This video contains the basic concepts of Clustering Index and will help students in various competitive exams like GATE , NET, PSU'S etc
Following are the important topics of dbms
ER‐model - entity–relationship model, strong entity set, weak entity set, single valued attribute, multivalued attribute, stored attribute, derived attribute, simple attribute composite attribute, weak relationship, strong relationship, mapping, cardinality ratios, discriminator attribute, fan trap, chasm trap
Relational model – relational table, column, domain, row, tuple,
relational algebra – selection, projection, union, intersection, set difference, Cartesian product, natural join, left outer join, right outer join, complete outer join, theta join, division operator, nested query, safe query
tuple calculus – tuple relational calculus, domain relational calculus,
SQL – select, from, where, order by, group by, max, min, avg, count, sum, having,
Integrity constraints – super key, candidate key, primary key, foreign key, alternate key, secondary key, surrogate key
normal forms – first normal form, second normal form, third normal form, bcnf, 4nf, 5nf, functional dependency, minimal cover, canonical collection, multivalued functional dependency, dependency preserving, lossy and lossless decomposition.
File organization – indexing, B, B+ trees, key attribute, anchor attribute, primary indexing, secondary indexing, clustered indexing, multilevel indexing, block pointer, tree pointer, record pointer, top down search, sequential search, range query, index file, ordering, non-ordering
Transactions and concurrency control- transaction, acid properties, atomicity, consistency, isolation, durability, life cycle of a transaction, active state, partially committed state, committed state, abort, rollback, terminated, phantom read, dirty read, unrepeatable read, lost update problem, conflict serializability, view serializability, irrecoverable schedule, cascading rollback, recoverable schedule, cascadless schedule.
Lock based protocol, two phase locking, exclusive lock, shared lock, growing phase, shrinking phase, conservative two-phase locking, rigorous two phase locking, strict two phase locking, time stamping, time stamp, read, write, deadlock, granularity, tree based protocol,