database design security issues in database database recovery.view serializability properties of transactions check point transaction management dbms users functional dependency normalization relational algebra normal forms bcnf 2nf 1nf database end user specialized users sophisticated users casual end users data base administartor naive or parametric users softeware engineer file organization shadow paging time stamping methods serializability (preliminary treatment only) concurrency control locking methods conflict in dbms mark and sweep algorithm. mark and sweep boundary tag method compaction buddy system with example buddy system freeing memory next fit best fit first fit worst fit memory management schemes memory management operating system keys in dbms introduction to dbms data models data abstraction & 3 schema strong & weak entity dbms basic idea dbms relational algebra subqueries aggregate function group by data constraints
See more