Main page

Biography

Teaching

Research

Services

Other Links


Last updated: 1/02

T. Andrew Yang

Tel.: (281) 283-3835

CSCI 5333 Data Base Management System

Spring 2002 (1/14-5/6)

Week 1:  Review of Database Concepts & Architecture (Ch. 1, 2)


  1. Think about what you may have learned from the undergraduate database course:
  • Data modeling
    • ER
    • EER
    • UML
  • Database modeling 
    • network
    • hierarchical
    • relational
  • Query languages
    • SQL
    • QUEL
    • relational algebra
    • relational calculus
  • Physical database design
    • storage structure
    • access methods
  • Concurrency Control
  • Transaction management
  • Database application development using
    • Oracle
    • MS SQL Server
    • MS Access
    • MS Fox Pro
    • VMS/RDB
    • Informix
    • Ingres
    • Postgres
  • Embedded database programming using
    • C
    • C++
    • Cobol
    • Java
    • JDBC
    • ADO
  • Web database connectivity
    • Perl
    • Java servlets
    • JSP
    • PHP
    • VBscript
  • Other topics
    • Object-Oriented Databases
    • Active Databases
    • Deductive Databases
    • Data Warehousing and Data Mining
  • Others ?


Ř Go to the Index


  1. Review of Concepts
database tuples
meta data
program-operation independence
DBMS attributes
data
operation
database system records
system catalog
data models
entity Defining a database
database applications
database models
entity instance Constructing a database
database interface
stored procedures
table Manipulating a database
database programming
miniworld
relation Database queries
SQL
base tables
rows Data retrieval
embedded SQL
derived tables
columns Maintaining a database
program-data independence
views
transaction
lock
commit
2-phase commit
stored attributes
derived attributes
key attribute
composite key
relationships
schemas
schema diagrams
schema evolution
DDL
DML
host language
set-oriented DMLs


Ř Go to the Index


  1. Advantages of Using DBMS
  1. Redundancy control
  • Exercise: Summarize potential problems with redundant data.
  1. Restricting unauthorized access
  2. Pesistent storage
  3. Inferencing based on Rules
  4. Multiple User Interfaces
  5. Representing Complex Relationships Among Data
  6. Enforcing Integrity Constraints
  • Exercise: p.21: 1.11
  1. Backup & Recovery

  1. Exercises:
  1. p.21: 1.7
  2. p.21: 1.9

Ř Go to the Index



  1. The 3-Schema Architecture versus the Data Models  (pp.24-28)
schema
data model
focus
internal schema internal data model
the complete details of data storage and access paths for the database
conceptual schema high-level or implementation data model
the structure of the whole database (for a community of users)
external schema (user views)
high-level or implementation data model
Each external schema describes the part of the database that a particular user group is interested in.

  1. DBMS Component Modules

See Figure 2.3 on page 33.

  • Exercise: Examine Figure 2.3 and explain the responsibility of each of the following components:
component
responsibility
Stored data manager

Query optimizer

DDL Compiler

DML Compiler

Precompiler



  • Exercises: 
  1. p.38: 2.5
  2. p.38: 2.6

Ř Go to the Index