Home Database Management System : MBA-247

Database Management System : MBA-247

Lecture No.DescriptionLecture By
Lecture 1 Purpose, Advantages and Disadvantages of DBMSLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 2 Data ModelsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 3 Schemas and Instances,Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 4  DBMS Architecture and Data Independence,Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 5 Types of DBMS – Hierarchical, Network, Relational, Object-Oriented and Object Relational.Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 6 ER-Model: Basic conceptsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 7 Design IssuesLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 8 Mapping ConstraintsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 9 Keys, E-R Diagram, :Design of an ER Database SchemaLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 10 Reduction of E-R Schema to TablesLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 11  SQL: Background, Basic Structure, Set OperationsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 12 Aggregate Functions, Null ValuesLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 13  Nested Sub Queries, Derived RelationsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 14 Views, Modification of Database, Joined RelationsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 15  Data Definition Language,Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 16 Domain Constraints, Referential Integrity.Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 17 Oracle: Basic Architecture, Data DefinitionLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 18 Data Manipulation (LIKE Operator, String Commands, Numeric Function, Date Function, Translate and Decode )Lecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 19  Introduction to PL/SQLLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 20 Conditional, Logic, Loops, Go to StatementsLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 21 Exceptional Handling, Triggers, Procedures, Functions, Cursor, LOB’sLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 22 Relational AlgebraLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 23 Functional Dependencies, Normal forms NF1, NF2, NF3 and BCNFLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 24 Multi valued Dependencies and Fourth Normal FormLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 25 Join Dependencies and Fifth Normal FormLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 26  Transaction, Concurrency: ACID PropertiesLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 27 Transaction State, Locks, Deadlock ConditionLecture by ,    Lecture by ,    Lecture by ,    Lecture by
Lecture 28 Two- Phase Locking ProtocolLecture by ,    Lecture by ,    Lecture by ,    Lecture by
[whatsapp]