About the Authors |
|
xxvii | |
About the Technical Reviewers |
|
xxix | |
Acknowledgments |
|
xxxi | |
Preface |
|
xxxiii | |
Part A: Preliminary Topics |
|
1 | (34) |
|
Chapter 1 Introduction to Database Systems |
|
|
3 | (12) |
|
1.1 Definitions and Rationale |
|
|
3 | (3) |
|
1.2 Objectives of a Database System |
|
|
6 | (2) |
|
1.2.1 Primary and Secondary Objectives |
|
|
6 | (1) |
|
1.2.2 Clarification on Data Independence |
|
|
7 | (1) |
|
1.3 Advantages of a Database System |
|
|
8 | (1) |
|
1.4 Approaches to Database Design |
|
|
8 | (2) |
|
|
9 | (1) |
|
|
10 | (1) |
|
1.5 Desirable Features of a DBS |
|
|
10 | (1) |
|
1.6 Database Development Life Cycle |
|
|
11 | (1) |
|
1.7 Summary and Concluding Remarks |
|
|
12 | (1) |
|
|
13 | (1) |
|
1.9 References and/or Recommended Readings |
|
|
13 | (2) |
|
Chapter 2 The Database System Environment |
|
|
15 | (20) |
|
2.1 Levels of Architecture |
|
|
15 | (3) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (3) |
|
2.3.1 Database Administrator and Data Architect |
|
|
18 | (1) |
|
|
19 | (1) |
|
2.3.3 Application Programmer |
|
|
19 | (1) |
|
2.3.4 User Liaison Specialist |
|
|
20 | (1) |
|
2.3.5 Network and Infrastructure Specialist |
|
|
20 | (1) |
|
2.4 The Database Management System |
|
|
21 | (2) |
|
2.5 Components of DBMS Suite |
|
|
23 | (3) |
|
|
24 | (1) |
|
2.5.2 Data Definition Subsystem |
|
|
24 | (1) |
|
2.5.3 The User Interface Subsystem |
|
|
24 | (1) |
|
2.5.4 Application Development Subsystem |
|
|
25 | (1) |
|
2.5.5 Data Administration Subsystem |
|
|
25 | (1) |
|
2.5.6 Data Dictionary Subsystem |
|
|
25 | (1) |
|
2.5.7 Data Communications Manager |
|
|
25 | (1) |
|
2.5.8 Utilities Subsystem |
|
|
26 | (1) |
|
2.6 Front-End and Back-End Perspectives |
|
|
26 | (1) |
|
2.7 Database System Architecture |
|
|
27 | (3) |
|
2.8 Database Management System Classifications |
|
|
30 | (1) |
|
2.8.1 Classification Based on Data Models |
|
|
30 | (1) |
|
2.8.2 Classification Based on Number of Users |
|
|
30 | (1) |
|
2.8.3 Classification Based on Site Configuration |
|
|
30 | (1) |
|
2.8.4 Classification Based on Database Purpose |
|
|
31 | (1) |
|
2.9 Summary and Concluding Remarks |
|
|
31 | (1) |
|
|
32 | (1) |
|
2.11 References and/or Recommended Readings |
|
|
33 | (2) |
Part B: The Relational Database Model |
|
35 | (168) |
|
Chapter 3 The Relational Model |
|
|
37 | (36) |
|
|
37 | (3) |
|
|
40 | (2) |
|
|
42 | (2) |
|
3.3.1 Properties of a Relation |
|
|
43 | (1) |
|
|
43 | (1) |
|
3.4 Relational Database System |
|
|
44 | (1) |
|
3.5 Identifying Relationships |
|
|
44 | (2) |
|
3.6 Representing Relationships |
|
|
46 | (9) |
|
3.6.1 The Entity-Relationship Model |
|
|
46 | (6) |
|
3.6.2 The Object-Relationship Model |
|
|
52 | (1) |
|
3.6.3 Summary of Traditional Models |
|
|
52 | (2) |
|
3.6.4 Multiplicity of Relationships |
|
|
54 | (1) |
|
3.7 Implementing Relationships |
|
|
55 | (4) |
|
3.8 Innovation: Relation-Attributes List and Relationship List |
|
|
59 | (5) |
|
3.9 Database Naming Convention |
|
|
64 | (5) |
|
3.10 Summary and Concluding Remarks |
|
|
69 | (1) |
|
|
70 | (1) |
|
3.12 References and/or Recommended Readings |
|
|
71 | (2) |
|
Chapter 4 Integrity Rules and Normalization |
|
|
73 | (28) |
|
4.1 Fundamental Integrity Rules |
|
|
73 | (1) |
|
|
74 | (2) |
|
4.3 Rationale for Normalization |
|
|
76 | (1) |
|
4.4 Functional Dependence and Non-Loss Decomposition |
|
|
77 | (4) |
|
4.4.1 Functional Dependence |
|
|
77 | (1) |
|
4.4.2 Non-Loss Decomposition |
|
|
78 | (3) |
|
|
81 | (2) |
|
4.5.1 Problems with Relations in 1NF Only |
|
|
81 | (2) |
|
|
83 | (1) |
|
4.6.1 Problems with Relations in 2NF Only |
|
|
83 | (1) |
|
|
84 | (1) |
|
4.7.1 Problems with Relations in 3NF Only |
|
|
84 | (1) |
|
4.8 Boyce-Codd Normal Form |
|
|
85 | (1) |
|
|
86 | (3) |
|
4.9.1 Multi-Valued Dependency |
|
|
87 | (1) |
|
|
87 | (2) |
|
|
89 | (1) |
|
|
89 | (3) |
|
4.10.1 Definition of Join Dependency |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (2) |
|
|
94 | (3) |
|
4.12.1 The Domain-Key Normal Form |
|
|
94 | (1) |
|
4.12.2 The Sixth Normal Form |
|
|
95 | (2) |
|
4.13 Summary and Concluding Remarks |
|
|
97 | (2) |
|
|
99 | (1) |
|
4.15 References and/or Recommended Readings |
|
|
100 | (1) |
|
Chapter 5 Database Modeling and Design |
|
|
101 | (38) |
|
5.1 The Database Model and Database Design |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
5.2 The E-R Model Revisited |
|
|
102 | (4) |
|
5.3 Database Design via the E-R Model |
|
|
106 | (1) |
|
5.4 The Extended Relational Model |
|
|
106 | (7) |
|
5.4.1 Entity Classifications |
|
|
106 | (1) |
|
|
107 | (2) |
|
5.4.3 E-Relations and P-Relations |
|
|
109 | (3) |
|
|
112 | (1) |
|
5.5 Database Design via the XR Model |
|
|
113 | (6) |
|
5.5.1 Determining the Kernel Entities |
|
|
113 | (1) |
|
5.5.2 Determining the Characteristic Entities |
|
|
113 | (1) |
|
5.5.3 Determining the Designative Entities |
|
|
114 | (1) |
|
5.5.4 Determining the Associations |
|
|
115 | (1) |
|
5.5.5 Determining Entity Subtypes and Super-types |
|
|
116 | (1) |
|
5.5.6 Determining Component Entities |
|
|
117 | (1) |
|
5.5.7 Determining Additional Properties |
|
|
117 | (2) |
|
5.5.8 Additional Applications of the XR Model |
|
|
119 | (1) |
|
|
119 | (3) |
|
5.7 Database Design via the UML Model |
|
|
122 | (1) |
|
5.8 Innovation: The Object/Entity Specification Grid |
|
|
123 | (4) |
|
5.9 Database Design via Normalization Theory |
|
|
127 | (5) |
|
5.9.1 Example: Mountaineering Problem |
|
|
127 | (3) |
|
5.9.2 Determining Candidate Keys and then Normalizing |
|
|
130 | (2) |
|
5.10 Database Model and Design Tools |
|
|
132 | (2) |
|
5.11 Summary and Concluding Remarks |
|
|
134 | (1) |
|
|
135 | (1) |
|
5.13 References and/or Recommended Readings |
|
|
136 | (3) |
|
Chapter 6 Database User Interface Design |
|
|
139 | (16) |
|
|
139 | (2) |
|
6.2 Deciding on the User Interface |
|
|
141 | (1) |
|
6.3 Steps in the User Interface Design |
|
|
142 | (3) |
|
6.3.1 Menu or Graphical User Interface |
|
|
142 | (3) |
|
6.3.2 Command-Based User Interface |
|
|
145 | (1) |
|
6.4 User Interface Development and Implementation |
|
|
145 | (7) |
|
6.5 Summary and Concluding Remarks |
|
|
152 | (1) |
|
|
152 | (1) |
|
6.7 References and/or Recommend Readings |
|
|
153 | (2) |
|
Chapter 7 Relational Algebra |
|
|
155 | (26) |
|
|
155 | (1) |
|
7.2 Basic Operations of Relational Algebra |
|
|
156 | (1) |
|
7.2.1 Primary and Secondary Operations |
|
|
157 | (1) |
|
7.2.2 Codd's Original Classification of Operations |
|
|
157 | (1) |
|
|
157 | (1) |
|
7.3 Syntax of Relational Algebra |
|
|
157 | (17) |
|
|
162 | (1) |
|
7.3.2 Projection Statement |
|
|
163 | (1) |
|
7.3.3 Natural Join Statement |
|
|
164 | (2) |
|
|
166 | (1) |
|
|
167 | (3) |
|
7.3.6 Inner and Outer Joins |
|
|
170 | (2) |
|
7.3.7 Union, Intersection, and Difference Statements |
|
|
172 | (1) |
|
|
173 | (1) |
|
7.4 Aliases, Renaming, and the Relational Assignment |
|
|
174 | (2) |
|
7.4.1 The Alias Operation |
|
|
174 | (1) |
|
7.4.2 The Assignment Operation |
|
|
175 | (1) |
|
7.4.3 The Rename Operation |
|
|
175 | (1) |
|
|
176 | (1) |
|
7.6 Summary and Concluding Remarks |
|
|
177 | (1) |
|
|
178 | (1) |
|
7.8 References and/or Recommended Readings |
|
|
179 | (2) |
|
Chapter 8 Relational Calculus |
|
|
181 | (14) |
|
|
181 | (2) |
|
8.2 Calculus Notations and Illustrations |
|
|
183 | (2) |
|
8.3 Quantifiers, Free and Bound Variables |
|
|
185 | (4) |
|
8.3.1 Well-Formed Formula |
|
|
186 | (1) |
|
8.3.2 Free and Bound Variables |
|
|
186 | (3) |
|
8.4 Substitution Rule and Standardization Rules |
|
|
189 | (1) |
|
8.5 Introductory Query Optimization |
|
|
189 | (3) |
|
8.6 Domain-Oriented Relational Calculus |
|
|
192 | (1) |
|
8.7 Summary and Concluding Remarks |
|
|
192 | (1) |
|
|
193 | (1) |
|
8.9 References and/or Recommended Readings |
|
|
193 | (2) |
|
Chapter 9 Reflective Look at the Relational Database Model |
|
|
195 | (8) |
|
9.1 The Relational Model Summarized |
|
|
195 | (1) |
|
9.2 Ramifications of the Relational Model |
|
|
196 | (4) |
|
9.2.1 Codd's Early Benchmark |
|
|
196 | (1) |
|
9.2.2 Revised Definition of a Relational System |
|
|
197 | (3) |
|
9.2.3 Far-Reaching Consequences |
|
|
200 | (1) |
|
9.3 Summary and Concluding Remarks |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
201 | (2) |
Part C: The Structured Query Language |
|
203 | (144) |
|
Chapter 10 Overview of SQL |
|
|
205 | (6) |
|
|
205 | (2) |
|
10.1.1 Commonly Used DDL Statements |
|
|
205 | (2) |
|
10.1.2 Commonly Used DML and DCL Statements |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
10.3 Summary and Concluding Remarks |
|
|
208 | (1) |
|
|
208 | (1) |
|
10.5 Recommended Readings |
|
|
209 | (2) |
|
Chapter 11 SQL Data Definition Statements |
|
|
211 | (38) |
|
11.1 Overview of Oracle's SQL Environment |
|
|
212 | (1) |
|
11.2 Basic Concepts in a Typical Oracle Database Environment |
|
|
213 | (2) |
|
|
215 | (4) |
|
|
219 | (4) |
|
|
223 | (3) |
|
11.6 Tablespace Management |
|
|
226 | (2) |
|
|
228 | (6) |
|
11.8 Dropping or Modifying a Table |
|
|
234 | (2) |
|
11.9 Working with Indexes |
|
|
236 | (8) |
|
11.10 Working with Sequences |
|
|
244 | (2) |
|
11.10.1 Creating and Using Sequences |
|
|
244 | (1) |
|
11.10.2 Altering and Dropping Sequences |
|
|
245 | (1) |
|
11.11 Working with Synonyms |
|
|
246 | (1) |
|
11.12 Summary and Concluding Remarks |
|
|
247 | (1) |
|
|
247 | (1) |
|
11.14 References and/or Recommended Readings |
|
|
248 | (1) |
|
Chapter 12 SQL Data Manipulation Statements |
|
|
249 | (56) |
|
|
249 | (3) |
|
|
252 | (3) |
|
|
255 | (1) |
|
12.4 Commit and Rollback Operations |
|
|
256 | (2) |
|
12.5 Basic Syntax for Queries |
|
|
258 | (3) |
|
|
261 | (2) |
|
12.7 Queries Involving Multiple Tables |
|
|
263 | (4) |
|
12.7.1 The Traditional Method |
|
|
263 | (3) |
|
|
266 | (1) |
|
12.8 Queries Involving the Use of Functions |
|
|
267 | (13) |
|
|
268 | (2) |
|
|
270 | (2) |
|
12.8.3 Data Conversion Functions |
|
|
272 | (2) |
|
12.8.4 Programmer-Defined Functions |
|
|
274 | (1) |
|
12.8.5 Aggregation Functions |
|
|
275 | (4) |
|
12.8.6 Analytic Functions |
|
|
279 | (1) |
|
12.9 Queries Using the LIKE and BETWEEN Operators |
|
|
280 | (1) |
|
|
281 | (4) |
|
12.10.1 Nested Queries Involving Use of the IN Operator |
|
|
282 | (1) |
|
12.10.2 Nested Queries Involving use of ANY or ALL Operator |
|
|
283 | (2) |
|
12.10.3 Nested Queries Using the Existential Quantifier |
|
|
285 | (1) |
|
12.11 Queries Involving Set Operations |
|
|
285 | (2) |
|
12.12 Queries with Runtime Variables |
|
|
287 | (1) |
|
12.13 Queries Involving SQL*Plus Format Commands |
|
|
288 | (1) |
|
|
289 | (6) |
|
|
295 | (6) |
|
12.16 Summary and Concluding Remarks |
|
|
301 | (2) |
|
|
303 | (1) |
|
12.18 References and/or Recommended Readings |
|
|
303 | (2) |
|
Chapter 13 Logical Views and System Security |
|
|
305 | (22) |
|
13.1 Traditional Logical Views |
|
|
305 | (4) |
|
|
306 | (2) |
|
13.1.2 View Modification and Removal |
|
|
308 | (1) |
|
13.1.3 Usefulness and Manipulation of Logical Views |
|
|
309 | (1) |
|
|
309 | (11) |
|
13.2.1 Access to the System |
|
|
310 | (4) |
|
13.2.2 Access to the System Resources |
|
|
314 | (3) |
|
13.2.3 Access to the System Data |
|
|
317 | (3) |
|
|
320 | (4) |
|
13.3.1 Creating a Materialized View |
|
|
320 | (2) |
|
13.3.2 Altering or Dropping a Materialized View |
|
|
322 | (2) |
|
13.4 Summary and Concluding Remarks |
|
|
324 | (1) |
|
|
324 | (1) |
|
13.6 References and/or Recommended Readings |
|
|
325 | (2) |
|
Chapter 14 The System Catalog |
|
|
327 | (12) |
|
|
327 | (1) |
|
14.2 Three Important Catalog Tables |
|
|
328 | (3) |
|
14.2.1 The User Tables View |
|
|
328 | (1) |
|
14.2.2 The User_Tab_Columns View |
|
|
329 | (1) |
|
14.2.3 The User Indexes View |
|
|
329 | (2) |
|
14.3 Other Important Catalog Tables |
|
|
331 | (3) |
|
14.4 Querying the System Catalog |
|
|
334 | (2) |
|
14.5 Updating the System Catalog |
|
|
336 | (1) |
|
14.6 Summary and Concluding Remarks |
|
|
337 | (1) |
|
|
338 | (1) |
|
14.8 References and/or Recommended Readings |
|
|
338 | (1) |
|
Chapter 15 Some Limitations of SQL |
|
|
339 | (8) |
|
15.1 Programming Limitations |
|
|
339 | (1) |
|
15.2 Limitations on Views |
|
|
339 | (2) |
|
15.2.1 Restriction on Use of the Order-By Clause for Earlier Versions of SQL |
|
|
340 | (1) |
|
15.2.2 Restriction on Data Manipulation for Views involving UNION, INTERSECT, or JOIN |
|
|
340 | (1) |
|
15.2.3 Restriction on the Use of Aggregation Functions for Earlier Versions of SQL |
|
|
341 | (1) |
|
15.3 Stringent Enforcement of Referential Integrity |
|
|
341 | (2) |
|
15.4 Limitations on Calculated Columns |
|
|
343 | (1) |
|
|
344 | (1) |
|
15.6 Summary and Concluding Remarks |
|
|
344 | (1) |
|
|
345 | (1) |
|
15.8 Recommended Readings |
|
|
345 | (2) |
Part D: Advanced Topics |
|
347 | (86) |
|
Chapter 16 Database Administration |
|
|
349 | (12) |
|
16.1 Database Installation, Creation, and Configuration |
|
|
349 | (1) |
|
|
350 | (1) |
|
|
350 | (1) |
|
16.4 Database Backup and Recovery |
|
|
351 | (4) |
|
16.4.1 Oracle Backups: Basic Concept |
|
|
351 | (1) |
|
16.4.2 Oracle Recovery: Basic Concept |
|
|
352 | (1) |
|
|
352 | (1) |
|
|
353 | (1) |
|
16.4.5 Basic Recovery Steps |
|
|
354 | (1) |
|
16.4.6 Oracle's Backup and Recovery Solutions |
|
|
354 | (1) |
|
|
355 | (3) |
|
|
355 | (1) |
|
16.5.2 Tuning Methodology |
|
|
356 | (2) |
|
|
358 | (1) |
|
16.7 Summary and Concluding Remarks |
|
|
358 | (1) |
|
|
359 | (1) |
|
16.9 References and/or Recommended Readings |
|
|
359 | (2) |
|
Chapter 17 Distributed Database Systems |
|
|
361 | (10) |
|
|
361 | (1) |
|
17.2 Advantages of Distributed Database Systems |
|
|
362 | (1) |
|
17.3 12 Rules for Distributed Database Systems |
|
|
363 | (2) |
|
17.4 Challenges to Distributed Database Systems |
|
|
365 | (2) |
|
17.4.1 Query Optimization |
|
|
365 | (1) |
|
17.4.2 Catalog Management |
|
|
365 | (1) |
|
17.4.3 Update Propagation |
|
|
366 | (1) |
|
|
366 | (1) |
|
17.4.5 Transaction Management |
|
|
367 | (1) |
|
|
367 | (1) |
|
17.6 The Future of Distributed Database Systems |
|
|
368 | (1) |
|
|
368 | (1) |
|
17.6.2 Electronic Communication Systems |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
17.7 Summary and Concluding Remarks |
|
|
369 | (1) |
|
|
370 | (1) |
|
17.9 References and/or Recommended Readings |
|
|
370 | (1) |
|
Chapter 18 Object Databases |
|
|
371 | (6) |
|
|
371 | (2) |
|
18.2 Overview of Object-Oriented Database Management Systems |
|
|
373 | (1) |
|
18.3 Challenges for Object-Oriented Database Management Systems |
|
|
374 | (1) |
|
|
375 | (1) |
|
18.5 Summary and Concluding Remarks |
|
|
375 | (1) |
|
|
376 | (1) |
|
18.7 References and/or Recommended Readings |
|
|
376 | (1) |
|
Chapter 19 Data Warehousing |
|
|
377 | (14) |
|
|
377 | (2) |
|
|
378 | (1) |
|
19.1.2 Acquiring a Data Warehouse |
|
|
378 | (1) |
|
19.2 Rationale for Data Warehousing |
|
|
379 | (1) |
|
19.3 Characteristics of a Data Warehouse |
|
|
380 | (4) |
|
19.3.1 Definitive Features |
|
|
380 | (1) |
|
19.3.2 Nature of Data Stored |
|
|
380 | (1) |
|
19.3.3 Processing Requirements |
|
|
381 | (2) |
|
19.3.4 12 Rules for Data Warehousing |
|
|
383 | (1) |
|
19.4 Data Warehouse Architecture |
|
|
384 | (3) |
|
19.4.1 Basic Data Warehouse Architecture |
|
|
384 | (1) |
|
19.4.2 Data Warehouse Architecture with a Staging Area |
|
|
384 | (1) |
|
19.4.3 Data Warehouse Architecture with a Staging Area and Data Marts |
|
|
385 | (2) |
|
19.5 Extraction, Transformation, and Loading |
|
|
387 | (1) |
|
19.5.1 What Happens During the ETL Process |
|
|
387 | (1) |
|
|
387 | (1) |
|
19.5.3 Daily Operations and Expansion of the Data Warehouse |
|
|
388 | (1) |
|
19.6 Summary and Concluding Remarks |
|
|
388 | (1) |
|
|
389 | (1) |
|
19.8 References and/or Recommended Readings |
|
|
390 | (1) |
|
Chapter 20 Web-Accessible Databases |
|
|
391 | (12) |
|
|
391 | (1) |
|
20.2 Web-Accessible Database Architecture |
|
|
392 | (1) |
|
20.3 Supporting Technologies |
|
|
393 | (2) |
|
20.4 Implementation with Selected DBMS Suites |
|
|
395 | (2) |
|
20.4.1 Implementation via Oracle |
|
|
395 | (1) |
|
20.4.2 Implementation via DB2 |
|
|
396 | (1) |
|
20.4.3 Implementation via MySQL |
|
|
397 | (1) |
|
20.5 Generic Implementation via Front-End and Back-End Tools |
|
|
397 | (1) |
|
20.6 Challenges and Opportunities |
|
|
398 | (2) |
|
20.6.1 Cloud Computing and Big Data |
|
|
398 | (1) |
|
|
399 | (1) |
|
20.7 Summary and Concluding Remarks |
|
|
400 | (1) |
|
|
400 | (1) |
|
20.9 References and/or Recommended Readings |
|
|
401 | (2) |
|
Chapter 21 Using Database Systems to Anchor Management Support Systems |
|
|
403 | (30) |
|
21.1 Overview of Management Support Systems |
|
|
403 | (1) |
|
21.2 Building System Security Through Database Design |
|
|
404 | (1) |
|
21.3 Case Study: Dynamic Menu Interface Designer |
|
|
405 | (14) |
|
21.3.1 Database Requirements of the DMID |
|
|
406 | (6) |
|
21.3.2 Overview of the DMID's User Interface Requirements |
|
|
412 | (1) |
|
21.3.3 Management of System Constraints via the DMID |
|
|
413 | (2) |
|
21.3.4 Access to System Resources |
|
|
415 | (4) |
|
21.3.5 Usefulness and Applicability of the DMID |
|
|
419 | (1) |
|
21.4 Selected MSS Project Ideas |
|
|
419 | (10) |
|
21.4.1 Electoral Management System |
|
|
419 | (1) |
|
21.4.2 Health Information Management System |
|
|
420 | (1) |
|
21.4.3 Strategic Education Management System |
|
|
421 | (1) |
|
21.4.4 Flight Information Management System |
|
|
422 | (1) |
|
21.4.5 Financial Information Management System |
|
|
422 | (1) |
|
21.4.6 Disease Recognition System |
|
|
423 | (1) |
|
21.4.7 Cognitive Leadership Analysis System |
|
|
424 | (2) |
|
21.4.8 Financial Status Assessment System |
|
|
426 | (1) |
|
21.4.9 College/University Administrative Information System |
|
|
427 | (2) |
|
21.5 Summary and Concluding Remarks |
|
|
429 | (2) |
|
|
431 | (1) |
|
21.7 References and/or Recommended Readings |
|
|
431 | (2) |
Part E: Overview of Selected DBMS Suites |
|
433 | (36) |
|
Chapter 22 Overview of Oracle |
|
|
435 | (8) |
|
|
435 | (2) |
|
22.2 Main Components of the Oracle Suite |
|
|
437 | (3) |
|
|
437 | (1) |
|
22.2.2 Oracle PL/SQL and SQL*Plus |
|
|
438 | (1) |
|
22.2.3 Oracle Developer Suite |
|
|
438 | (1) |
|
22.2.4 Oracle Enterprise Manager Database Control and SQL Developer |
|
|
439 | (1) |
|
22.2.5 Oracle Enterprise Manager Grid Control |
|
|
439 | (1) |
|
22.2.6 Oracle Database Configuration Assistant |
|
|
439 | (1) |
|
22.2.7 Oracle Warehouse Builder |
|
|
439 | (1) |
|
22.3 Shortcomings of Oracle |
|
|
440 | (1) |
|
22.4 Summary and Concluding Remarks |
|
|
441 | (1) |
|
|
441 | (1) |
|
22.6 References and/or Recommended Readings |
|
|
442 | (1) |
|
Chapter 23 Overview of DB2 |
|
|
443 | (8) |
|
|
443 | (2) |
|
23.2 Main Components of the DB2 Suite |
|
|
445 | (4) |
|
23.2.1 DB2 Universal Database Core |
|
|
446 | (1) |
|
23.2.2 Command Line Processor Plus (CLPPlus) |
|
|
447 | (1) |
|
23.2.3 IBM InfoSphere Information Server |
|
|
447 | (1) |
|
|
448 | (1) |
|
23.2.5 IBM InfoSphere Warehouse |
|
|
449 | (1) |
|
|
449 | (1) |
|
23.4 Summary and Concluding Remarks |
|
|
450 | (1) |
|
|
450 | (1) |
|
23.6 References and/or Recommended Readings |
|
|
450 | (1) |
|
Chapter 24 Overview of MySQL |
|
|
451 | (10) |
|
24.1 Introduction to MySQL |
|
|
451 | (3) |
|
24.2 Main Features of MySQL |
|
|
454 | (2) |
|
24.3 Main Components of MySQL |
|
|
456 | (1) |
|
24.4 Alternate Storage Engines |
|
|
457 | (1) |
|
24.5 Shortcomings of MySQL |
|
|
457 | (3) |
|
24.5.1 Limitations on Logical Views |
|
|
458 | (1) |
|
24.5.2 Limitations on Subqueries |
|
|
458 | (1) |
|
24.5.3 Limitation on Server-Side Cursors |
|
|
459 | (1) |
|
|
459 | (1) |
|
24.6 Summary and Concluding Remarks |
|
|
460 | (1) |
|
|
460 | (1) |
|
24.8 References and/or Recommended Readings |
|
|
460 | (1) |
|
Chapter 25 Overview of Microsoft SQL Server |
|
|
461 | (8) |
|
|
461 | (1) |
|
|
461 | (1) |
|
25.1.2 Operating Environment |
|
|
462 | (1) |
|
25.1.3 Microsoft SQL Server Editions |
|
|
462 | (1) |
|
25.2 Main Features of Microsoft SQL Server |
|
|
462 | (1) |
|
25.3 Main Components of Microsoft SQL Server Suite |
|
|
463 | (3) |
|
|
463 | (1) |
|
|
464 | (1) |
|
|
464 | (1) |
|
25.3.4 Client Connectivity |
|
|
465 | (1) |
|
|
465 | (1) |
|
25.4 Shortcomings of Microsoft SQL Server |
|
|
466 | (1) |
|
25.5 Summary and Concluding Remarks |
|
|
467 | (1) |
|
|
467 | (1) |
|
25.7 References and/or Recommended Readings |
|
|
467 | (2) |
Part F: Appendices |
|
469 | (128) |
|
Appendix A1: Review of Trees |
|
|
471 | (34) |
|
A1.1 Introduction to Trees |
|
|
471 | (1) |
|
|
472 | (15) |
|
A1.2.1 Overview of Binary Trees |
|
|
472 | (3) |
|
A1.2.2 Representation of Binary Trees |
|
|
475 | (1) |
|
A1.2.3 Application of Binary Trees |
|
|
476 | (1) |
|
A1.2.4 Operations on Binary Trees |
|
|
476 | (1) |
|
A1.2.5 Implementation of Binary Trees |
|
|
476 | (6) |
|
A1.2.6 Binary Tree Traversals |
|
|
482 | (3) |
|
A1.2.7 Using Binary Trees to Evaluate Expressions |
|
|
485 | (2) |
|
A1.3 Threaded Binary Trees |
|
|
487 | (1) |
|
|
488 | (3) |
|
A1.5 Height-Balanced Trees |
|
|
491 | (1) |
|
|
492 | (3) |
|
|
492 | (1) |
|
A1.6.2 Processing the Heap (Heap-Sort) |
|
|
493 | (2) |
|
A1.7 M-Way Search Trees and B-Trees |
|
|
495 | (7) |
|
A1.7.1 Definition of B-Tree |
|
|
497 | (2) |
|
A1.7.2 Implementation of the B-tree |
|
|
499 | (3) |
|
A1.8 Summary and Concluding Remarks |
|
|
502 | (1) |
|
A1.9 References and/or Recommended Readings |
|
|
503 | (2) |
|
Appendix A2: Review of Hashing |
|
|
505 | (18) |
|
|
505 | (1) |
|
|
506 | (4) |
|
A2.2.1 Absolute Addressing |
|
|
506 | (1) |
|
A2.2.2 Direct Table Lookup |
|
|
506 | (2) |
|
A2.2.3 Division-Remainder |
|
|
508 | (1) |
|
|
508 | (1) |
|
|
509 | (1) |
|
|
509 | (1) |
|
A2.2.7 Treating Alphanumeric Key Values |
|
|
510 | (1) |
|
A2.3 Collision Resolution |
|
|
510 | (3) |
|
|
510 | (1) |
|
|
511 | (2) |
|
|
513 | (1) |
|
|
513 | (9) |
|
A2.5 Summary and Concluding Remarks |
|
|
522 | (1) |
|
A2.6 References and/or Recommended Readings |
|
|
522 | (1) |
|
Appendix A3: Review of Information-Gathering Techniques |
|
|
523 | (16) |
|
A3.1 Rationale for Information Gathering |
|
|
523 | (2) |
|
|
525 | (2) |
|
A3.2.1 Steps in Planning the Interview |
|
|
525 | (1) |
|
A3.2.2 Basic Guidelines for Interviews |
|
|
525 | (2) |
|
A3.3 Questionnaires and Surveys |
|
|
527 | (1) |
|
A3.3.1 Guidelines for Questionnaires |
|
|
527 | (1) |
|
A3.3.2 Using Scales in Questionnaires |
|
|
527 | (1) |
|
A3.3.3 Administering the Questionnaire |
|
|
528 | (1) |
|
|
528 | (4) |
|
A3.4.1 Probability Sampling Techniques |
|
|
529 | (1) |
|
A3.4.2 Non-Probability Sampling Techniques |
|
|
529 | (1) |
|
A3.4.3 Sample Calculations |
|
|
529 | (3) |
|
A3.5 Observation and Document Review |
|
|
532 | (1) |
|
|
532 | (1) |
|
|
533 | (1) |
|
A3.8 Object Identification |
|
|
533 | (4) |
|
A3.8.1 The Descriptive Narrative Approach |
|
|
534 | (1) |
|
A3.8.2 The Rule-of-Thumb Approach |
|
|
535 | (2) |
|
A3.9 Summary and Concluding Remarks |
|
|
537 | (1) |
|
A3.10 References and/or Recommended Readings |
|
|
538 | (1) |
|
Appendix A4: BNF Syntax for Selected SQL Statements |
|
|
539 | (46) |
|
|
540 | (5) |
|
A4.1.1 Syntax for Create-Database Statement |
|
|
540 | (1) |
|
A4.1.2 Syntax for Alter-Database Statement |
|
|
541 | (4) |
|
A4.2 Tablespace Management |
|
|
545 | (2) |
|
A4.2.1 Syntax for Create-Tablespace Statement |
|
|
545 | (1) |
|
A4.2.2 Syntax for Alter-Tablespace Statement |
|
|
546 | (1) |
|
|
547 | (15) |
|
A4.3.1 Syntax for Create-Table Statement |
|
|
547 | (8) |
|
A4.3.2 Syntax for Alter-Table Statement |
|
|
555 | (7) |
|
|
562 | (4) |
|
A4.4.1 Syntax for Create-Index Statement |
|
|
562 | (2) |
|
A4.4.2 Syntax for After-Index Statement |
|
|
564 | (2) |
|
A4.5 Data Insertion, Update, and Deletion |
|
|
566 | (1) |
|
A4.5.1 Abridged Syntax for the Insert Statement |
|
|
566 | (1) |
|
A4.5.2 Abridged Syntax for the Update Statement |
|
|
566 | (1) |
|
A4.5.3 Syntax for Delete Statement and Truncate Statement |
|
|
567 | (1) |
|
A4.6 Transaction Management |
|
|
567 | (1) |
|
|
568 | (10) |
|
A4.7.1 Abridged Syntax for the Select Statement |
|
|
568 | (1) |
|
A4.7.2 Modified From-Clause for ANSI Join |
|
|
569 | (1) |
|
A4.7.3 Some Commonly Used Row Functions |
|
|
570 | (3) |
|
A4.7.4 Some Commonly Used Date Manipulation Functions |
|
|
573 | (1) |
|
A4.7.5 Some Commonly Used Data Conversion Functions |
|
|
574 | (1) |
|
A4.7.6 Some Valid Date and Numeric Formats |
|
|
575 | (1) |
|
A4.7.7 Commonly Used Aggregation Functions |
|
|
576 | (1) |
|
A4.7.8 Syntax for Using Analytic Functions |
|
|
577 | (1) |
|
A4.7.9 Syntax for Nested Queries |
|
|
577 | (1) |
|
A4.8 Managing Logical Views |
|
|
578 | (2) |
|
A4.8.1 Creating the Logical View |
|
|
578 | (1) |
|
A4.8.2 Altering or Dropping the Logical View |
|
|
579 | (1) |
|
A4.9 Managing System Security |
|
|
580 | (5) |
|
A4.9.1 Syntax for Create-Profile Statement |
|
|
580 | (1) |
|
A4.9.2 Syntax for Altering or Dropping a Profile |
|
|
581 | (1) |
|
A4.9.3 Syntax for Creating User Account(s) |
|
|
581 | (1) |
|
A4.9.4 Syntax for Altering or Dropping User Account(s) |
|
|
582 | (1) |
|
A4.9.5 Syntax for Creating, Altering, or Dropping Role(s) |
|
|
582 | (1) |
|
A4.9.6 Syntax for Granting or Revoking Privilege(s) |
|
|
583 | (2) |
|
Appendix A5: Sample Exercises and Examination Questions |
|
|
585 | (12) |
|
|
585 | (1) |
|
A5.2 Sample Assignment 2A |
|
|
586 | (1) |
|
A5.3 Sample Assignment 3B |
|
|
586 | (2) |
|
A5.4 Sample Assignment 4A |
|
|
588 | (2) |
|
A5.5 Sample Assignment 5A |
|
|
590 | (1) |
|
A5.6 Sample Assignment 6A |
|
|
591 | (1) |
|
A5.7 Sample Assignment 7A |
|
|
592 | (1) |
|
|
593 | (1) |
|
|
594 | (3) |
Index |
|
597 | |