SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
CA 1
Name: Adesh Hazra
Course: BCA
SEM: 4th semester
Subject: Database Management
System
University roll No:18301221022
What is DBMS?
A database management system (or DBMS) is essentially
nothing more than a computerized data-keeping system.
Users of the system are given facilities to perform several
kinds of operations on such a system for either
manipulation of the data in the database or the
management of the database structure itself. Database
Management Systems (DBMSs) are categorized according
to their data structures or types.
DBMS allows users to create their own databases as per their
requirements. The term “DBMS” includes the use of
a database and other application programs. It provides an
interface between the data and the software application.
1. Improved data sharing and data security
Database management systems help users share data quickly,
effectively, and securely across an organization. By providing
quick solutions to database queries, a data management system
enables faster access to more accurate data.
2. Effective data integration
Implementing a database management system will promote a
more integrated picture of your operations by easily illustrating
how processes in one segment of the organization affect other
segments. What once was done completely manually now can be
fully automated and more accurate.
3. Consistent, reliable data
Data inconsistency occurs when different versions of matching
data exist in different places in an organization. For example, one
group has a client’s correct email, and another the correct phone
number..
4. Data that comply with privacy regulations
Database management systems provide a better framework for
the enforcement of privacy and security policies. By orchestrating
data in a unified manner, companies can manage privacy and
data security centrally, helping unify their systems of record and
lowering the risk of regulatory violations.
Advantages of DBMS
Various SQL commands
1. Data Definition Language (DDL)
•DDL changes the structure of the table like creating a table,
deleting a table, altering a table, etc.
•All the command of DDL are auto-committed which means it
permanently saves all the changes in the database.
Here are some commands that come under DDL:
•CREATE
•ALTER
•DROP
•TRUNCATE
a. CREATE It is used to create a new table in the database.
Syntax:
CREATE TABLE EMPLOYEE(Name VARCHAR2(20), Email VARCHA
R2(100), DOB DATE);
1.DROP TABLE table_name;
To add a new column in the table
1.ALTER TABLE table_name ADD column_name COLUMN-
definition;
a. INSERT: The INSERT statement is a SQL query. It is used to
insert data into the row of a table.
Syntax:
1.INSERT INTO TABLE_NAME
2.(col1, col2, col3,.... col N)
3.VALUES (value1, value2, value3, .... value);
b. UPDATE: This command is used to update or modify the
value of a column in the table.
Syntax:
1.UPDATE table_name SET [column_name1= value1,...colum
n_nameN = valueN] [WHERE CONDITION]
Key constraints
•NOT NULL constraints
NOT NULL constraints prevent null values from being entered into a column.
•Unique constraints
Unique constraints ensure that the values in a set of columns are unique and not null
for all rows in the table. The columns specified in a unique constraint must be defined
as NOT NULL. The database manager uses a unique index to enforce the uniqueness of
the key during changes to the columns of the unique constraint.
•Primary key constraints
You can use the primary key and foreign key constraints to define relationships between
tables.
•(Table) Check constraints
A check constraint (also referred to as a table check constraint) is a database rule that
specifies the values allowed in one or more columns of every row of a table. Specifying
check constraints is done through a restricted form of a search condition.
•Foreign key (referential) constraints
Foreign key constraints (also known as referential constraints or referential integrity
constraints) enable you to define required relationships between and within tables.
•Informational constraints
An informational constraint is a constraint attribute that can be used by the SQL
compiler to improve the access to data. Informational constraints are not enforced by
the database manager, and are not used for additional verification of data; rather, they
are used to improve query performance.
Adeshhazra_DBMS_ca1_bca4thsem.pdf

Contenu connexe

Similaire à Adeshhazra_DBMS_ca1_bca4thsem.pdf

2nd chapter dbms.pptx
2nd chapter dbms.pptx2nd chapter dbms.pptx
2nd chapter dbms.pptxkavitha623544
 
Relational Database Management System part II
Relational Database Management System part IIRelational Database Management System part II
Relational Database Management System part IIKavithaA19
 
Sql Interview Questions
Sql Interview QuestionsSql Interview Questions
Sql Interview Questionsarjundwh
 
153680 sqlinterview
153680  sqlinterview153680  sqlinterview
153680 sqlinterviewzdsgsgdf
 
Introduction to the Structured Query Language SQL
Introduction to the Structured Query Language SQLIntroduction to the Structured Query Language SQL
Introduction to the Structured Query Language SQLHarmony Kwawu
 
PPT SQL CLASS.pptx
PPT SQL CLASS.pptxPPT SQL CLASS.pptx
PPT SQL CLASS.pptxAngeOuattara
 
Complete first chapter rdbm 17332
Complete first chapter rdbm 17332Complete first chapter rdbm 17332
Complete first chapter rdbm 17332Tushar Wagh
 
SQL_Introduction_Updated.pptx
SQL_Introduction_Updated.pptxSQL_Introduction_Updated.pptx
SQL_Introduction_Updated.pptxC3MohdArshAlam18
 
Azure Data Fundamentals DP 900 Full Course
Azure Data Fundamentals DP 900 Full CourseAzure Data Fundamentals DP 900 Full Course
Azure Data Fundamentals DP 900 Full CoursePiyush sachdeva
 

Similaire à Adeshhazra_DBMS_ca1_bca4thsem.pdf (20)

Dbms notes
Dbms notesDbms notes
Dbms notes
 
2nd chapter dbms.pptx
2nd chapter dbms.pptx2nd chapter dbms.pptx
2nd chapter dbms.pptx
 
Codds rules & keys
Codds rules & keysCodds rules & keys
Codds rules & keys
 
ICT L5+.pptx
ICT L5+.pptxICT L5+.pptx
ICT L5+.pptx
 
Relational Database Management System part II
Relational Database Management System part IIRelational Database Management System part II
Relational Database Management System part II
 
Sql
SqlSql
Sql
 
Sql Interview Questions
Sql Interview QuestionsSql Interview Questions
Sql Interview Questions
 
Sql
SqlSql
Sql
 
Sql
SqlSql
Sql
 
153680 sqlinterview
153680  sqlinterview153680  sqlinterview
153680 sqlinterview
 
Introduction to the Structured Query Language SQL
Introduction to the Structured Query Language SQLIntroduction to the Structured Query Language SQL
Introduction to the Structured Query Language SQL
 
Database Basics
Database BasicsDatabase Basics
Database Basics
 
Data warehouse physical design
Data warehouse physical designData warehouse physical design
Data warehouse physical design
 
PPT SQL CLASS.pptx
PPT SQL CLASS.pptxPPT SQL CLASS.pptx
PPT SQL CLASS.pptx
 
SQL ARPIT YADAV.pptx
SQL ARPIT YADAV.pptxSQL ARPIT YADAV.pptx
SQL ARPIT YADAV.pptx
 
Complete first chapter rdbm 17332
Complete first chapter rdbm 17332Complete first chapter rdbm 17332
Complete first chapter rdbm 17332
 
SQL_Introduction_Updated.pptx
SQL_Introduction_Updated.pptxSQL_Introduction_Updated.pptx
SQL_Introduction_Updated.pptx
 
Azure Data Fundamentals DP 900 Full Course
Azure Data Fundamentals DP 900 Full CourseAzure Data Fundamentals DP 900 Full Course
Azure Data Fundamentals DP 900 Full Course
 
Dbms unit i
Dbms unit iDbms unit i
Dbms unit i
 
Data base
Data baseData base
Data base
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Adeshhazra_DBMS_ca1_bca4thsem.pdf

  • 1. CA 1 Name: Adesh Hazra Course: BCA SEM: 4th semester Subject: Database Management System University roll No:18301221022
  • 2. What is DBMS? A database management system (or DBMS) is essentially nothing more than a computerized data-keeping system. Users of the system are given facilities to perform several kinds of operations on such a system for either manipulation of the data in the database or the management of the database structure itself. Database Management Systems (DBMSs) are categorized according to their data structures or types. DBMS allows users to create their own databases as per their requirements. The term “DBMS” includes the use of a database and other application programs. It provides an interface between the data and the software application.
  • 3. 1. Improved data sharing and data security Database management systems help users share data quickly, effectively, and securely across an organization. By providing quick solutions to database queries, a data management system enables faster access to more accurate data. 2. Effective data integration Implementing a database management system will promote a more integrated picture of your operations by easily illustrating how processes in one segment of the organization affect other segments. What once was done completely manually now can be fully automated and more accurate. 3. Consistent, reliable data Data inconsistency occurs when different versions of matching data exist in different places in an organization. For example, one group has a client’s correct email, and another the correct phone number.. 4. Data that comply with privacy regulations Database management systems provide a better framework for the enforcement of privacy and security policies. By orchestrating data in a unified manner, companies can manage privacy and data security centrally, helping unify their systems of record and lowering the risk of regulatory violations. Advantages of DBMS
  • 4. Various SQL commands 1. Data Definition Language (DDL) •DDL changes the structure of the table like creating a table, deleting a table, altering a table, etc. •All the command of DDL are auto-committed which means it permanently saves all the changes in the database. Here are some commands that come under DDL: •CREATE •ALTER •DROP •TRUNCATE a. CREATE It is used to create a new table in the database. Syntax: CREATE TABLE EMPLOYEE(Name VARCHAR2(20), Email VARCHA R2(100), DOB DATE); 1.DROP TABLE table_name; To add a new column in the table 1.ALTER TABLE table_name ADD column_name COLUMN- definition; a. INSERT: The INSERT statement is a SQL query. It is used to insert data into the row of a table. Syntax: 1.INSERT INTO TABLE_NAME 2.(col1, col2, col3,.... col N) 3.VALUES (value1, value2, value3, .... value); b. UPDATE: This command is used to update or modify the value of a column in the table. Syntax: 1.UPDATE table_name SET [column_name1= value1,...colum n_nameN = valueN] [WHERE CONDITION]
  • 5. Key constraints •NOT NULL constraints NOT NULL constraints prevent null values from being entered into a column. •Unique constraints Unique constraints ensure that the values in a set of columns are unique and not null for all rows in the table. The columns specified in a unique constraint must be defined as NOT NULL. The database manager uses a unique index to enforce the uniqueness of the key during changes to the columns of the unique constraint. •Primary key constraints You can use the primary key and foreign key constraints to define relationships between tables. •(Table) Check constraints A check constraint (also referred to as a table check constraint) is a database rule that specifies the values allowed in one or more columns of every row of a table. Specifying check constraints is done through a restricted form of a search condition. •Foreign key (referential) constraints Foreign key constraints (also known as referential constraints or referential integrity constraints) enable you to define required relationships between and within tables. •Informational constraints An informational constraint is a constraint attribute that can be used by the SQL compiler to improve the access to data. Informational constraints are not enforced by the database manager, and are not used for additional verification of data; rather, they are used to improve query performance.