Skip to content
geeksforgeeks
  • Courses
    • DSA to Development
    • Get IBM Certification
    • Newly Launched!
      • Master Django Framework
      • Become AWS Certified
    • For Working Professionals
      • Interview 101: DSA & System Design
      • Data Science Training Program
      • JAVA Backend Development (Live)
      • DevOps Engineering (LIVE)
      • Data Structures & Algorithms in Python
    • For Students
      • Placement Preparation Course
      • Data Science (Live)
      • Data Structure & Algorithm-Self Paced (C++/JAVA)
      • Master Competitive Programming (Live)
      • Full Stack Development with React & Node JS (Live)
    • Full Stack Development
    • Data Science Program
    • All Courses
  • Tutorials
    • Data Structures & Algorithms
    • ML & Data Science
    • Interview Corner
    • Programming Languages
    • Web Development
    • CS Subjects
    • DevOps And Linux
    • School Learning
  • Practice
    • GfG 160: Daily DSA
    • Problem of the Day
    • Practice Coding Problems
    • GfG SDE Sheet
  • Aptitude
  • Engineering Mathematics
  • Discrete Mathematics
  • Operating System
  • DBMS
  • Computer Networks
  • Digital Logic and Design
  • C Programming
  • Data Structures
  • Algorithms
  • Theory of Computation
  • Compiler Design
  • Computer Org and Architecture
Open In App
Next Article:
Introduction of DBMS (Database Management System)
Next article icon

DBMS Tutorial – Learn Database Management System

Last Updated : 22 Apr, 2025
Comments
Improve
Suggest changes
Like Article
Like
Report

Database Management System (DBMS) is a software used to manage data from a database.

  • A database is a structured collection of data that is stored in an electronic device. The data can be text, video, image or any other format.
  • A relational database stores data in the form of tables and a NoSQL database in the form of key-value pairs.
  • SQL (Structured Query Language) is a standard language for accessing and manipulating data in a relational database.
  • A DBMS is a software that allows to create, update and retrieval of data in an organized way. It also provides security to the database.
  • Examples of relational DBMS are MySQL, Oracle, Microsoft SQL Server, Postgre SQL and Snowflake.
  • Examples of NoSQL DBMS are MongoDB, Cassandra, DynamoDB and Redis.
DBMS


In this Database Management System tutorial, you’ll learn basic to advanced topics like the ER model, Relational Model, Relation Algebra, Normalization, File Organization, etc.

Introduction

  1. Need For DBMS
  2. DBMS Introduction
  3. DBMS Architecture (1, 2 and 3 Tier)

Entity Relationship Model

  1. ER Model
  2. Enhanced ER Model
  3. Minimization of ER Diagram
  4. Generalization, Specialization and Aggregation
  5. Recursive Relationships

Relational Model and Functional Dependencies

  1. Relational Model
  2. Keys (Candidate, Super, Primary, Alternate and Foreign)
  3. Functional Dependency and Attribute Closure
  4. Finding Attribute Closure and Candidate Keys using Functional Dependencies
  5. Armstrong’s Axioms in Functional Dependency
  6. Equivalence of Functional Dependencies
  7. Canonical Cover
  8. Anomalies in Relational Model
  9. Mapping from ER Model to Relational Model
  10. Strategies for Schema design
  11. Schema Integration

>> Quiz on ER and Relational Model

Normalization

  1. Introduction
  2. Normal Forms
  3. Minimum relations satisfying 1NF
  4. The Problem of redundancy in Database
  5. Dependency Preserving Decomposition
  6. Lossless Join Decomposition
  7. Lossless Join and Dependency Preserving Decomposition
  8. How to find the Highest Normal Form of a Relation
  9. Introduction of 4th and 5th Normal form
  10. Domain Key normal form
  11. Denormalization in Databases
  12. DBMS | Data Replication

>> Quiz on Normal Forms

Relational Algebra and Calculus

  1. Introduction
  2. Basic Operators
  3. Extended Operators
  4. Inner Join vs Outer Join
  5. Join operation Vs nested query
  6. Tuple Relational Calculus
  7. Row oriented vs. column oriented data stores

Transactions and Concurrency Control

  1. Introduction
  2. ACID Properties
  3. Concurrency Control -Introduction
  4. Types of Schedules
  5. Conflict Serializability
  6. View Serializability
  7. How to test if two schedules are View Equal or not ?
  8. Recoverability of Schedules
  9. Precedence Graph for testing Conflict Serializability
  10. Transaction Isolation Levels in DBMS
  11. Implementation of Locking in DBMS
  12. Lock Based Protocol
  13. Graph Based Protocol
  14. Two Phase Locking (2-PL)
  15. Multiple Granularity Locking
  16. Thomas Write Rule
  17. Polygraph to check View Serializability
  18. Log based recovery
  19. Timestamp Ordering Protocols
  20. TimeStamp and Deadlock Prevention Schemes
  21. Dirty read in SQL
  22. Database Recovery Techniques
  23. Starvation in DBMS
  24. Deadlock in DBMS
  25. DBMS | OLAP vs OLTP
  26. Types of OLAP Systems
  27. Types of Recoverability of Schedules and easiest way to test schedule | Set 2

>> Quiz on Transactions and concurrency control

Indexing, B and B+ trees

  1. Indexing and its Types
  2. B-Tree | Set 1 (Introduction)
  3. B-Tree | Set 2 (Insert)
  4. B-Tree | Set 3 (Delete)
  5. B+ Tree (Introduction)
  6. Bitmap Indexing
  7. Inverted Index
  8. Difference between Inverted Index and Forward Index
  9. SQL queries on clustered and non-clustered Indexes

>> Practice questions on B and B+ Trees
>> Quizzes on Indexing, B and B+ Trees

File Organization

  1. File Organization – Set 1
  2. File Organization – Set 2 (Hashing in DBMS)
  3. File Organization – Set 3
  4. File Organization – Set 4

>> Quiz on File structures

Advanced Topics

  1. Multimedia Database
  2. RAID
  3. Query Optimization
  4. How to store a password in database?
  5. Storage Area Networks
  6. Network attached storage
  7. ODBMS – Definition and overview
  8. Difference between RDBMS and HBase
  9. Challenges of database security
  10. Federated database management system issues
  11. Distributed Database System
  12. Functions of Distributed Database System
  13. Semantic Heterogeneity
  14. Advantages of Distributed database
  15. Comparison – Centralized, Decentralized and Distributed Systems
  16. Characteristics of Biological Data (Genome Data Management)
  17. Data Management issues in Mobile database
  18. Future Works in Geographic Information System
  19. Difference between Structured, Semi-structured and Unstructured data
  20. Web Information Retrieval | Vector Space Model

Data Warehouse and Data Mining

  1. Star Schema in Data Warehouse modeling
  2. Data Warehouse Modeling | Snowflake Schema
  3. Dimensional Data Modeling
  4. Data Warehousing
  5. Data Warehouse Architecture
  6. Characteristics and Functions of Data warehouse
  7. Difficulties of Implementing Data Warehouses
  8. Data Mining
  9. Data Mining | KDD process
  10. Data Mining | Sources of Data that can be mined
  11. Data Marts
  12. Architecture of HBase
  13. Apache HBase
  14. Architecture and Working of Hive
  15. Apache Hive
  16. Difference between Hive and HBase

Interview Questions

  1. DBMS interview questions | Set 1
  2. DBMS interview questions | Set 2
  3. SQL Interview Questions
  4. SQL Query Interview Questions
  5. PostgreSQL Interview Questions
  6. PL/SQL Intevriew Questions

SQL Tutorial

  1. SQL | Tutorial
  2. Quiz on SQL

Misc Topics

  1. DBMS Interfaces
  2. Categories of DBMS Users
  3. Data Abstraction and Data Independence
  4. Database Objects
  5. Impedance Mismatch

DBMS practices questions

  1. Database Management Systems | Set 1
  2. Database Management Systems | Set 2
  3. Database Management Systems | Set 3
  4. Database Management Systems | Set 4
  5. Database Management Systems | Set 5
  6. Database Management Systems | Set 6
  7. Database Management Systems | Set 7
  8. Database Management Systems | Set 8
  9. Database Management Systems | Set 9
  10. Database Management Systems | Set 10
  11. Database Management Systems | Set 11

Advantages of DBMS

There are some following reasons to learn DBMS:

  • Organizing and management of data: DBMS helps in managing large amounts of data in an organized manner. It provides features like create, edit, delete, and read.
  • Data Security: DBMS provides Security to the data from the unauthorized person.
  • Improved decision-making: From stored data in the database we can generate graphs, reports, and many visualizations which helps in decision-making.
  • Consistency: In a traditional database model all things are manual or inconsistent, but DBMS enables to automation of the operations by queries.

Disadvantages of DBMS

  • Complexity: DBMS can be hard to design, implement, and manage, needing specialized knowledge.
  • Cost: High setup costs, including hardware, software, and skilled personnel, can be expensive. Ongoing maintenance adds to the cost.
  • Performance Overhead: DBMS might slow down simple tasks due to their extra features and general-purpose nature.
  • Security Risks: Centralizing data can create security risks. If the system is hacked, all data could be compromised.
  • Resource Intensive: DBMS need a lot of memory, storage, and processing power, which can be costly.
  • Data Integrity Issues: Complex systems can lead to data integrity problems if not managed well.

Conclusion

Understanding Database Management Systems (DBMS) is essential for managing and organizing data effectively. This DBMS tutorial has introduced you to key concepts like database models, SQL queries, normalization, and data security. With this knowledge, you can design efficient databases, maintain data integrity, and improve performance.

Quick Links:

  1. Last Minutes Notes(LMNs) on DBMS
  2. Quizzes on DBMS
  3. Practice Problems on DBMS

Next Article
Introduction of DBMS (Database Management System)
author
kartik
Improve
Article Tags :
  • DBMS
  • GATE CS
  • dbms

Similar Reads

  • DBMS Tutorial – Learn Database Management System
    Database Management System (DBMS) is a software used to manage data from a database. A database is a structured collection of data that is stored in an electronic device. The data can be text, video, image or any other format.A relational database stores data in the form of tables and a NoSQL databa
    7 min read
  • Basic of DBMS

    • Introduction of DBMS (Database Management System)
      A Database Management System (DBMS) is a software solution designed to efficiently manage, organize, and retrieve data in a structured manner. It serves as a critical component in modern computing, enabling organizations to store, manipulate, and secure their data effectively. From small application
      8 min read

    • History of DBMS
      The first database management systems (DBMS) were created to handle complex data for businesses in the 1960s. These systems included Charles Bachman's Integrated Data Store (IDS) and IBM's Information Management System (IMS). Databases were first organized into tree-like structures using hierarchica
      7 min read

    • Advantages of Database Management System
      Database Management System (DBMS) is a collection of interrelated data and a set of software tools/programs that access, process, and manipulate data. It allows access, retrieval, and use of that data by considering appropriate security measures. The Database Management system (DBMS) is really usefu
      6 min read

    • Disadvantages of DBMS
      You might have encountered bulks of files/registers either at some office/school/university. The traditional file management system has been followed for managing the information or data at many organizations and by many businesses. It used to be cost-effective and easily accessible. With evolving t
      9 min read

    • Application of DBMS
      The efficient and safe management, saving and retrieval of data is made possible by the Database Management Systems. They provide strong solutions for the data management demands and are the foundation of the numerous applications used in a variety of the sectors. Recognizing the uses of DBMSs aids
      5 min read

    • Need for DBMS
      In earlier times, data was stored and retrieved using files in a typical file system. For example:A company might keep separate files for employees' details, customer information, and daily sales.These files could be stored as text documents, spreadsheets, or printed records in cabinets.This approac
      6 min read

    • DBMS Architecture 1-level, 2-Level, 3-Level
      A database stores important information that must be accessed quickly and securely. To manage this data properly, it is important to choose the right database architecture. The Database Management System (DBMS) architecture decides how the database is built, organized, and maintained. It also contro
      7 min read

    • Difference between File System and DBMS
      A file system and a DBMS are two kinds of data management systems that are used in different capacities and possess different characteristics. A File System is a way of organizing files into groups and folders and then storing them in a storage device. It provides the media that stores data as well
      6 min read

    Entity Relationship Model

    • Introduction of ER Model
      The Entity-Relationship Model (ER Model) is a conceptual model for designing a databases. This model represents the logical structure of a database, including entities, their attributes and relationships between them. Entity: An objects that is stored as data such as Student, Course or Company.Attri
      10 min read

    • Structural Constraints of Relationships in ER Model
      Structural constraints, within the context of Entity-Relationship (ER) modeling, specify and determine how the entities take part in the relationships and this gives an outline of how the interactions between the entities can be designed in a database. Two primary types of constraints are cardinalit
      5 min read

    • Difference between entity, entity set and entity type
      The Entity-Relationship (ER) Model is one of the primary components of Database Management Systems and is very important for designing the logical structure of databases. It helps define data, and the relationship between the data entities and it makes the system easier to visualize. This is the rea
      6 min read

    • Difference between Strong and Weak Entity
      An entity is a “thing” or “object” in the real world. An entity contains attributes, which describe that entity. So anything about which we store information is called an entity. Entities are recorded in the database and must be distinguishable, i.e., easily recognized from the group. In this articl
      3 min read

    • Generalization, Specialization and Aggregation in ER Model
      Using the ER model for bigger data creates a lot of complexity while designing a database model, So in order to minimize the complexity Generalization, Specialization, and Aggregation were introduced in the ER model. These were used for data abstraction. In which an abstraction mechanism is used to
      4 min read

    • Recursive Relationships in ER diagrams
      A relationship between two entities of the same entity set is called a recursive relationship or repeated relationship. Here the same entity set participates more than once in a relationship type with a different role for each instance. Recursive relationships are often used to represent hierarchies
      3 min read

    Relational Model

    • Introduction of Relational Model and Codd Rules in DBMS
      The Relational Model is a fundamental concept in Database Management Systems (DBMS) that organizes data into tables, also known as relations. This model simplifies data storage, retrieval, and management by using rows and columns. Codd’s Rules, introduced by Dr. Edgar F. Codd, define the principles
      14 min read

    • Types of Keys in Relational Model (Candidate, Super, Primary, Alternate and Foreign)
      In the context of a relational database, Keys are one of the basic requirements of a relational database model. keys are fundamental components that ensure data integrity, uniqueness, and efficient access. It is widely used to identify the tuples(rows) uniquely in the table. We also use keys to set
      8 min read

    • Anomalies in Relational Model
      Anomalies in the relational model refer to inconsistencies or errors that can arise when working with relational databases, specifically in the context of data insertion, deletion, and modification. There are different types of anomalies that can occur in referencing and referenced relations which c
      5 min read

    • Mapping from ER Model to Relational Model
      Converting an Entity-Relationship (ER) diagram to a Relational Model is a crucial step in database design. The ER model represents the conceptual structure of a database, while the Relational Model is a physical representation that can be directly implemented using a Relational Database Management S
      7 min read

    • Strategies for Schema design in DBMS
      There are various strategies that are considered while designing a schema. Most of these strategies follow an incremental approach that is, they must start with some schema constructs derived from the requirements and then they incrementally modify, refine, or build on them. In this article, let's d
      7 min read

    Relational Algebra

    • Introduction of Relational Algebra in DBMS
      Relational Algebra is a formal language used to query and manipulate relational databases, consisting of a set of operations like selection, projection, union, and join. It provides a mathematical framework for querying databases, ensuring efficient data retrieval and manipulation. Relational algebr
      9 min read

    • Basic Operators in Relational Algebra
      The Relational Model is a way of structuring data using relations, which are a collection of tuples that have the same attributes. Relational Algebra is a procedural query language that takes relations as input and returns relations as output. It uses a set of operators to manipulate and retrieve da
      4 min read

    • Extended Operators in Relational Algebra
      Extended operators in relational algebra are operators that go beyond the basic set of relational algebra operations. They are also known as derived operators because they can be constructed from combinations of the fundamental operators. There are mainly three types of extended operators in Relatio
      7 min read

    • SQL Joins (Inner, Left, Right and Full Join)
      SQL joins are fundamental tools for combining data from multiple tables in relational databases. Joins allow efficient data retrieval, which is essential for generating meaningful observations and solving complex business queries. Understanding SQL join types, such as INNER JOIN, LEFT JOIN, RIGHT JO
      6 min read

    • Join operation Vs Nested query in DBMS
      The growth of technology and automation coupled with exponential amounts of data has led to the importance and omnipresence of databases which, simply put, are organized collections of data. Considering a naive approach, one can theoretically keep all the data in one large table, however that increa
      5 min read

    • Tuple Relational Calculus (TRC) in DBMS
      Tuple Relational Calculus (TRC) is a non-procedural query language used in relational database management systems (RDBMS) to retrieve data from tables. TRC is based on the concept of tuples, which are ordered sets of attribute values that represent a single row or record in a database table. TRC is
      4 min read

    • Domain Relational Calculus in DBMS
      Domain Relational Calculus is a non-procedural query language equivalent in power to Tuple Relational Calculus. Domain Relational Calculus provides only the description of the query but it does not provide the methods to solve it. In Domain Relational Calculus, a query is expressed as, { < x1, x2
      2 min read

    Functional Dependencies

    • Functional Dependency and Attribute Closure
      Functional dependency and attribute closure are essential for maintaining data integrity and building effective, organized, and normalized databases.Functional DependencyA functional dependency A->B in a relation holds if two tuples having the same value of attribute A must have the same value fo
      5 min read

    • Armstrong's Axioms in Functional Dependency in DBMS
      Armstrong's Axioms refer to a set of inference rules, introduced by William W. Armstrong, that are used to test the logical implication of functional dependencies. Given a set of functional dependencies F, the closure of F (denoted as F+) is the set of all functional dependencies logically implied b
      4 min read

    • Equivalence of Functional Dependencies
      Pre-Requisite: Functional Dependency, Finding Attribute Closure, and Candidate Keys using Functional Dependency For understanding the equivalence of Functional Dependencies Sets (FD sets), the basic idea about Attribute Closure is given in this article Given a Relation with different FD sets for tha
      5 min read

    • Canonical Cover of Functional Dependencies in DBMS
      Managing a large set of functional dependencies can result in unnecessary computational overhead. This is where the canonical cover becomes useful. The canonical cover of a set of functional dependencies F is a simplified version of F that retains the same closure as the original set, ensuring no re
      8 min read

    Normalisation

    • Introduction of Database Normalization
      Normalization is an important process in database design that helps improve the database's efficiency, consistency, and accuracy. It makes it easier to manage and maintain the data and ensures that the database is adaptable to changing business needs.Database normalization is the process of organizi
      8 min read

    • Normal Forms in DBMS
      In the world of database management, Normal Forms are important for ensuring that data is structured logically, reducing redundancy, and maintaining data integrity. When working with databases, especially relational databases, it is critical to follow normalization techniques that help to eliminate
      8 min read

    • First Normal Form (1NF)
      In relational database design, normalization is the process of organizing data to reduce redundancy and improve data integrity. First Normal Form (1NF) is the first step in this process. It ensures that the structure of a database table is organized in a way that makes it easier to manage and query.
      4 min read

    • Second Normal Form (2NF)
      Second Normal Form (2NF) is based on the concept of fully functional dependency. It is a way to organize a database table so that it reduces redundancy and ensures data consistency. Fully Functional Dependency means a non-key attribute depends on the entire primary key, not just part of it.For a tab
      5 min read

    • Boyce-Codd Normal Form (BCNF)
      While Third Normal Form (3NF) is generally sufficient for organizing relational databases, it may not completely eliminate redundancy. Redundancy can still occur if there’s a dependency X→X where X is not a candidate key. This issue is addressed by a stronger normal form known as Boyce-Codd Normal F
      7 min read

    • Introduction of 4th and 5th Normal Form in DBMS
      Two of the highest levels of database normalization are the fourth normal form (4NF) and the fifth normal form (5NF). Multivalued dependencies are handled by 4NF, whereas join dependencies are handled by 5NF. If two or more independent relations are kept in a single relation or we can say multivalue
      5 min read

    • The Problem of Redundancy in Database
      Redundancy means having multiple copies of the same data in the database. This problem arises when a database is not normalized. Suppose a table of student details attributes is: student ID, student name, college name, college rank, and course opted. Student_ID Name Contact College Course Rank 100Hi
      6 min read

    • Dependency Preserving Decomposition - DBMS
      In a Database Management System (DBMS), dependency-preserving decomposition refers to the process of breaking down a complex database schema into simpler, smaller tables, such that all the functional dependencies of the original schema are still enforceable without needing to perform additional join
      7 min read

    • Lossless Decomposition in DBMS
      The original relation and relation reconstructed from joining decomposed relations must contain the same number of tuples if the number is increased or decreased then it is Lossy Join decomposition. Lossless join decomposition ensures that never get the situation where spurious tuples are generated
      5 min read

    • Lossless Join and Dependency Preserving Decomposition
      Decomposition of a relation is done when a relation in a relational model is not in appropriate normal form. Relation R is decomposed into two or more relations if decomposition is lossless join as well as dependency preserving. Lossless Join DecompositionIf we decompose a relation R into relations
      4 min read

    • Denormalization in Databases
      Denormalization focuses on combining multiple tables to make queries execute quickly. It adds redundancies in the database though. In this article, we’ll explore Denormalization and how it impacts database design. This method can help us to avoid costly joins in a relational database made during nor
      6 min read

    Transactions and Concurrency Control

    • Concurrency Control in DBMS
      In a database management system (DBMS), allowing transactions to run concurrently has significant advantages, such as better system resource utilization and higher throughput. However, it is crucial that these transactions do not conflict with each other. The ultimate goal is to ensure that the data
      7 min read

    • ACID Properties in DBMS
      In the world of Database Management Systems (DBMS), transactions are fundamental operations that allow us to modify and retrieve data. However, to ensure the integrity of a database, it is important that these transactions are executed in a way that maintains consistency, correctness, and reliabilit
      8 min read

    • Implementation of Locking in DBMS
      Locking protocols are used in database management systems as a means of concurrency control. Multiple transactions may request a lock on a data item simultaneously. Hence, we require a mechanism to manage the locking requests made by transactions. Such a mechanism is called a Lock Manager. It relies
      5 min read

    • Lock Based Concurrency Control Protocol in DBMS
      In a Database Management System (DBMS), lock-based concurrency control (BCC) is a method used to manage how multiple transactions access the same data. This protocol ensures data consistency and integrity when multiple users interact with the database simultaneously.This method uses locks to manage
      7 min read

    • Graph Based Concurrency Control Protocol in DBMS
      In a Database Management System (DBMS), multiple transactions often run at the same time, which can lead to conflicts when they access the same data. Graph-Based Concurrency Control Protocol helps manage these conflicts and ensures that the database remains consistent.In this protocol, transactions
      4 min read

    • Two Phase Locking Protocol
      The Two-Phase Locking (2PL) Protocol is an essential concept in database management systems used to maintain data consistency and ensure smooth operation when multiple transactions are happening simultaneously. It helps to prevent issues like data conflicts where two or more transactions try to acce
      9 min read

    • Multiple Granularity Locking in DBMS
      The various Concurrency Control schemes have used different methods and every individual Data item is the unit on which synchronization is performed. A certain drawback of this technique is if a transaction Ti needs to access the entire database, and a locking protocol is used, then Ti must lock eac
      5 min read

    • Polygraph to check View Serializability in DBMS
      In a Database Management System (DBMS), ensuring that transactions execute correctly without conflicts is important. One way to check this is through view serializability, which ensures that a schedule produces the same final result as some serial execution of transactions.To check view serializabil
      7 min read

    • Log based Recovery in DBMS
      Log-based recovery in DBMS ensures data can be maintained or restored in the event of a system failure. The DBMS records every transaction on stable storage, allowing for easy data recovery when a failure occurs. For each operation performed on the database, a log file is created. Transactions are l
      10 min read

    • Timestamp based Concurrency Control
      Timestamp-based concurrency control is a method used in database systems to ensure that transactions are executed safely and consistently without conflicts, even when multiple transactions are being processed simultaneously. This approach relies on timestamps to manage and coordinate the execution o
      5 min read

    • Dirty Read in SQL
      Pre-Requisite - Types of Schedules, Transaction Isolation Levels in DBMS A Dirty Read in SQL occurs when a transaction reads data that has been modified by another transaction, but not yet committed. In other words, a transaction reads uncommitted data from another transaction, which can lead to inc
      6 min read

    • Types of Schedules in DBMS
      Schedule, as the name suggests, is a process of lining the transactions and executing them one by one. When there are multiple transactions that are running in a concurrent manner and the order of operation is needed to be set so that the operations do not overlap each other, Scheduling is brought i
      7 min read

    • Conflict Serializability in DBMS
      A schedule is a sequence in which operations (read, write, commit, abort) from multiple transactions are executed in a database. Serial or one by one execution of schedules has less resource utilization and low throughput. To improve it, two or more transactions are run concurrently. Conflict Serial
      6 min read

    • Condition of schedules to be View-equivalent
      In a database system, a schedule is a sequence of operations (such as read and write operations) performed by transactions in the system. Serial or one by one execution of schedules has less resource utilization and low throughput. To improve it, two or more transactions are run concurrently. View S
      6 min read

    • Recoverability in DBMS
      Recoverability is a critical feature of database systems that ensures the database can return to a consistent and reliable state after a failure or error. It guarantees that the effects of committed transactions are saved permanently, while uncommitted transactions are rolled back to maintain data i
      7 min read

    • Precedence Graph for Testing Conflict Serializability in DBMS
      A Precedence Graph or Serialization Graph is used commonly to test the Conflict Serializability of a schedule. It is a directed Graph (V, E) consisting of a set of nodes V = {T1, T2, T3..........Tn} and a set of directed edges E = {e1, e2, e3..................em}. The graph contains one node for eac
      6 min read

    • Database Recovery Techniques in DBMS
      Database Systems like any other computer system, are subject to failures but the data stored in them must be available as and when required. When a database fails it must possess the facilities for fast recovery. It must also have atomicity i.e. either transactions are completed successfully and com
      11 min read

    • Starvation in DBMS
      Starvation in DBMS is a problem that happens when some processes are unable to get the resources they need because other processes keep getting priority. This can happen in situations like locking or scheduling, where some processes keep getting the resources first, leaving others waiting indefinite
      8 min read

    • Deadlock in DBMS
      In database management systems (DBMS) a deadlock occurs when two or more transactions are unable to the proceed because each transaction is waiting for the other to the release locks on resources. This situation creates a cycle of the dependencies where no transaction can continue leading to the sta
      10 min read

    • Types of Schedules Based on Recoverability in DBMS
      In a Database Management System (DBMS), multiple transactions often run at the same time, and their execution order is called a schedule. It is important to ensure that these schedules do not cause data loss or inconsistencies, especially if a failure occurs.A recoverable schedule allows the system
      4 min read

    • Why recovery is needed in DBMS
      Basically, whenever a transaction is submitted to a DBMS for execution, the operating system is responsible for making sure or to be confirmed that all the operations which need to be performed in the transaction have been completed successfully and their effect is either recorded in the database or
      6 min read

    Indexing, B and B+ trees

    • Indexing in Databases - Set 1
      Indexing is a crucial technique used in databases to optimize data retrieval operations. It improves query performance by minimizing disk I/O operations, thus reducing the time it takes to locate and access data. Essentially, indexing allows the database management system (DBMS) to locate data more
      8 min read

    • Introduction of B-Tree
      A B-Tree is a specialized m-way tree designed to optimize data access, especially on disk-based storage systems. In a B-Tree of order m, each node can have up to m children and m-1 keys, allowing it to efficiently manage large datasets.The value of m is decided based on disk block and key sizes.One
      8 min read

    • Insert Operation in B-Tree
      In this post, we'll discuss the insert() operation in a B-Tree. A new key is always inserted into a leaf node. To insert a key k, we start from the root and traverse down the tree until we reach the appropriate leaf node. Once there, the key is added to the leaf.Unlike Binary Search Trees (BSTs), no
      15+ min read

    • Delete Operation in B-Tree
      A B Tree is a type of data structure commonly known as a Balanced Tree that stores multiple data items very easily. B Trees are one of the most useful data structures that provide ordered access to the data in the database. In this article, we will see the delete operation in the B-Tree. B-Trees are
      15+ min read

    • Introduction of B+ Tree
      B + Tree is a variation of the B-tree data structure. In a B + tree, data pointers are stored only at the leaf nodes of the tree. In this tree, structure of a leaf node differs from the structure of internal nodes. The leaf nodes have an entry for every value of the search field, along with a data p
      8 min read

    • Bitmap Indexing in DBMS
      Bitmap Indexing is a data indexing technique used in database management systems (DBMS) to improve the performance of read-only queries that involve large datasets. It involves creating a bitmap index, which is a data structure that represents the presence or absence of data values in a table or col
      8 min read

    • Inverted Index
      An Inverted Index is a data structure used in information retrieval systems to efficiently retrieve documents or web pages containing a specific term or set of terms. In an inverted index, the index is organized by terms (words), and each term points to a list of documents or web pages that contain
      7 min read

    • Difference between Inverted Index and Forward Index
      Inverted Index It is a data structure that stores mapping from words to documents or set of documents i.e. directs you from word to document.Steps to build Inverted index are:Fetch the document and gather all the words.Check for each word, if it is present then add reference of document to index els
      2 min read

    • SQL Queries on Clustered and Non-Clustered Indexes
      Indexes in SQL play a pivotal role in enhancing database performance by enabling efficient data retrieval without scanning the entire table. The two primary types of indexes Clustered Index and Non-Clustered Index serve distinct purposes in optimizing query performance. In this article, we will expl
      7 min read

    File organization

    • File Organization in DBMS - Set 1
      A database consists of a huge amount of data. The data is grouped within a table in RDBMS, and each table has related records. A user can see that the data is stored in the form of tables, but in actuality, this huge amount of data is stored in physical memory in the form of files. What is a File?A
      6 min read

    • File Organization in DBMS | Set 2
      Pre-Requisite: Hashing Data Structure In a database management system, When we want to retrieve a particular data, It becomes very inefficient to search all the index values and reach the desired data. In this situation, Hashing technique comes into the picture. Hashing is an efficient technique to
      6 min read

    • File Organization in DBMS | Set 3
      B+ Tree, as the name suggests, uses a tree-like structure to store records in a File. It uses the concept of Key indexing where the primary key is used to sort the records. For each primary key, an index value is generated and mapped with the record. An index of a record is the address of the record
      4 min read

geeksforgeeks-footer-logo
Corporate & Communications Address:
A-143, 7th Floor, Sovereign Corporate Tower, Sector- 136, Noida, Uttar Pradesh (201305)
Registered Address:
K 061, Tower K, Gulshan Vivante Apartment, Sector 137, Noida, Gautam Buddh Nagar, Uttar Pradesh, 201305
GFG App on Play Store GFG App on App Store
Advertise with us
  • Company
  • About Us
  • Legal
  • Privacy Policy
  • In Media
  • Contact Us
  • Advertise with us
  • GFG Corporate Solution
  • Placement Training Program
  • Languages
  • Python
  • Java
  • C++
  • PHP
  • GoLang
  • SQL
  • R Language
  • Android Tutorial
  • Tutorials Archive
  • DSA
  • Data Structures
  • Algorithms
  • DSA for Beginners
  • Basic DSA Problems
  • DSA Roadmap
  • Top 100 DSA Interview Problems
  • DSA Roadmap by Sandeep Jain
  • All Cheat Sheets
  • Data Science & ML
  • Data Science With Python
  • Data Science For Beginner
  • Machine Learning
  • ML Maths
  • Data Visualisation
  • Pandas
  • NumPy
  • NLP
  • Deep Learning
  • Web Technologies
  • HTML
  • CSS
  • JavaScript
  • TypeScript
  • ReactJS
  • NextJS
  • Bootstrap
  • Web Design
  • Python Tutorial
  • Python Programming Examples
  • Python Projects
  • Python Tkinter
  • Python Web Scraping
  • OpenCV Tutorial
  • Python Interview Question
  • Django
  • Computer Science
  • Operating Systems
  • Computer Network
  • Database Management System
  • Software Engineering
  • Digital Logic Design
  • Engineering Maths
  • Software Development
  • Software Testing
  • DevOps
  • Git
  • Linux
  • AWS
  • Docker
  • Kubernetes
  • Azure
  • GCP
  • DevOps Roadmap
  • System Design
  • High Level Design
  • Low Level Design
  • UML Diagrams
  • Interview Guide
  • Design Patterns
  • OOAD
  • System Design Bootcamp
  • Interview Questions
  • Inteview Preparation
  • Competitive Programming
  • Top DS or Algo for CP
  • Company-Wise Recruitment Process
  • Company-Wise Preparation
  • Aptitude Preparation
  • Puzzles
  • School Subjects
  • Mathematics
  • Physics
  • Chemistry
  • Biology
  • Social Science
  • English Grammar
  • Commerce
  • World GK
  • GeeksforGeeks Videos
  • DSA
  • Python
  • Java
  • C++
  • Web Development
  • Data Science
  • CS Subjects
@GeeksforGeeks, Sanchhaya Education Private Limited, All rights reserved
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our Cookie Policy & Privacy Policy
Lightbox
Improvement
Suggest Changes
Help us improve. Share your suggestions to enhance the article. Contribute your expertise and make a difference in the GeeksforGeeks portal.
geeksforgeeks-suggest-icon
Create Improvement
Enhance the article with your expertise. Contribute to the GeeksforGeeks community and help create better learning resources for all.
geeksforgeeks-improvement-icon
Suggest Changes
min 4 words, max Words Limit:1000

Thank You!

Your suggestions are valuable to us.

'); // $('.spinner-loading-overlay').show(); let script = document.createElement('script'); script.src = 'https://assets.geeksforgeeks.org/v2/editor-prod/static/js/bundle.min.js'; script.defer = true document.head.appendChild(script); script.onload = function() { suggestionModalEditor() //to add editor in suggestion modal if(loginData && loginData.premiumConsent){ personalNoteEditor() //to load editor in personal note } } script.onerror = function() { if($('.editorError').length){ $('.editorError').remove(); } var messageDiv = $('
').text('Editor not loaded due to some issues'); $('#suggestion-section-textarea').append(messageDiv); $('.suggest-bottom-btn').hide(); $('.suggestion-section').hide(); editorLoaded = false; } }); //suggestion modal editor function suggestionModalEditor(){ // editor params const params = { data: undefined, plugins: ["BOLD", "ITALIC", "UNDERLINE", "PREBLOCK"], } // loading editor try { suggestEditorInstance = new GFGEditorWrapper("suggestion-section-textarea", params, { appNode: true }) suggestEditorInstance._createEditor("") $('.spinner-loading-overlay:eq(0)').remove(); editorLoaded = true; } catch (error) { $('.spinner-loading-overlay:eq(0)').remove(); editorLoaded = false; } } //personal note editor function personalNoteEditor(){ // editor params const params = { data: undefined, plugins: ["UNDO", "REDO", "BOLD", "ITALIC", "NUMBERED_LIST", "BULLET_LIST", "TEXTALIGNMENTDROPDOWN"], placeholderText: "Description to be......", } // loading editor try { let notesEditorInstance = new GFGEditorWrapper("pn-editor", params, { appNode: true }) notesEditorInstance._createEditor(loginData&&loginData.user_personal_note?loginData.user_personal_note:"") $('.spinner-loading-overlay:eq(0)').remove(); editorLoaded = true; } catch (error) { $('.spinner-loading-overlay:eq(0)').remove(); editorLoaded = false; } } var lockedCasesHtml = `You can suggest the changes for now and it will be under 'My Suggestions' Tab on Write.

You will be notified via email once the article is available for improvement. Thank you for your valuable feedback!`; var badgesRequiredHtml = `It seems that you do not meet the eligibility criteria to create improvements for this article, as only users who have earned specific badges are permitted to do so.

However, you can still create improvements through the Pick for Improvement section.`; jQuery('.improve-header-sec-child').on('click', function(){ jQuery('.improve-modal--overlay').hide(); $('.improve-modal--suggestion').hide(); jQuery('#suggestion-modal-alert').hide(); }); $('.suggest-change_wrapper, .locked-status--impove-modal .improve-bottom-btn').on('click',function(){ // when suggest changes option is clicked $('.ContentEditable__root').text(""); $('.suggest-bottom-btn').html("Suggest changes"); $('.thank-you-message').css("display","none"); $('.improve-modal--improvement').hide(); $('.improve-modal--suggestion').show(); $('#suggestion-section-textarea').show(); jQuery('#suggestion-modal-alert').hide(); if(suggestEditorInstance !== null){ suggestEditorInstance.setEditorValue(""); } $('.suggestion-section').css('display', 'block'); jQuery('.suggest-bottom-btn').css("display","block"); }); $('.create-improvement_wrapper').on('click',function(){ // when create improvement option clicked then improvement reason will be shown if(loginData && loginData.isLoggedIn) { $('body').append('
'); $('.spinner-loading-overlay').show(); jQuery.ajax({ url: writeApiUrl + 'create-improvement-post/?v=1', type: "POST", contentType: 'application/json; charset=utf-8', dataType: 'json', xhrFields: { withCredentials: true }, data: JSON.stringify({ gfg_id: post_id }), success:function(result) { $('.spinner-loading-overlay:eq(0)').remove(); $('.improve-modal--overlay').hide(); $('.unlocked-status--improve-modal-content').css("display","none"); $('.create-improvement-redirection-to-write').attr('href',writeUrl + 'improve-post/' + `${result.id}` + '/', '_blank'); $('.create-improvement-redirection-to-write')[0].click(); }, error:function(e) { showErrorMessage(e.responseJSON,e.status) }, }); } else { if(loginData && !loginData.isLoggedIn) { $('.improve-modal--overlay').hide(); if ($('.header-main__wrapper').find('.header-main__signup.login-modal-btn').length) { $('.header-main__wrapper').find('.header-main__signup.login-modal-btn').click(); } return; } } }); $('.left-arrow-icon_wrapper').on('click',function(){ if($('.improve-modal--suggestion').is(":visible")) $('.improve-modal--suggestion').hide(); else{ } $('.improve-modal--improvement').show(); }); const showErrorMessage = (result,statusCode) => { if(!result) return; $('.spinner-loading-overlay:eq(0)').remove(); if(statusCode == 403) { $('.improve-modal--improve-content.error-message').html(result.message); jQuery('.improve-modal--overlay').show(); jQuery('.improve-modal--improvement').show(); $('.locked-status--impove-modal').css("display","block"); $('.unlocked-status--improve-modal-content').css("display","none"); $('.improve-modal--improvement').attr("status","locked"); return; } } function suggestionCall() { var editorValue = suggestEditorInstance.getValue(); var suggest_val = $(".ContentEditable__root").find("[data-lexical-text='true']").map(function() { return $(this).text().trim(); }).get().join(' '); suggest_val = suggest_val.replace(/\s+/g, ' ').trim(); var array_String= suggest_val.split(" ") //array of words var gCaptchaToken = $("#g-recaptcha-response-suggestion-form").val(); var error_msg = false; if(suggest_val != "" && array_String.length >=4){ if(editorValue.length { jQuery('.ContentEditable__root').focus(); jQuery('#suggestion-modal-alert').hide(); }, 3000); } } document.querySelector('.suggest-bottom-btn').addEventListener('click', function(){ jQuery('body').append('
'); jQuery('.spinner-loading-overlay').show(); if(loginData && loginData.isLoggedIn) { suggestionCall(); return; } // script for grecaptcha loaded in loginmodal.html and call function to set the token setGoogleRecaptcha(); }); $('.improvement-bottom-btn.create-improvement-btn').click(function() { //create improvement button is clicked $('body').append('
'); $('.spinner-loading-overlay').show(); // send this option via create-improvement-post api jQuery.ajax({ url: writeApiUrl + 'create-improvement-post/?v=1', type: "POST", contentType: 'application/json; charset=utf-8', dataType: 'json', xhrFields: { withCredentials: true }, data: JSON.stringify({ gfg_id: post_id }), success:function(result) { $('.spinner-loading-overlay:eq(0)').remove(); $('.improve-modal--overlay').hide(); $('.create-improvement-redirection-to-write').attr('href',writeUrl + 'improve-post/' + `${result.id}` + '/', '_blank'); $('.create-improvement-redirection-to-write')[0].click(); }, error:function(e) { showErrorMessage(e.responseJSON,e.status); }, }); });
"For an ad-free experience and exclusive features, subscribe to our Premium Plan!"
Continue without supporting
`; $('body').append(adBlockerModal); $('body').addClass('body-for-ad-blocker'); const modal = document.getElementById("adBlockerModal"); modal.style.display = "block"; } function handleAdBlockerClick(type){ if(type == 'disabled'){ window.location.reload(); } else if(type == 'info'){ document.getElementById("ad-blocker-div").style.display = "none"; document.getElementById("ad-blocker-info-div").style.display = "flex"; handleAdBlockerIconClick(0); } } var lastSelected= null; //Mapping of name and video URL with the index. const adBlockerVideoMap = [ ['Ad Block Plus','https://media.geeksforgeeks.org/auth-dashboard-uploads/abp-blocker-min.mp4'], ['Ad Block','https://media.geeksforgeeks.org/auth-dashboard-uploads/Ad-block-min.mp4'], ['uBlock Origin','https://media.geeksforgeeks.org/auth-dashboard-uploads/ub-blocke-min.mp4'], ['uBlock','https://media.geeksforgeeks.org/auth-dashboard-uploads/U-blocker-min.mp4'], ] function handleAdBlockerIconClick(currSelected){ const videocontainer = document.getElementById('ad-blocker-info-div-gif'); const videosource = document.getElementById('ad-blocker-info-div-gif-src'); if(lastSelected != null){ document.getElementById("ad-blocker-info-div-icons-"+lastSelected).style.backgroundColor = "white"; document.getElementById("ad-blocker-info-div-icons-"+lastSelected).style.borderColor = "#D6D6D6"; } document.getElementById("ad-blocker-info-div-icons-"+currSelected).style.backgroundColor = "#D9D9D9"; document.getElementById("ad-blocker-info-div-icons-"+currSelected).style.borderColor = "#848484"; document.getElementById('ad-blocker-info-div-name-span').innerHTML = adBlockerVideoMap[currSelected][0] videocontainer.pause(); videosource.setAttribute('src', adBlockerVideoMap[currSelected][1]); videocontainer.load(); videocontainer.play(); lastSelected = currSelected; }

What kind of Experience do you want to share?

Interview Experiences
Admission Experiences
Career Journeys
Work Experiences
Campus Experiences
Competitive Exam Experiences