-Unit 5 "Software Testing"by Adi.pdfSoftware Engineering-Unit 5 "Software Testing"by Adi.pdf
Software Engineering-Unit 5 "Software Testing"by Adi.pdf
 
Computer Networks Notes by -Dr. K. Adisesha
Computer Networks Notes by -Dr. K. AdiseshaComputer Networks Notes by -Dr. K. Adisesha
Computer Networks Notes by -Dr. K. Adisesha
 
CCN Unit-1&2 Data Communication &Networking by K. Adiaesha
CCN Unit-1&2 Data Communication &Networking by K. AdiaeshaCCN Unit-1&2 Data Communication &Networking by K. Adiaesha
CCN Unit-1&2 Data Communication &Networking by K. Adiaesha
 
CCN Unit-3 Data Link Layer by Dr. K. Adisesha
CCN Unit-3 Data Link Layer by Dr. K. AdiseshaCCN Unit-3 Data Link Layer by Dr. K. Adisesha
CCN Unit-3 Data Link Layer by Dr. K. Adisesha
 
CCN Unit-4 Network Layer by Dr. K. Adisesha
CCN Unit-4 Network Layer by Dr. K. AdiseshaCCN Unit-4 Network Layer by Dr. K. Adisesha
CCN Unit-4 Network Layer by Dr. K. Adisesha
 
CCN Unit-5 Transport & Application Layer by Adi.pdf
CCN Unit-5 Transport & Application Layer by Adi.pdfCCN Unit-5 Transport & Application Layer by Adi.pdf
CCN Unit-5 Transport & Application Layer by Adi.pdf
 
Introduction to Computers.pdf
Introduction to Computers.pdfIntroduction to Computers.pdf
Introduction to Computers.pdf
 
R_Programming.pdf
R_Programming.pdfR_Programming.pdf
R_Programming.pdf
 
Scholarship.pdf
Scholarship.pdfScholarship.pdf
Scholarship.pdf
 
Operating System-2 by Adi.pdf
Operating System-2 by Adi.pdfOperating System-2 by Adi.pdf
Operating System-2 by Adi.pdf
 
Operating System-1 by Adi.pdf
Operating System-1 by Adi.pdfOperating System-1 by Adi.pdf
Operating System-1 by Adi.pdf
 
Operating System-adi.pdf
Operating System-adi.pdfOperating System-adi.pdf
Operating System-adi.pdf
 
Data_structure using C-Adi.pdf
Data_structure using C-Adi.pdfData_structure using C-Adi.pdf
Data_structure using C-Adi.pdf
 
JAVA PPT -2 BY ADI.pdf
JAVA PPT -2 BY ADI.pdfJAVA PPT -2 BY ADI.pdf
JAVA PPT -2 BY ADI.pdf
 
JAVA PPT -5 BY ADI.pdf
JAVA PPT -5 BY ADI.pdfJAVA PPT -5 BY ADI.pdf
JAVA PPT -5 BY ADI.pdf
 

Kürzlich hochgeladen

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Kürzlich hochgeladen (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

DBMS unit-1.pdf

  • 2. Introduction Data Abstraction Architecture of DBMS Data Models Database Language 2 DATABASE CONCEPTS Prof. K. Adisesha
  • 3. Introduction Prof. K. Adisesha 3 Definition: ➢ Data: Data is a collection of facts, numbers, letters or symbols that the computer process into meaningful information. ➢ Information: Information is processed data, stored, or transmitted by a computer. ➢ Database: A Database is a collection of logically related data organized in a way that data can be easily accessed, managed and updated. ➢ Record: a record (sometimes called a row) is a group of fields within a table that are relevant to a specific entity. It contains fields such as: ID number, name, street address, city, telephone number and so on.
  • 4. Introduction Dr. K ADISESHA 4 Difference between Manual and Computerized data processing: Manual Data Processing Computerized Data Processing • The volume of data, which can be processed, is limited. • The volume of data, which can be processed is large • Requires large quantity of paper • Requires less quantity of paper • Speed and accuracy is executed is limited • Execution is Faster and Accurate • Labor cost is high • Labor cost is low • Storage medium is paper. • Storage medium is Hard disk etc.
  • 5. Introduction Prof. K. Adisesha 5 Traditional file-based approach: ➢ File-based approach refers to the situation where data is stored in one or more separate computer files defined and managed by different application programs. ➢ Example, the details of customers may be stored in one file, orders in another, etc. ➢ The file-based approach might have application programs that deal with purchase orders, invoices, sales and marketing, suppliers, customers, employees, and so on.
  • 6. Introduction Prof. K. Adisesha 6 Traditional file-based approach: ➢ Limitations: ➢ Data duplication: Each program stores its own separate files. If the same data is to be accessed by different programs, then each program must store its own copy of the same data. ➢ Data inconsistency: If the data is kept in different files, there could be problems when an item of data needs updating, as it will need to be updated in all the relevant files; if this is not done, the data will be inconsistent, and this could lead to errors. ➢ Difficult to implement data security: Data is stored in different files by different application programs. This makes it difficult and expensive to implement organisation-wide security procedures on the data.
  • 7. Introduction Prof. K. Adisesha 7 DBMS: Database management systems are software systems used to manage and manipulate data in a database. ➢ As most application performance issues originate in the database, knowing how to monitor and optimize your database is essential to your operations..
  • 8. Introduction Prof. K. Adisesha 8 History of DBMS: Charles Bachman’s Integrated Data Store (IDS) is said to be the first DBMS in history. ➢ History of Database Management System ❖ 1960 – Charles Bachman designed first DBMS system. ❖ 1970 – Codd introduced IBM’S Information Management System (IMS). ❖ 1976 – Peter Chen coined and defined the Entity-relationship model also know as the ER model. ❖ 1980 – Relational model becomes a widely accepted database component. ❖ 1985 – Object-oriented DBMS develops. ❖ 1990 – Incorporation of object-orientation in relational DBMS. ❖ 1991 – Microsoft ships MS access, a personal DBMS and that displaces all other personal DBMS products. ❖ 1995 – First Internet database applications. ❖ 1997 – XML applied to database processing. Many vendors begin to integrate XML into DBMS products.
  • 9. Introduction Prof. K. Adisesha 9 Applications of Database: ➢ Banking: For customer information, accounts and loans, and banking transactions. ➢ Colleges: For student information, course registrations and grades. ➢ Credit card transactions: For purchases on credit cards and generation of monthly statements. ➢ Finance: For storing information about holdings, sales and purchases of financial ➢ instruments such as stocks and bonds. ➢ Telecommunication: For keeping records of call made, generating monthly bills, and storing information about the communication networks. ➢ Voter id/Aadhar database: This is the biggest database in the world storing a data about 60 million people residing in India. ➢ Sales: For customer, product, and purchase information.
  • 10. Data processing cycle Prof. K. Adisesha 10 Data processing cycle: The order in which information is processed in a computer information management system is called data process cycle. ➢ To design, use and maintain the database, Data processing cycle involves. ❖ Data Collection ❖ Data Input ❖ Data Processing ❖ Data storage ❖ Output ❖ Communication
  • 11. Data processing cycle Prof. K. Adisesha 11 Data processing cycle: To design, use and maintain the database, many peoples are involved. ➢ Data Collection: It is the process of systematic gathering of data from various sources that has been systematically observed, recorded and organized. ➢ Data Input: The raw data is put into the computer using a keyboard, mouse or other devices such as the scanner, microphone and the digital camera. ➢ Data Processing: Processing is the series of actions or operations on the input data to generate outputs. ➢ Data storage: Data and information should be stored in memory so that it can be accessed later. ➢ Output: The result obtained after processing the data must be presented to the user in user understandable form. ➢ Communication: Computers have communication ability in communication connections, data may be transmitted as an e-mail or posted to the website where the online services are rendered.
  • 12. Features of Database Prof. K. Adisesha 12 Features or advantages of Database: ➢ Redundancy can be minimized or controlled: In DBMS environment if redundancy is present, then it can be controlled by propagating updates in all the places where ever redundant data is present. ➢ Data Integrity: Data Integrity refers to the correctness of the data in the database. In other words, the data available in the database is reliable data. ➢ Data Sharing: In DBMS, data is stored in the centralized database and all the permitted users can access the same piece of information required at the same time. ➢ Database Security: DBMS provides a variety of security mechanisms for the user to protect his or her data stored in the database. ➢ Supports Concurrent access: DBMS supports concurrent access to the same data stored in the database by applying locking and time stamp mechanisms.
  • 13. Database users Prof. K. Adisesha 13 Database users: To design, use and maintain the database, many peoples are involved. ➢ The people who work with the database include: ❖ System Analysts ❖ Application programmers ❖ Database Administrators (DBA) ❖ End Users (Database Users)
  • 14. Database users Prof. K. Adisesha 14 Database users: ➢ System Analysts: System analysts determine the requirement of end users; (especially end users), to create a solution for their business need and focus on non-technical and technical aspects. ➢ Application programmers: These are the computer professionals who implement the specifications given by the system analysts and develop the application programs. ➢ Database Administrators (DBA): DBA is a person who has central control over both data and application. The responsibilities of DBA are authorization access, schema definition and modification, software installation and security enforcement and administration. ➢ Database users: Are those who interact with the database in order to query and update the database, and generate reports.
  • 15. Data Abstraction Prof. K. Adisesha 15 Data Abstraction: A major purpose of a database system is to provide users with an abstract view of the data. ➢ That is the system hides certain details of how the data are stored and maintained. ➢ There are three level of data abstraction. ❖ Physical Level( Internal level) ❖ Conceptual Level (Logical level) ❖ View Level(External level)
  • 16. Data Abstraction Prof. K. Adisesha 16 Data Abstraction: Physical Level: ➢ It is the lowest level of abstraction that describes how the data are actually stored. ➢ The physical level describes complex low-level data structures in detail. ➢ It contains the definition of stored record and method of representing the data fields and access aid used.
  • 17. Data Abstraction Prof. K. Adisesha 17 Data Abstraction: Conceptual Level: ➢ It is the next higher level of abstraction that describes what data are stored in the database and what relationships exist among those data. ➢ It also contains the method of deriving the objects in the conceptual view from the objects in the internal view.
  • 18. Data Abstraction Prof. K. Adisesha 18 Data Abstraction: View Level: ➢ It is the highest level of abstraction that describes only part of the entire database. ➢ It also contains the method of deriving the objects in the external view from the objects in the conceptual view.
  • 19. DBMS Architecture Prof. K. Adisesha 19 DBMS Architecture: The design of Database Management System highly depends on its architecture: ➢ It can be centralized or decentralized or hierarchical. ➢ Database architecture is logically divided into three types. ❖ Logical one-tier in 1-tier Architecture ❖ Logical two-tier Client/Server Architecture. ❖ Logical three-tier Client/Server Architecture.
  • 20. DBMS Architecture Prof. K. Adisesha 20 Logical one-tier in 1-tier Architecture: DBMS is the only entity where user directly sits on DBMS and uses it. ➢ Any changes done here will directly be on DBMS itself. ➢ It does not provide handy tools for end users and preferably database designers and programmers use single tier architecture
  • 21. DBMS Architecture Prof. K. Adisesha 21 Logical two-tier Client/Server Architecture: Two-tier Client / Server architecture is used for User Interface program and Application Programs that runs on client side. ➢ An interface called ODBC (Open Database Connectivity) provides an API that allows client side program to call the DBMS. ➢ Most DBMS vendors provide ODBC drivers. ➢ A client program may connect to several DBMS's.
  • 22. DBMS Architecture Prof. K. Adisesha 22 Logical three-tier Client/Server Architecture: Three-tier Client / Server database architecture is commonly used architecture for web applications. Intermediate layer called Application server or Web Server stores . ➢ The web connectivity software and the business logic (constraints) part of application used to access the right amount of data from the database server. ➢ This layer acts like medium for sending partially processed data between the database server and the client.
  • 23. DBMS Architecture Prof. K. Adisesha 23 Logical three-tier Client/Server Architecture: A 3-tier architecture separates its tiers from each other based on the complexity of the users and how they use the data present in the database. ➢ Database (Data) Tier − At this tier, the database resides along with its query processing languages ➢ Application (Middle) Tier − At this tier reside the application server and the programs that access the database. End-users are unaware of any existence of the database beyond the application. ➢ User (Presentation) Tier − End-users operate on this tier and they know nothing about any existence of the database beyond this layer. At this layer, multiple views of the database can be provided by the application.
  • 24. Database Model Prof. K. Adisesha 24 Database Model: Data model is a collection of conceptual tools for describing data, data relationship, data semantics and constraints. ➢ Data model theory, which is a formal description of how data may be structured and used. ➢ Data model instance, which is a practical data model designed for a particular application. ➢ In history of database design, three models have been in use. ❖ Hierarchical Model ❖ Network Model ❖ Relational Model ❖ Object-Oriented data model ❖ Object-Relational data Model
  • 25. Database Model Prof. K. Adisesha 25 Hierarchical data model: The Hierarchical data model organizes data in a tree structure. In this data model, data is represented by a collection of records and the relationships are represented by links. ➢ In this model, each entity has only one parent but can have several children. ➢ At the top of hierarchy, there is only one entity, which is called Root node.
  • 26. Database Model Prof. K. Adisesha 26 Hierarchical data model: Advantages: ➢ Simplicity: The relationship between the various layers is logically simple. ➢ Data Security: The data security is provided by the DBMS. ➢ Data Integrity: There is always link between the parent segment and the child segment under it. ➢ Efficiency: It is very efficient because when the database contains a large number of one to many relationships and when the user requires large number of transaction.
  • 27. Database Model Prof. K. Adisesha 27 Hierarchical data model: Disadvantages: ➢ Implementation complexity ➢ Database management problem ➢ Lack of structural Independence. ➢ Operational Anomalies
  • 28. Database Model Prof. K. Adisesha 28 Network data model: In 1971, the Conference on Data Systems Languages (CODASYL) formally defined the network models. In this model, data is represented by a collection of records and the relationships are represented by links. ➢ Each record is collection of fields, which contains only one data value. A link is an association between two records. In the network model, entities are organized in a graph, in which some entities can be accessed through several paths.
  • 29. Database Model Prof. K. Adisesha 29 Network data model: Advantages: ➢ It is simple and easy to implement. ➢ It can handle many relationships within the organization. ➢ It has better data independence compared to hierarchical model. Disadvantages: ➢ More complex system of database structure ➢ Lack of structural dependence.
  • 30. Database Model Prof. K. Adisesha 30 Relation Data Model: E.F Codd developed the relation data model in 1970. Unlike, hierarchical and network model, there are no physical links. All data is maintained in the form of tables consisting of rows and columns. ➢ Each row (record) represents an entity and a column (field) represents an attribute of the entity. ➢ In this model, data is organized in two-dimensional tables called relations. ➢ The tables or relations are related to each other.
  • 31. Database Model Prof. K. Adisesha 31 Object oriented data model: Object oriented data model is based upon real world situations. These situations are represented as objects, with different attributes. All these object have multiple relationships between them. ➢ Elements of Object oriented data model ❖ Objects: The real world entities and situations are represented as objects in the Object oriented database model. ❖ Attributes and Method: Every object has certain characteristics. These are represented using Attributes. The behavior of the objects is represented using Methods. ❖ Class: Similar attributes and methods are grouped together using a class. An object can be called as an instance of the class. ❖ Inheritance: A new class can be derived from the original class. The derived class contains attributes and methods of the original class as well as its own.
  • 32. Database Model Prof. K. Adisesha (Ph. D) 32 Object oriented data model: Each object data and relationships are contained in a single unit. The attributes are Name, job_title. Methods are used to perform the operation with the help of attributes. ➢ Advantages ❖ Semantic content is added. ❖ Support for complex objects. ❖ Inheritance promotes data integrity. ❖ Visual representation includes semantic content. ➢ Disadvantages ❖ It is a complex navigational system. ❖ Slow development of standards. ❖ High system overheads. ❖ Slow transactions.
  • 33. Database Model Prof. K. Adisesha 33 Object-Relational data Model: An object-relational database (ORD) is a database management system (DBMS) that's composed of both a relational database (RDBMS) and an object-oriented database (OODBMS). ➢ Elements of ORD supports the basic components of any object-oriented database model in its schemas and the query language used, such as objects, classes and inheritance. ➢ One of ORD’s aims is to bridge the gap between conceptual data modeling techniques for relational and object-oriented databases like the entity-relationship diagram (ERD) and object-relational mapping (ORM). ➢ It also aims to connect the divide between relational databases and the object-oriented modeling techniques that are usually used in programming languages like Java, C#, Python and C++.
  • 34. Database Model Prof. K. Adisesha 34 Object-Relational data Model: An object-relational database (ORD) is a database management system (DBMS) that's composed of both a relational database (RDBMS) and an object-oriented database (OODBMS).
  • 35. Database Schema Prof. K. Adisesha 35 Database Schema: A database schema is the skeleton structure that represents the logical view of the entire database. ➢ It defines how the data is organized and how the relations among them are associated. ➢ It formulates all the constraints that are to be applied on the data. ➢ A database schema can be divided broadly into three categories − ❖ Logical Schema ❖ Physical Schema ❖ View Schema
  • 36. Database Schema Prof. K. Adisesha 36 Database Schema: It contains a descriptive detail of the database, which can be depicted by means of schema diagrams. ➢ Physical Database Schema − This schema pertains to the actual storage of data and its form of storage like files, indices, etc. It defines how the data will be stored in a secondary storage. ➢ Logical Database Schema − This schema defines all the logical constraints that need to be applied on the data stored. It defines tables, views, and integrity constraints. ➢ View Schema- The view level design of a database is known as view schema. This schema generally describes the end-user interaction with the database systems.
  • 37. Data Independence Prof. K. Adisesha 37 Data Independence: The capacity to change data at one layer does not affect the data at another layer is called data independence. ➢ Two types of data independence are ❖ Physical Data Independence ✓ File Organization ✓ Data Model ❖ Logical Data Independence ✓ Relational Data Model ✓ Entity Relationship
  • 38. Data Independence Prof. K. Adisesha 38 Physical data independence : It is the capacity to change the internal level without having to change either the schemas at the conceptual or external level. ➢ Changes to the internal schema may be needed because some physical files had to be reorganized. ➢ Physical data independence refers to the data insulation of an application from the physical storage structure only, it is easier to achieve than logical data independence. ➢ The physical data independence are: ❖ File Organization ❖ Database Architecture ❖ Database Models
  • 39. File organization Prof. K. Adisesha 39 File organization Methods: The difference file organization methods are: ➢ Serial File Organization: ➢ Direct Access File Organization ➢ Index sequential file organization (ISAM)
  • 40. File organization Prof. K. Adisesha 40 File organization Methods: The difference between serial and direct access file organization. ➢ Serial File Organization: ❖ Organization is continuous and simple. ❖ Data processing, which requires the use of all records, is best suited to use this method. ➢ Direct Access File Organization ❖ The type of storage device used is comparatively expensive. ❖ It is less efficient in the usage of storage space compared to the sequential organization.
  • 41. File organization Prof. K. Adisesha 41 Index sequential file organization (ISAM): The index sequential file organization is a combination of Sequential file organization and an Index file. It is also referred as ISAM (indexed sequential access method). ➢ Data is stored physically in adjacent storage locations and there exists a logical relationship among the data stored by using ordering field. An additional file called as Index file would be created, which contains n number of records. ➢ Each record of index file has two fields: ❖ The field is of the same data type as the ordering key field and ❖ The second field is a pointer to a disk block (a block address).
  • 42. Database Language Prof. K. Adisesha 42 Database Language: A DBMS has appropriate languages and interfaces to express database queries and updates. ➢ Database languages can be used to read, store and update the data in the database. ➢ Types of Database Language ❖ Data Definition Language (DDL) ❖ Data Manipulation Language (DML) ❖ Data Control Language (DCL) ❖ Transaction Control Language (TCL)
  • 43. Database Language Prof. K. Adisesha 43 Data Definition Language: DDL stands for Data Definition Language. It is used to define database structure or pattern. ➢ It is used to create schema, tables, indexes, constraints, etc. in the database. ➢ Some tasks that come under DDL: ❖ Create: It is used to create objects in the database. ❖ Alter: It is used to alter the structure of the database. ❖ Drop: It is used to delete objects from the database. ❖ Truncate: It is used to remove all records from a table. ❖ Rename: It is used to rename an object. ❖ Comment: It is used to comment on the data dictionary.
  • 44. Database Language Prof. K. Adisesha 44 Data Definition Language: Create: It is used to create a table or a database. ➢ Syntax: CREATE DATABASE DatabaseName; ➢ Example: CREATE DATABASE Employee; ➢ The ‘CREATE TABLE’ Statement is used to create a table. ➢ Syntax Example: CREATE TABLE TableName ( Column1 datatype, Column2 datatype, Column3 datatype, .... ColumnN datatype ); ColumnN datatype ); ColumnN datatype ); CREATE TABLE Employee_Info ( EmployeeID int, EmployeeName varchar(255), Emergency ContactName varchar(255), PhoneNumber int, Address varchar(255), );
  • 45. Database Language Prof. K. Adisesha 45 Data Definition Language: Drop: It is used to delete a table or a database. ➢ ‘DROP DATABASE’ Statement: Is used to drop an existing database. When you use this statement, complete information present in the database will be lost. ❖ Syntax : DROP DATABASE DatabaseName; ❖ Example : DROP DATABASE Employee; ➢ ‘DROP TABLE’ Statement :This statement is used to drop an existing table. When you use this statement, complete information present in the table will be lost. ❖ Syntax : DROP TABLE TableName; ❖ Example : DROP Table Employee_Info; ColumnN datatype ); ColumnN datatype );
  • 46. Database Language Prof. K. Adisesha 46 Data Definition Language: ➢ TRUNCATE : This command is used to delete the information present in the table but does not delete the table. So, once you use this command, your information will be lost, but not the table. ❖ Syntax : TRUNCATE TABLE TableName; ❖ Example : TRUNCATE Table Employee_Info; ➢ ALTER : This command is used to delete, modify or add constraints or columns in an existing table. ❖ Syntax : ALTER TABLE TableName Example: ALTER TABLE Employee_Info ADD ColumnName Datatype; ADD BloodGroup varchar(255); ALTER TABLE TableName Example: ALTER TABLE Employee_Info DROP COLUMN ColumnName; DROP COLUMN BloodGroup ; ColumnN datatype ); ColumnN datatype );
  • 47. Database Language Prof. K. Adisesha 47 Data Manipulation Language: DML stands for Data Manipulation Language. It is used for accessing and manipulating data in a database. It handles user requests in the database. ➢ some tasks that come under DML: ❖ Select: It is used to retrieve data from a database. ❖ Insert: It is used to insert data into a table. ❖ Update: It is used to update existing data within a table. ❖ Delete: It is used to delete all records from a table. ❖ Merge: It performs UPSERT operation, i.e., insert or update operations. ❖ Call: It is used to call a structured query language or a Java subprogram. ❖ Explain Plan: It has the parameter of explaining data. ❖ Lock Table: It controls concurrency.
  • 48. Database Language Prof. K. Adisesha 48 Data Manipulation Language: DML stands for Data Manipulation Language. It is used for accessing and manipulating data in a database. It handles user requests in the database. ➢ some tasks that come under DML: ❖ Select: It is used to retrieve data from a database. SQL> Select * from students; ❖ Insert: It is used to insert data into a table. SQL> Insert into students values(116,’SUNNY',82,85,85,83,82,93); ❖ Update: It is used to update existing data within a table. SQL> UPDATE Students SET Perc_marks=Total/6.0 WHERE student_id>0; ❖ Delete: It is used to delete all records from a table. SQL>DELETE from students WHERE student_id=10;
  • 49. Database Language Prof. K. Adisesha 49 Data Control Language: DCL stands for Data Control Language. It is used to retrieve the stored or saved data. ➢ The DCL execution is transactional. It also has rollback parameters. ➢ Some tasks that come under DCL: ❖ Grant: It is used to give user access privileges to a database. ❖ Revoke: It is used to take back permissions from the user. ➢ There are the following operations which have the authorization of Revoke: ❖ CONNECT, INSERT, USAGE, EXECUTE, DELETE, UPDATE and SELECT.
  • 50. Database Language Prof. K. Adisesha 50 Transaction Control Language: TCL is used to run the changes made by the DML statement. ➢ TCL can be grouped into a logical transaction.. ➢ Some tasks that come under TCL: ❖ Commit: It is used to save the transaction on the database. ❖ Rollback: It is used to restore the database to original since the last Commit.
  • 51. User-Interfaces Prof. K. Adisesha 51 User-Interfaces: DBMS is essentially a set of applications which support access to the databases ➢ DBMS allows its user to access the data from database using various user-interfaces provided by DBMS:
  • 52. DBMS Classification Prof. K. Adisesha 52 Classification of DBMS: Database management systems can be classified based on several criteria, such as ➢ The data model ❖ Traditional models ❖ Object-oriented data model ❖ Relational model ➢ Numbers of Users ❖ Single-user database system ❖ Multiuser database system ➢ Database distribution ❖ Centralized systems ❖ Distributed database system
  • 53. Discussion Prof. K. Adisesha (Ph. D) 53 Queries ? Prof. K. Adisesha 9449081542