1. | Introduce | 데이터의 논리적인 구조 설명 Premiere Products , Database Background |
||
2. | Introduction to the Alexamara Marina Group Database Case | Objectives, Introduction, Functional Dependence, Keys | ||
3. | Database Design 1: Normalization(1) | First,Second,Third Normal Form | ||
Database Design 1: Normalization(2) | Incorrect Decompositions, Multivalued Dependencies and Fourth Normal Form, Avoiding the Problem with Multivalued Dependencies, Application to Database Design | |||
Database Design 1: Normalization(3) | Multivalued Dependencies and Fourth Normal Form, Normal Form, Summary | |||
4. | Database Design 2: Design Method(1) | Introduction, Information-Level Design Method, Represent the User View As a Collection of Tables, Normalize the Tables, Identify All Keys, Types of Primary Keys, Database Design Language (DBDL), Entity-Relationship (E-R) Diagrams | ||
5. | Database Design 2: Design Method(2) | Merge the Result into the Design, Database Design Examples, Represent the User View As a Collection of Tables, Database Design Examples |
||
Database Design 2: Design Method(3) | Physical-Level Design, Top-Down Versus Bottom-Up, Survey Form ,Obtaining Information from Existing Documents |
|||
6. | Database Design 2: Design Method(4) | One-to-One Relationship Considerations, Many-to-Many Relationship Considerations, Nulls and Entity Subtypes, Avoiding Problems with Third Normal Form When Merging Tables, The Entity-Relationship Model, Summary | ||
7. | DBMS Functions(1) | Introduction, and Retrieve Data, Provide Catalog Services | ||
DBMS Functions(2) | Support Concurrent Update, The Concurrent Problem, Avoiding the Lost Problem, Two-Phase Locking, Deadlock, Locking on PC-Based DBMSs, Timestamping, Recover Data, Journaling |
|||
DBMS Functions(3) | Deadlock, Recover Data Journaling Forward Recovery Forward Recovery(continued) Backward Recovery Backward Recovery(continued) Recovery on PC-Based DBMSs Provide Security Servic Encryption Authentication Authorizations Views Privacy |
|||
8. | DBMS Functions(4) | Provide Data Integrity Features Provide Data Integrity Features(continued) Support Data Independence Adding a Field Changing the Length of a Field Creating an Index Adding or Changing a Relationship Support Data Replication Provide Utility Services Summary Summary (continued) |
||
9. | Database Administration(1) | Introduction Database Policy Formulation and Enforcement Access Privileges Access Privileges(continued) Security Security(continued) Disaster Planning Disaster Planning(continued) |
||
Database Administration(2) | Archiving Archiving(continued) Other Database Administration Functions DBMS Evaluation and Selection DBMS Evaluation and Selection(continued) Data Dictionary Management Training Technical Functions Database design Testing Testing(continued) Performance tuning Performance tuning(continued) Summary Summary (continued) |
|||
10. | Database Management Approaches(1) | Distributed Databases Distributed Databases(continued) Replication Transparency Fragmentation Transparency Fragmentation Transparency (continued) Advantages of Distributed Databases |
||
Database Management Approaches(2) | Disadvantages of Distributed Databases Disadvantages of Distributed Databases (continued) Rules for Distributed Databases Rules for Distributed Databases (continued) Client/Server Systems Client/Server Systems (continued) Advantages of Client/Server Systems Web Access to Databases Web Access to Databases(continued) |
|||
11. | Database Management Approaches(3) | Web Access to Databases (continued) XML XML(continued) Data Warehouses Data Warehouses(continued) |
||
Database Management Approaches(4) | Data Warehouse Structure and Access Data Warehouses (continued) Data Warehouse Structure and Access(continued) Rules for OLAP Systems Rules for OLAP Systems(continued) Object-Oriented DBMSs What Is an Object-Oriented DBMS? Objects and Classes Methods and Messages Methods and Messages(continued) Inheritance Unified Modeling Language (UML) Unified Modeling Language (UML)(continued) |