how to avoid cascading rollback under 2PL
10 Minutes Lectures in Computer Science
how to avoid cascading rollback under 2PL
9:03
Super key, Candidate key, and Primary key - Example and Explanation
10 Minutes Lectures in Computer Science
Super key, Candidate key, and Primary key - Example and Explanation
10:14
First Normal Form (1NF) - How to normalize?
10 Minutes Lectures in Computer Science
First Normal Form (1NF) - How to normalize?
8:02
What are the transactions states in DBMS a transaction go through
10 Minutes Lectures in Computer Science
What are the transactions states in DBMS a transaction go through
8:37
COUNT( ) in SQL Aggregate functions
10 Minutes Lectures in Computer Science
COUNT( ) in SQL Aggregate functions
8:05
SQL Queries – How does WHERE clause work
10 Minutes Lectures in Computer Science
SQL Queries – How does WHERE clause work
7:28
Learn to write SQL Queries 2 – WHERE clause
10 Minutes Lectures in Computer Science
Learn to write SQL Queries 2 – WHERE clause
7:00
Learn to write SQL queries 1 - SELECT clause and FROM clause for beginners
10 Minutes Lectures in Computer Science
Learn to write SQL queries 1 - SELECT clause and FROM clause for beginners
4:29
Important keywords about relations in Relational Model
10 Minutes Lectures in Computer Science
Important keywords about relations in Relational Model
7:48
Transactions in Distributed Database
10 Minutes Lectures in Computer Science
Transactions in Distributed Database
27:25
Concurrency Control in Distributed Database
10 Minutes Lectures in Computer Science
Concurrency Control in Distributed Database
36:11
Deadlock Handling Distributed Database
10 Minutes Lectures in Computer Science
Deadlock Handling Distributed Database
27:43
Derived horizontal fragmentation
10 Minutes Lectures in Computer Science
Derived horizontal fragmentation
20:43
Fragmentation in Distributed Database
10 Minutes Lectures in Computer Science
Fragmentation in Distributed Database
30:39
How to compute canonical cover
10 Minutes Lectures in Computer Science
How to compute canonical cover
10:14
Need for concurrency control - 10 Minutes lectures in computer science
10 Minutes Lectures in Computer Science
Need for concurrency control - 10 Minutes lectures in computer science
10:36
How does Two Phase locking protocol work - 10 minutes lecture in computer science
10 Minutes Lectures in Computer Science
How does Two Phase locking protocol work - 10 minutes lecture in computer science
13:00
Testing for conflict serializability in DBMS - 10 Minutes Lectures in Computer Science
10 Minutes Lectures in Computer Science
Testing for conflict serializability in DBMS - 10 Minutes Lectures in Computer Science
10:25
Types of Attributes and Domain Types - 10 Minutes Lectures in Computer Science
10 Minutes Lectures in Computer Science
Types of Attributes and Domain Types - 10 Minutes Lectures in Computer Science
8:53
Relational Model in DBMS - 10 Minutes Lectures in Computer Science
10 Minutes Lectures in Computer Science
Relational Model in DBMS - 10 Minutes Lectures in Computer Science
8:12
Learn about Conflict Serializability in DBMS in 10 minutes
10 Minutes Lectures in Computer Science
Learn about Conflict Serializability in DBMS in 10 minutes
8:38
Logical vs Physical Data Independence and their impact in efficient user interaction
10 Minutes Lectures in Computer Science
Logical vs Physical Data Independence and their impact in efficient user interaction
10:43
What is transaction and ACID properties
10 Minutes Lectures in Computer Science
What is transaction and ACID properties
11:23
Data Abstraction in DBMS
10 Minutes Lectures in Computer Science
Data Abstraction in DBMS
12:24
DBMS vs OS
10 Minutes Lectures in Computer Science
DBMS vs OS
8:06
What is DBMS - An Introduction
10 Minutes Lectures in Computer Science
What is DBMS - An Introduction
11:48