Mar 28, 2024  
2022-2023 College Catalog 
    
2022-2023 College Catalog [ARCHIVED CATALOG]

CIS 162 - Database Design and Development

3 Credits, 3 Contact Hours
3 lecture periods 0 lab periods

Introduction to database concepts and terminology. Includes file systems and databases, the relational database model, entity relationship modeling, normalization, and database design.

  button image Prior Learning and link to PLA webpage

Course Learning Outcomes
  1. Define and explain the importance of the various types of keys: Candidate Keys, Primary Keys, Surrogate Keys and Composite Keys.
  2. Define and explain the importance of Referential Integrity and Foreign Keys.
  3. Define and explain the importance of Normalization: Normal Forms, Functional and Multi-value Dependencies.
  4. Define and explain the importance of the Update anomaly.
  5. Define and explain the importance of the Relationships among Entities: One-to-one, One-to-many and Many-to-many.
  6. Define and explain the importance of the various types of Entities: Weak, Strong and Associative
  7. Define and explain the importance of the Concurrency control elements: Atomic transactions, Lost updates, Resource locking, Transaction isolation levels
  8. Build an entity relationship diagram for a database design.
  9. Build a relational database that conforms to Boyce-Codd normal form.
  10. Write the data definition statements for creating database tables.
  11. Write the data definition statements for inserting data into database tables.

Outline:
  1. Overview of databases and database products
  2. The Relational Database Model
    1. Keys
    2. Functional dependencies
    3. Multi-value dependencies
    4. Normal forms
    5. The normalization process
  3. Entity Relationship (E-R) Modeling
  4. Database Design
    1. Transforming a model into a design
    2. Relationships between various types of entities
    3. Column properties
    4. Enforcing referential integrity
  5. Database Management – Selected Topics
    1. Atomic transactions
    2. Concurrency
    3. Lost updates
    4. Resource locking
    5. Transaction isolation