Presentation is loading. Please wait.

Presentation is loading. Please wait.

Summary. Chapter 9 – Triggers Integrity constraints Enforcing IC with different techniques –Keys –Foreign keys –Attribute-based constraints –Schema-based.

Similar presentations


Presentation on theme: "Summary. Chapter 9 – Triggers Integrity constraints Enforcing IC with different techniques –Keys –Foreign keys –Attribute-based constraints –Schema-based."— Presentation transcript:

1 Summary

2 Chapter 9 – Triggers Integrity constraints Enforcing IC with different techniques –Keys –Foreign keys –Attribute-based constraints –Schema-based constraints –Triggers Event, Condition, Actions Execution Triggers evaluation procedure (what is going to happen?) Important: given a constraint, know how to deal with it.

3 Chapter 11 – Physical Data Organization File storage structure –Heap file –Sorted file Performance evaluation Index (different types, we studied clustered and single level) Performance in the presence of index

4 Chapter 10 – SQL in the real world See you in the project! Host language, embedded SQL, connection, dynamic SQL …

5 Chapter 13 – Basics of Query Processing External sorting Computing projection, union, set difference Computing selection, joins

6 Chapter 16 - ODB Objects and Values Types and Domains Object relational model Object query language

7 Chapter 17 – XML and Databases XML documents Components of XML documents XML elements, attributes XML elements and objects Well-formed XML documents DTD – valid XML documents XML schema, type definition XML documents and trees XPATH – basics


Download ppt "Summary. Chapter 9 – Triggers Integrity constraints Enforcing IC with different techniques –Keys –Foreign keys –Attribute-based constraints –Schema-based."

Similar presentations


Ads by Google