Database Administration - Syllabus
Embark on a profound academic exploration as you delve into the Database Administration course () within the distinguished Tribhuvan university's BCA department. Aligned with the BCA Curriculum, this course (CACS405) seamlessly merges theoretical frameworks with practical sessions, ensuring a comprehensive understanding of the subject. Rigorous assessment based on a 100 marks system, coupled with a challenging passing threshold of , propels students to strive for excellence, fostering a deeper grasp of the course content.
This 6 credit-hour journey unfolds as a holistic learning experience, bridging theory and application. Beyond theoretical comprehension, students actively engage in practical sessions, acquiring valuable skills for real-world scenarios. Immerse yourself in this well-structured course, where each element, from the course description to interactive sessions, is meticulously crafted to shape a well-rounded and insightful academic experience.
Course Description
This course provides the comprehensive knowledge about relational database management
system in administrative approach to integrate in enterprise levelof database in network
environment which encompasses with oracle database instances Management, database
installment in network environment, implementing user role and privileges, multitenant database
management, back and recovery.
Objectives: The general objectives of this course is to provide core knowledge of administrative
works on relational database management system
Units
Key Topics
-
Introduction to Computers
IN-01An overview of computers and their significance in today's world. This topic sets the stage for understanding the basics of computers.
-
Digital and Analog Computers
IN-02Understanding the difference between digital and analog computers, their characteristics, and applications.
-
Characteristics of Computers
IN-03Exploring the key characteristics of computers, including input, processing, storage, and output.
-
History of Computers
IN-04A brief history of computers, from their inception to the present day, highlighting key milestones and developments.
-
Generations of Computers
IN-05Understanding the different generations of computers, including their features, advantages, and limitations.
-
Classification of Computers
IN-06Categorizing computers based on their size, functionality, and application, including desktops, laptops, and mobile devices.
-
The Computer System
IN-07An in-depth look at the components of a computer system, including hardware and software.
-
Applications of Computers
IN-08Exploring the various applications of computers in different fields, including business, education, and healthcare.
Key Topics
-
Introduction to Matrices
MA-1This topic introduces the concept of matrices, including their definition, notation, and basic operations. It lays the foundation for further study of matrices and their applications.
-
Types of Matrices
MA-2This topic covers the different types of matrices, including square matrices, diagonal matrices, identity matrices, and zero matrices. It explains their properties and characteristics.
-
Equality of Matrices
MA-3This topic defines and explains the concept of equality of matrices, including the conditions for two matrices to be equal and the rules for comparing matrices.
-
Algebra of Matrices
MA-4This topic covers the basic algebraic operations of matrices, including addition, subtraction, multiplication, and scalar multiplication. It explains the rules and properties of these operations.
-
Determinants
MA-5This topic introduces the concept of determinants, including their definition, calculation, and properties. It explains the importance of determinants in matrix theory and their applications.
-
Transpose, Minors, and Cofactors of a Matrix
MA-6This topic covers the concepts of transpose, minors, and cofactors of a matrix, including their definitions, calculations, and properties. It explains their relationships and applications.
-
Properties of Determinants
MA-7This topic explains the various properties of determinants, including the multiplication property, addition property, and scalar multiplication property. It highlights their importance in matrix theory.
-
Singular and Non-Singular Matrices
MA-8This topic defines and explains the concepts of singular and non-singular matrices, including their properties and characteristics. It highlights their importance in matrix theory and applications.
-
Adjoint and Inverse of Matrices
MA-9This topic covers the concepts of adjoint and inverse of matrices, including their definitions, calculations, and properties. It explains their relationships and applications.
Key Topics
-
Tablespace Management
TA-01Understanding the concept of tablespaces and data files, and learning how to create and add them to a database.
-
Control File Management
TA-02Managing control files, including creating, modifying, and maintaining them to ensure database integrity.
-
Online Redo Log Management
TA-03Understanding the role of online redo logs, and learning how to create, manage, and maintain them for database recovery.
-
Archive Log Management
TA-04Learning how to manage archive logs, including creating, storing, and maintaining them for database recovery and auditing.
Key Topics
-
Introduction to Matrices
MA-1This topic introduces the concept of matrices, including their definition, notation, and basic operations. It lays the foundation for further study of matrices and their applications.
-
Types of Matrices
MA-2This topic covers the different types of matrices, including square matrices, diagonal matrices, identity matrices, and zero matrices. It explains their properties and characteristics.
-
Equality of Matrices
MA-3This topic defines and explains the concept of equality of matrices, including the conditions for two matrices to be equal and the rules for comparing matrices.
-
Algebra of Matrices
MA-4This topic covers the basic algebraic operations of matrices, including addition, subtraction, multiplication, and scalar multiplication. It explains the rules and properties of these operations.
-
Determinants
MA-5This topic introduces the concept of determinants, including their definition, calculation, and properties. It explains the importance of determinants in matrix theory and their applications.
Key Topics
-
Multiple Correlation
MU-1Introduction to multiple correlation, its concept, and application in statistics. Exploring the relationship between multiple variables.
-
Partial Correlation
MU-2Understanding partial correlation, its concept, and application in statistics. Analyzing the relationship between two variables while controlling for other variables.
-
Introduction to Multiple Linear Regression
MU-3Basic concepts and principles of multiple linear regression, including model formulation and estimation. Understanding the relationship between multiple independent variables and a dependent variable.
-
Hypothesis Testing of Multiple Regression
MU-4Testing hypotheses in multiple regression, including significance testing and confidence intervals. Evaluating the overall fit and significance of the regression model.
-
Test of Significance of Regression
MU-5Testing the overall significance of the regression model, including F-test and p-value interpretation. Determining whether the regression model is a good fit to the data.
-
Test of Individual Regression Coefficient
MU-6Testing the significance of individual regression coefficients, including t-test and p-value interpretation. Evaluating the contribution of each independent variable to the regression model.
-
Model Adequacy Tests
MU-7Evaluating the goodness of fit and adequacy of the multiple regression model, including residual analysis and diagnostic plots. Identifying potential issues and limitations of the model.
Key Topics
-
Nature of Internship
CO-1The internship work should be relevant to the field of computer science and information technology, with a minimum duration of 180 hours or ten weeks.
-
Phases of Internship
CO-2The internship evaluation consists of three phases: Proposal Submission, Mid-Term Submission, and Final Submission.
-
Provision of Supervision
CO-3A regular faculty member of the college is assigned as a supervisor to supervise the students throughout the internship period.
-
Provision of Mentorship
CO-4A regular employee of the intern providing organization is assigned as a mentor to guide the students throughout the internship period.
-
Evaluation Scheme
CO-5The evaluation scheme consists of Proposal Defense, Midterm, and Final Defense, with a total of 200 marks.
-
Report Contents
CO-6The internship report should contain prescribed content flow, including introduction, problem statement, objectives, and references.
-
Citation and Referencing
CO-7The citation and referencing standard should be APA referencing standard, with proper citation and referencing in the document.
-
Report Format Standards
CO-8The report format standards include page number, page size and margin, paragraph style, text font, section headings, figures and tables.
-
Final Report Binding and Submission
CO-9The final report should be submitted in three copies, with a golden embracing and black binding, to the Dean Office, Exam Section, Institute of Science and Technology, Tribhuvan University.
-
Programmable Array Logic (PAL)
CO-10A type of digital integrated circuit that can be programmed to perform a specific digital function, similar to PLA but with some differences.
Key Topics
-
Concept of Backtracking
BA-1This topic introduces the concept of backtracking, a problem-solving strategy that involves recursively exploring all possible solutions and backtracking when a dead end is reached. It also compares and contrasts backtracking with recursion.
-
Backtracking Algorithms
BA-2This topic covers various backtracking algorithms, including those for solving the subset-sum problem, zero-one knapsack problem, and N-queen problem, along with their analysis.
-
Instruction Format and Control Unit
BA-3This topic covers the instruction format, instruction set completeness, and the control unit of a basic computer. It explains how the control unit retrieves and executes instructions.
-
Instruction Cycle and Interrupt Handling
BA-4This topic explains the instruction cycle of a basic computer, including determining the type of instruction, memory reference instructions, input-output instructions, and program interrupts. It also covers the interrupt cycle and how it affects computer operation.
-
Basic Computer Description and Flowchart
BA-5This topic provides a detailed description and flowchart of a basic computer, illustrating how the different components work together to execute instructions and perform tasks.
-
Pointers
BA-6Concept of pointers in programming, including their use in data structures and memory management.
-
8085 Pin Functions
BA-7This topic covers the functions of each pin on the 8085 microprocessor, including their roles in input/output operations.
-
Demultiplexing of Buses
BA-8This topic discusses the process of demultiplexing buses in the 8085 microprocessor, including its importance in improving system performance.
-
Generation of Control Signals
BA-9This topic explains how control signals are generated in the 8085 microprocessor, including their role in controlling the flow of data.
-
Proximal Nodes Mode
BA-10The proximal nodes mode is a retrieval model that uses the proximity of terms in a document to improve the retrieval of relevant documents.
-
Performing CDB and PDB Flashback
BA-11Understanding flashback technology, including performing flashback on Container Database (CDB) and Pluggable Database (PDB).
Key Topics
-
Introduction to Audience and Purpose
AU-1An overview of the importance of understanding audience and purpose in technical writing, and how it sets the foundation for effective communication.
-
Meeting the Audience's Needs
AU-2Understanding the audience's requirements, expectations, and preferences to tailor the content and ensure it meets their needs.
-
Planning Your Document's Purpose
AU-3Defining the purpose of the document, including its goals, objectives, and key takeaways.
-
Defining Document Scope
AU-4Determining the boundaries and limitations of the document to ensure it stays focused and relevant.
-
Selecting the Appropriate Medium
AU-5Choosing the most suitable medium for the document, such as print, digital, or online, based on the audience and purpose.
-
Needham-Schroeder Scheme
AU-6The Needham-Schroeder scheme is a protocol for secure communication that provides authentication and key exchange between two parties. It is a widely used protocol in secure communication systems.
-
Kerberos Protocol
AU-7The Kerberos protocol is a secure authentication protocol that uses tickets and symmetric-key cryptography to provide secure authentication and communication between clients and servers.
-
Creating an Event-Based Schedule
AU-8This topic provides a hands-on guide to creating an event-based schedule in the Scheduler, including defining the event trigger and schedule settings.