Lecture No. | Description | Lecture By |
---|---|---|
Lecture 1 | Purpose, Advantages and Disadvantages of DBMS | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 2 | Data Models | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 3 | Schemas and Instances, | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 4 | DBMS Architecture and Data Independence, | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 5 | Types of DBMS – Hierarchical, Network, Relational, Object-Oriented and Object Relational. | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 6 | ER-Model: Basic concepts | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 7 | Design Issues | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 8 | Mapping Constraints | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 9 | Keys, E-R Diagram, :Design of an ER Database Schema | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 10 | Reduction of E-R Schema to Tables | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 11 | SQL: Background, Basic Structure, Set Operations | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 12 | Aggregate Functions, Null Values | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 13 | Nested Sub Queries, Derived Relations | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 14 | Views, Modification of Database, Joined Relations | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 15 | Data Definition Language, | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 16 | Domain Constraints, Referential Integrity. | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 17 | Oracle: Basic Architecture, Data Definition | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 18 | Data Manipulation (LIKE Operator, String Commands, Numeric Function, Date Function, Translate and Decode ) | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 19 | Introduction to PL/SQL | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 20 | Conditional, Logic, Loops, Go to Statements | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 21 | Exceptional Handling, Triggers, Procedures, Functions, Cursor, LOB’s | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 22 | Relational Algebra | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 23 | Functional Dependencies, Normal forms NF1, NF2, NF3 and BCNF | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 24 | Multi valued Dependencies and Fourth Normal Form | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 25 | Join Dependencies and Fifth Normal Form | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 26 | Transaction, Concurrency: ACID Properties | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 27 | Transaction State, Locks, Deadlock Condition | Lecture by , Lecture by , Lecture by , Lecture by |
Lecture 28 | Two- Phase Locking Protocol | Lecture by , Lecture by , Lecture by , Lecture by |