Mid-term Class Review.

Slides:



Advertisements
Similar presentations
1 Datalog: Logic Instead of Algebra. 2 Datalog: Logic instead of Algebra Each relational-algebra operator can be mimicked by one or several Database Logic.
Advertisements

Chapter 10: Designing Databases
Implementing Reflective Access Control in SQL Lars E. Olson 1, Carl A. Gunter 1, William R. Cook 2, and Marianne Winslett 1 1 University of Illinois at.
Database Management Systems 1 Ramakrishnan & Gehrke Introduction to Database Systems Chapter 1 Instructor: Mirsad Hadzikadic.
Database Security CS461/ECE422 Spring Overview Database model – Relational Databases Access Control Inference and Statistical Databases Database.
Final Exam Coverage. E/R Converting E/R to Relations. SQL. –Joins and outerjoins –Subqueries –Aggregations –Views –Inserts, updates, deletes –Ordering.
Midterm Review Lecture 14b. 14 Lectures So Far 1.Introduction 2.The Relational Model 3.Disks and Files 4.Relational Algebra 5.File Org, Indexes 6.Relational.
Winter 2002Arthur Keller – CS 1808–1 Schedule Today: Jan. 29 (T) u Modifications, Schemas, Views. u Read Sections Assignment 3 due. Jan. 31 (TH)
Getting Started (Excerpts) Chapter One DAVID M. KROENKE’S DATABASE CONCEPTS, 2 nd Edition.
Introduction to Databases
Recap of Mar 4: File Organization Major concepts: –Files are made up of records; records are made up of fields –Disk blocks are smaller than files and.
Dec 15, 2003Murali Mani Transactions and Security B term 2004: lecture 17.
Cs3431 Transactions, Logging and Security. cs3431 Transactions: What and Why? A set of operations on a database must appear as one “unit”. Example: Consider.
Winter 2002Arthur Keller – CS 18011–1 Schedule Today: Feb. 7 (TH) u PL/SQL, Embedded SQL, CLI, JDBC. u Read Sections 8.1, Feb. 12 (T) Advising.
Oracle SQL*plus John Ortiz. Lecture 10SQL: Overview2 Overview  SQL: Structured Query Language, pronounced S. Q. L. or sequel.  A standard language for.
...Looking back Why use a DBMS? How to design a database? How to query a database? How does a DBMS work?
Midterm 1 Concepts Relational Algebra (DB4) SQL Querying and updating (DB5) Constraints and Triggers (DB11) Unified Modeling Language (DB9) Relational.
Introduction To Databases IDIA 618 Fall 2014 Bridget M. Blodgett.
SEMESTER 1, 2013/2014 DB2 APPLICATION DEVELOPMENT OVERVIEW.
INTRODUCTION TO TRANSACTION PROCESSING CHAPTER 21 (6/E) CHAPTER 17 (5/E)
Objectives of the Lecture :
Database System Concepts and Architecture Lecture # 3 22 June 2012 National University of Computer and Emerging Sciences.
Information storage: Introduction of database 10/7/2004 Xiangming Mu.
Database Architecture Introduction to Databases. The Nature of Data Un-structured Semi-structured Structured.
Q1: What is DBMS and explain its architecture. Q2: Explain Data Independence in detail. Q3: What is database user and explain the types of database user.
Midterm Exam Chapters 1,2,3,5, 6,7 (closed book) March 11, 2014.
ABC Insurance Co. Paul Barry Steve Randolph Jing Zhou CSC8490 Database Systems & File Management Dr. Goelman Villanova University August 2, 2004.
©Silberschatz, Korth and Sudarshan1.1Database System Concepts COMP319: Introduction Course Structure Course Assessment Review: DBMS Structure Review: Terminology.
“INTRODUCTION TO DATABASE AND SQL”. Outlines 2  Introduction To Database  Database Concepts  Database Properties  What is Database Management System.
Lecture2: Database Environment Prepared by L. Nouf Almujally 1 Ref. Chapter2 Lecture2.
Database Design Methodology. Lesson 1: Introduction to Databases.
SQL Fundamentals  SQL: Structured Query Language is a simple and powerful language used to create, access, and manipulate data and structure in the database.
Advanced Database CS-426 Week 1 - Introduction. Database Management System DBMS contains information about a particular enterprise Collection of interrelated.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 21 November 2, 2004.
DATABASE CONNECTIVITY TO MYSQL. Introduction =>A real life application needs to manipulate data stored in a Database. =>A database is a collection of.
Introduction.  Administration  Simple DBMS  CMPT 454 Topics John Edgar2.
© D. Wong Security and User Authorization in SQL 8.7 pp. 410  Authorization ID = user name  Special authorization ID: PUBLIC  Privileges for:
DBMS_Week 3-4 DBMS. Three-Schema Architecture – Internal schema (one view) describes physical storage structures access paths, indexes used Typically.
1 Announcements Reading for next week: Chapter 4 Your first homework will be assigned as soon as your database accounts have been set up.  Expect an .
Lu Chaojun, SJTU 1 Extended Relational Algebra. Bag Semantics A relation (in SQL, at least) is really a bag (or multiset). –It may contain the same tuple.
1 Advanced Database Concepts Transaction Management and Concurrency Control.
10 1 Chapter 10 - A Transaction Management Database Systems: Design, Implementation, and Management, Rob and Coronel.
Security and User Authorization in SQL. Lu Chaojun, SJTU 2 Security Two aspects: –Users only see the data they’re supposed to; –Guard against malicious.
1 10 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 10 Designing Databases.
Database System Concepts Introduction Purpose of Database Systems View of Data Data Models Data Definition Language Data Manipulation Language Transaction.
 CONACT UC:  Magnific training   
What Should a DBMS Do? Store large amounts of data Process queries efficiently Allow multiple users to access the database concurrently and safely. Provide.
ISC321 Database Systems I Chapter 2: Overview of Database Languages and Architectures Fall 2015 Dr. Abdullah Almutairi.
Intro to MIS – MGS351 Databases and Data Warehouses
CS 3630 Database Design and Implementation
SQL Environment.
Introduction to the database systems (1)
Advanced Accounting Information Systems
CS422 Principles of Database Systems Course Overview
Introduction What is a Database?.
CPSC-310 Database Systems
11/12/2018.
SQL 101.
DATABASE MANAGEMENT SYSTEM
The PROCESS of Queries John Deardurff
Final Review Topics Chapter 4 SQL,
Cse 344 June 1st – Final Review.
The PROCESS of Queries John Deardurff
Introduction of Week 13 Return assignment 11-1 and 3-1-5
Contents Preface I Introduction Lesson Objectives I-2
Lecture 30: Final Review Wednesday, December 10, 2003.
Updating Databases With Open SQL
Database SQL.
Updating Databases With Open SQL
Presentation transcript:

Mid-term Class Review

Relational DB Overview System architecture of a DBMS SQL* Normal forms (BCNF) Basic concepts and its decomposition (BCNF, 3NF, 4NF (cs710 students only)) *: Bonus question(s) available!

System Aspects of SQL Embedded SQL Call-Level Interface (CLI) JDBC Dynamic SQL Basic concepts Contrast and compare….

SQL Authorization and Transactions Privileges Grant diagram Transactions ACID properties Deep understanding of the 4 isolation levels

Alice's transaction is a query: The relation R(x) consists of a set of integers --- that is, one-component tuples with an integer component. Alice's transaction is a query: SELECT SUM(x) FROM R; COMMIT; Betty's transaction is a sequence of inserts: INSERT INTO R VALUES(10); INSERT INTO R VALUES(20); INSERT INTO R VALUES(30); Carol's transaction is a sequence of deletes: DELETE FROM R WHERE x=30; DELETE FROM R WHERE x=20; Before any of these transactions execute, the sum of the integers in R is 1000, and none of these integers are 10, 20, or 30. If Alice's, Betty's, and Carol's transactions run at about the same time, and each runs under isolation level READ COMMITTED, which sums could be produced by Alice's transaction? In order for Alice to see any of Betty's inserts, Betty must commit, which means that all three inserts are in R. Thus, Alice could compute the sum before Betty or Carol does anything, in which case she gets answer 1000, or after Betty commits but before Carol deletes anything, in which case she gets answer 1060. However, we also need to consider the timing of Carol's deletes. She could complete her deletes and commit before Betty starts, in which case Carol has no effect. She could do the deletes after Betty commits, but before Alice reads, in which case, Alice sees only 10 from among Betty's inserts and gets the answer 1010. Another possibility is that Carol starts before Betty commits, deleting 30 (which has no effect on R, since 30 is not in R, at least as far as Carol can see, since Betty has not committed the insert). Then, Betty does her inserts and commits, and Carol deletes 20, leaving 10 and 30 in R. Thus, when Alice reads, she gets the answer 1040. The only other possibility is that Carol starts after Betty commits, but does not get to commit before Alice reads. In that case, Alice cannot see Carol's deletes, and gets the answer 1060.

Object-Relational Database SQL-99 or Oracle for O-R databases. UDT Reference type Method definition Nested tables (basic concepts and operations)

Datalog Logical rules Datalog program Safe and unsafe rules …. Expressive Power of Datalog IDB, EDB Evaluating recursive rules (when no negations) Stratified Model SQL recursions (with clause, see Assignment 3)

Hard Disk Disk geometry … Block access time… Elevator algorithm, double-buffering See Assignment 3

Representing Data Elements Hierarchy of data elements Types of records: Main choices: FIXED vs VARIABLE FORMAT (SCHEMA) FIXED vs VARIABLE LENGTH