Sunteți pe pagina 1din 7

 15

 19

 Mr ARBIND SHARMAA50504918001

 Home
 My Calendar
 My Courses
 Registration
 Time Table
 My Faculty
 Examination
 Student Document
 FeeDetails
 Gssc Registration
 Suggetion Box
 Register for Wifi
 Hostel
 Achievement
 BloodDonation
 Withdrawal
 Logout
 Home

 My Courses

My Courses
Semester 2

Courses

Course Course
Course Name Type
Code Syllabus

IFT2219 COMPUTER ORGANIZATION & ARCHITECTURE Compulsory

IFT2211 DATA STRUCTURE THROUGH C LANGUAGE Compulsory

IFT2216 DATA STRUCTURES USING C PLUS PLUS LANGUAGE LAB Compulsory

IFT2222 DISCRETE MATHEMATICS STRUCTURES WITH Compulsory


APPLICATION TO CS

IFT2202 INTRODUCTION TO DATABASE MANAGEMENT SYSTEM Compulsory

IFT2223 INTRODUCTION TO DATABASE MANAGEMENT SYSTEM Compulsory


LAB

CSS2251 PRESENTATION SKILLS Compulsory

BEH2251 PROBLEM SOLVING & CREATIVE THINKING Compulsory

IFT2217 WEB TECHNOLOGIES Compulsory

IFT2220 WEB TECHNOLOGIES LAB Compulsory


Courses

Course Course
Course Name Type
Code Syllabus

LAN2255 CHINESE-II FBL

Flexi

Course
Group Name Subject Name
Code

HUMAN LAW2252 SYSTEMS ORGANISATIONS AND INSTRUMENTS OF HUMAN


RIGHTS RIGHTS

© Amizone
For any technical issue, please write to amizone@amity.edu
×
Session Plan

Course Name : INTRODUCTION TO DATABASE


MANAGEMENT SYSTEM

Session Plan :
Sno Session Plan Session Plan Topic Section M
Header Plan
Type

1 Introduction to Definition of DBMS, Data Independence, DBMS Architecture, Levels, Lecture


DBMS Database Administrator, File System Approach Vs DBMS Approach,
Advantages of Using a DBMS, Data Models , Schemas, and Instances.

2 Definition of DBMS, Data Independence, DBMS Architecture, Levels, Lecture


Database Administrator, File System Approach Vs DBMS Approach,
Advantages of Using a DBMS, Data Models , Schemas, and Instances.

3 Definition of DBMS, Data Independence, DBMS Architecture, Levels, Lecture


Database Administrator, File System Approach Vs DBMS Approach,
Advantages of Using a DBMS, Data Models , Schemas, and Instances.

4 Definition of DBMS, Data Independence, DBMS Architecture, Levels, Lecture


Database Administrator, File System Approach Vs DBMS Approach,
Advantages of Using a DBMS, Data Models , Schemas, and Instances.

5 Definition of DBMS, Data Independence, DBMS Architecture, Levels, Lecture


Database Administrator, File System Approach Vs DBMS Approach,
Advantages of Using a DBMS, Data Models , Schemas, and Instances.

6 Definition of DBMS, Data Independence, DBMS Architecture, Levels, Lecture


Database Administrator, File System Approach Vs DBMS Approach,
Advantages of Using a DBMS, Data Models , Schemas, and Instances.

7 Relational Relational System, Codd’s Rule, Relational Model, Optimization, Lecture


Database & ER Tables and Views, Entity, Types of Entity, Weak Entity Attributes ,
Model Entity sets , Entity – Relationship Diagrams.

8 Relational System, Codd’s Rule, Relational Model, Optimization, Lecture


Tables and Views, Entity, Types of Entity, Weak Entity Attributes ,
Entity sets , Entity – Relationship Diagrams.

9 Relational System, Codd’s Rule, Relational Model, Optimization, Lecture


Tables and Views, Entity, Types of Entity, Weak Entity Attributes ,
Entity sets , Entity – Relationship Diagrams.

10 Relational System, Codd’s Rule, Relational Model, Optimization, Lecture


Tables and Views, Entity, Types of Entity, Weak Entity Attributes ,
Entity sets , Entity – Relationship Diagrams.

11 Relational System, Codd’s Rule, Relational Model, Optimization, Lecture


Tables and Views, Entity, Types of Entity, Weak Entity Attributes ,
Entity sets , Entity – Relationship Diagrams.
12 Relational System, Codd’s Rule, Relational Model, Optimization, Lecture
Tables and Views, Entity, Types of Entity, Weak Entity Attributes ,
Entity sets , Entity – Relationship Diagrams.

13 Relational Domains and Relations, Relations and predicates, Relational Data Lecture
Model Objects Integrity ; Primary Key, Candidate Key , Foreign Key and their rules;
Relational operators, Relational Algebra, Relational Calculus, SQL
Language, Data definition, Data retrieval and update operations.

14 Domains and Relations, Relations and predicates, Relational Data Lecture


Integrity ; Primary Key, Candidate Key , Foreign Key and their rules;
Relational operators, Relational Algebra, Relational Calculus, SQL
Language, Data definition, Data retrieval and update operations.

15 Domains and Relations, Relations and predicates, Relational Data Lecture


Integrity ; Primary Key, Candidate Key , Foreign Key and their rules;
Relational operators, Relational Algebra, Relational Calculus, SQL
Language, Data definition, Data retrieval and update operations.

16 Domains and Relations, Relations and predicates, Relational Data Lecture


Integrity ; Primary Key, Candidate Key , Foreign Key and their rules;
Relational operators, Relational Algebra, Relational Calculus, SQL
Language, Data definition, Data retrieval and update operations.

17 Domains and Relations, Relations and predicates, Relational Data Lecture


Integrity ; Primary Key, Candidate Key , Foreign Key and their rules;
Relational operators, Relational Algebra, Relational Calculus, SQL
Language, Data definition, Data retrieval and update operations.

18 Domains and Relations, Relations and predicates, Relational Data Lecture


Integrity ; Primary Key, Candidate Key , Foreign Key and their rules;
Relational operators, Relational Algebra, Relational Calculus, SQL
Language, Data definition, Data retrieval and update operations.

19 Database Design Definition Of Functional Dependencies, Process Of Normalization, First Lecture


Normal Form, Second Normal Form, Third Normal Form. Boycee Codd
Normal Form, Fourth Normal Form, Fifth Normal Form.

20 Definition Of Functional Dependencies, Process Of Normalization, First Lecture


Normal Form, Second Normal Form, Third Normal Form. Boycee Codd
Normal Form, Fourth Normal Form, Fifth Normal Form.

21 Definition Of Functional Dependencies, Process Of Normalization, First Lecture


Normal Form, Second Normal Form, Third Normal Form. Boycee Codd
Normal Form, Fourth Normal Form, Fifth Normal Form.

22 Definition Of Functional Dependencies, Process Of Normalization, First Lecture


Normal Form, Second Normal Form, Third Normal Form. Boycee Codd
Normal Form, Fourth Normal Form, Fifth Normal Form.

23 Definition Of Functional Dependencies, Process Of Normalization, First Lecture


Normal Form, Second Normal Form, Third Normal Form. Boycee Codd
Normal Form, Fourth Normal Form, Fifth Normal Form.

24 Definition Of Functional Dependencies, Process Of Normalization, First Lecture


Normal Form, Second Normal Form, Third Normal Form. Boycee Codd
Normal Form, Fourth Normal Form, Fifth Normal Form.

25 Definition Of Functional Dependencies, Process Of Normalization, First Lecture


Normal Form, Second Normal Form, Third Normal Form. Boycee Codd
Normal Form, Fourth Normal Form, Fifth Normal Form.

26 Definition Of Functional Dependencies, Process Of Normalization, First Lecture


Normal Form, Second Normal Form, Third Normal Form. Boycee Codd
Normal Form, Fourth Normal Form, Fifth Normal Form.

27 Data Recovery Recovery-Transaction recovery, System recovery, Media Recovery, Lecture


& Protection Concurrency Control Techniques, Locking, Dead Lock, Serializability;
Security - Introduction.

28 Recovery-Transaction recovery, System recovery, Media Recovery, Lecture


Concurrency Control Techniques, Locking, Dead Lock, Serializability;
Security - Introduction.

29 Recovery-Transaction recovery, System recovery, Media Recovery, Lecture


Concurrency Control Techniques, Locking, Dead Lock, Serializability;
Security - Introduction.
30 Recovery-Transaction recovery, System recovery, Media Recovery, Lecture
Concurrency Control Techniques, Locking, Dead Lock, Serializability;
Security - Introduction.

31 Recovery-Transaction recovery, System recovery, Media Recovery, Lecture


Concurrency Control Techniques, Locking, Dead Lock, Serializability;
Security - Introduction.

32 Recovery-Transaction recovery, System recovery, Media Recovery, Lecture


Concurrency Control Techniques, Locking, Dead Lock, Serializability;
Security - Introduction.

33 Recovery-Transaction recovery, System recovery, Media Recovery, Lecture


Concurrency Control Techniques, Locking, Dead Lock, Serializability;
Security - Introduction.

34 Recovery-Transaction recovery, System recovery, Media Recovery, Lecture


Concurrency Control Techniques, Locking, Dead Lock, Serializability;
Security - Introduction.

35 Recovery-Transaction recovery, System recovery, Media Recovery, Lecture


Concurrency Control Techniques, Locking, Dead Lock, Serializability;
Security - Introduction.

36 Recovery-Transaction recovery, System recovery, Media Recovery, Lecture


Concurrency Control Techniques, Locking, Dead Lock, Serializability;
Security - Introduction.

Close

S-ar putea să vă placă și