Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

The University of Lahore

Department of Electronics and


Electrical Systems

Session Winter-2020
Course Name Database Management Systems
Course Code  CS06308
Instructor Muhammad Aamer
Email Muhammad.aaamer@dce.uol.edu.pk
Office CS-03 Old Building the University of Lahore
Location

Consulting Hours:

Friday 08:00 – 09:00

Saturday 09:00 – 10:00

Class Days/Time/Venue:
Wednesday 04:00 – 05:00 Room: CB-104
Friday 09:00 – 11:00 Room: CB-107

GRADING POLICY:

The weights of work assignments are listed as below:

 Assignments 10%
 Announced and surprise Quizzes 10%
 Midterm Examination 30%
 A Comprehensive Final Exam 50%

RULES:

 Students will put their cell phones in quiet/vibration mode during the lecture.
 Students will not skip the lecture and then ask the instructor to summarize the
lecture later. Office hours are for students to have questions, not for the instructor
to summarize the lecture for any specific student.
 Students will come to the class on time and leave the class at the end of the lecture.
 Student working on project or homework should report by his own and will
not share the work with other students.
 No late assignments will be entertained.

0
The University of Lahore
Department of Electronics and
Electrical Systems

Course Title: Database Management Systems Course Code:  CS06308

Course Introduction:

Developing and managing efficient and effective database applications requires


understanding the fundamentals of database management systems, techniques for the
design of databases, and principles of database administration. This course emphasized
database concepts, developments, use and management in three main sections: database
concepts, practice, and emerging trends. Relational database systems are the main focus,
but other types, including object- oriented databases, are studied. Practical design of data-
bases and developing database applications using modern software tools will be
emphasized.

CATALOG DESCRIPTION:
User interface, data independence, user view, three data models (relational, hierarchical,
network, object oriented), conceptual, logical and physical database design and evaluation,
normalization, query languages, query optimization, security, integrity and concurrency
protocols, introduction to SQL and its application to RDBMS. Database design, model
building, data table, forms & reports. Database administration.

RECOMMENDED BOOK(S):

TEXTBOOK:
R. Cononolly and P. Begg, "Database Systems: A Practical Approach to
Design, Implementation and Management", Addison Wesley, 2009

REFERENCE BOOK:
C. J. Date, "Database Systems", Addison Wesley, 8th edition

COURSE OBJECTIVES:
When this course is completed students will be able to

1. Understand the fundamentals of relational, object-oriented, and distributed database


systems including data models, database architectures, and database manipulations.
2. Understand the theories and techniques in developing database applications and be
able to demonstrate the ability to build databases using enterprise DBMS products
such as Oracle or SQL Server.
3. Be familiar with managing database systems.
4. Understand new developments and trends in databases functional behavior.

2
COURSE OUTLINE
Week Topic of Lecture

1 Introduction
Traditional File-Based Systems: File-Based Approach, Limitations of the File-
Based Approach

2 Database Approach: The Database, the Database Management System (DBMS),


(Database) Application Programs, Components of the DBMS Environment,
Database Design: The Paradigm Shift
Roles in the Database Environment: Data and Database Administrators, Database
Designers, Application Developers, End-Users
History of Database Management Systems
Advantages and Disadvantages of DBMSs
3 The Three-Level ANSI-SPARC Architecture: External Level, Conceptual Level,
Internal Level, Schemas, Mappings, and Instances, Data Independence
Database Languages: The Data Definition Language (DDL), the Data Manipulation
Language (DML), Fourth-Generation Languages (4GLs)
4 Data Models and Conceptual Modelling: Object-Based Data Models, Record-
Based Data Models, Physical Data Models, Conceptual Modelling
Functions of a DBMS
Components of a DBMS
Multi-User DBMS Architectures: Teleprocessing, File-Server Architectures,
Traditional Two-Tier Client–Server Architecture, Three-Tier Client–Server
Architecture, and Transaction Processing Monitors
5 Brief History of the Relational Model
Terminology: Relational Data Structure, Mathematical Relations, Database
Relations, Properties of Relations, Relational Keys, Representing Relational
Database Schemas
Integrity Constraints: Nulls, Entity Integrity, Referential Integrity, General
Constraints
Views: Terminology, Purpose of Views, Updating Views
6 The Information Systems Lifecycle
The Database System Development Lifecycle
Database Planning
System Definition: User Views
Requirements Collection and Analysis: Centralized Approach, View Integration
Approach
Database Design: Approaches to Database Design, Data Modelling, Phases of
Database Design
7 DBMS Selection: Selecting the DBMS
Application Design: Transaction Design, User Interface Design Guidelines
Prototyping
Implementation
Data Conversion and Loading
Testing
Operational Maintenance
CASE Tools
Data Administration and Database Administration: Data Administration,
Database Administration, Comparison of Data and Database Administration

8 When Are Fact-Finding Techniques Used?


3
What Facts Are Collected?
Fact-Finding Techniques: Examining Documentation, Interviewing, Observing the
Enterprise in Operation, Research, Questionnaires
Using Fact-Finding Techniques – A Worked Example
The DreamHome Case Study – An Overview
The DreamHome Case Study – Database Planning
The DreamHome Case Study – System Definition
The DreamHome Case Study – Requirements Collection and Analysis
The DreamHome Case Study – Database Design

9 Entity Types
Relationship Types: Degree of Relationship Type, Recursive Relationship
Attributes: Simple and Composite Attributes, Single-Valued and Multi-Valued
Attributes, Derived Attributes, Keys
Strong and Weak Entity Types
Attributes on Relationships
Structural Constraints: One-to-One (1:1) Relationships, One-to-Many (1:*)
Relationships, Many-to-Many (*:*) Relationships, Multiplicity for Complex
Relationships, Cardinality and Participation Constraints
Problems with ER Models: Fan Traps, Chasm Traps

10 Specialization/Generalization: Superclasses and Subclasses, Superclass/Subclass


Relationships, Attribute Inheritance, Specialization Process, Generalization Process,
Constraints on Specialization/Generalization, Worked Example of using
Specialization/Generalization to Model the Branch View of DreamHome Case Study
Aggregation
Composition
11 The Purpose of Normalization
How Normalization Supports Database Design
Data Redundancy and Update Anomalies: Insertion Anomalies, Deletion
Anomalies, Modification Anomalies
Functional Dependencies: Characteristics of Functional Dependencies, Identifying
Functional Dependencies, Identifying the Primary Key for a Relation using
Functional Dependencies
12 The Process of Normalization
First Normal Form (1NF)
Second Normal Form (2NF)
Third Normal Form (3NF)
General Definitions of 2NF and 3NF
13 More on Functional Dependencies: Inference Rules for Functional Dependencies,
Minimal Sets of Functional Dependencies
Boyce–Codd Normal Form (BCNF): Definition of Boyce–Codd Normal Form
Review of Normalization up to BCNF
14 Fourth Normal Form (4NF): Multi-Valued Dependency, Definition of Fourth
Normal Form
Fifth Normal Form (5NF): Lossless-Join Dependency, Definition of Fifth Normal
Form
15 Database Security: Threats
Countermeasures – Computer-Based Controls: Authorization, Access Controls,
Views, Backup and Recovery, Integrity, Encryption, RAID (Redundant Array of
Independent Disks)
Security in Microsoft Office Access DBMS
Security in Oracle DBMS
4
16 DBMSs and Web Security: Proxy Servers, Firewalls, Message Digest Algorithms
and Digital Signatures
Digital Certificates, Kerberos, Secure Sockets Layer and Secure HTTP, Secure
Electronic Transactions and Secure Transaction, Technology, Java Security, ActiveX
Security

You might also like