SY BCS Relational Database Management System (RDBMS) Syllabus Check List-Min PDF

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Relational Database Management System (RDBMS) Syllabus Check List

---------------------------------------------------------------------------------
2. Referential Integrity □
1. PSQL
3. Introduction to database security concepts □
1. Preliminaries □ 4. Methods for database security □
Functional Dependencies a. access control method □
Basic concepts: Closure of a set of functional b. Mandatory access control and role base
Dependencies, Closure of attribute set, access control for multilevel security. □
Canonical cover, Decomposition 5. Use of views in security enforcement. □
2. PL/PgSqL: Datatypes, Language structure □ 6. Overview of encryption technique for
security. □
3. Controlling the program flow, conditional
7. Statistical db security. □
statements, loops □
4. Crash Recovery
4. Views □
1. Failure classification □
5. Stored Functions, Stored Procedures □
2. Recovery concepts □
6. Handling errors and exceptions □ 3. Log base recovery techniques (Deferred
7. Cursors □ and Immediate update) □
4. Checkpoints □
8. Triggers □ 5. Recovery with concurrent transactions
2. Transaction Concepts (Rollback, checkpoints, commit) □
6. Database backup and recovery from
1. Describe a transaction, properties of
catastrophic failure. □
transaction, state of the transaction. □
2. Executing transactions concurrently 5. Client-Server Technology
associated problem in concurrent 1. Describe client-server computing. □
execution. □ 2. Evolution of Client - Server information
3. Schedules, types of schedules, concept of systems. □
serializability, precedence graph for 3. Client – Server Architecture benefits. □
Serializability. □ 4. Client Server Architecture
4. Ensuring Serializability by locks, different a. Components, Principles, Client
lock modes, 2PL and its variations. □ Component □
5. Basic timestamp method for concurrency, b. Communication middleware component □
Thomas Write Rule. □ c. Database middleware components □
6. Locks with multiple granularity, dynamic d. Client Server Databases □
database concurrency (Phantom Problem). □
7. Timestamps versus locking. □
8. Deadlock handling methods □
a. Detection and Recovery (Wait for graph) □
b. Prevention algorithms
(Wound-wait, Wait-die) □

3. Database Security Concepts


1. Domain constraints □

---------------------------------------------------------------------------------
Data Structure Syllabus Check List
---------------------------------------------------------------------------------

-----------------------------------------------------------------------------------------------------------------------------------------------------

You might also like