Northeastern University Online College of Professional Studies Course Syllabus Instructor Name: Stephen Kafka E-mail: s.kafka@neu.edu Phone Number: 781-461-3581 (W) 508-944-8180 (C) ITC3020 Leveraging Database Technologies Fall 2015, 6-week term November 2, 2015 December 19, 2015 Required Text(s)/Software/Tools: Database Systems: Design, Implementation, and Management, 11e Carlos Coronel, Steven Morris, and Peter Rob. Course Technology / Cengage Learning. 2013. ISBN-13: 978-1285196145 ISBN-10: 1285196147 Course Prerequisites Prereq. ITC 3001 or ETC 3271. Course Description Focuses on advanced features of database design, administration, and applications. Topics include an overview of database transaction processing, database security, database maintenance, and emerging trends in mass data storage and retrieval. Course Outcomes Students will have the opportunity to learn about transaction management and concurrency control, performance tuning and query optimization, distributed database systems, business intelligence, database web technologies and database administration and security. Course Methodology Each week, you will be expected to: 1. Review the week's learning objectives. 2. Complete all assigned readings. 3. Complete all lecture materials for the week. 4. Participate in the Discussion Board. 5. Complete and submit all assignments and tests by the due dates. Participation/Discussion Board 1
Participation in the Discussion Board questions is an essential part of your learning experience. As written in the Grading section of this syllabus, active participation through written responses to Discussion Board "prompts" will earn a significant portion of your final grade. When fellow students post to the Discussion Board, interaction by other students is desirable and if I can be helpful, I will also participate. Of course, when a student posts a question directed to me only I will respond. Each week you are expected to respond to one of several questions that will be posted. You are also expected to reply to at least one post by another student. Please try and provide you initial response by Wednesday as this will allow everyone time to post a reply. You will earn 50% of your grade with your initial post. You will earn 50% of your grade with your reply to another student s post. The discussion board will be closed at midnight each Sunday. This policy will be strictly enforced. Communication/Submission of Work In the Assignments folder, click on the View/Complete Assignment link to view each assignment. Attach your completed assignments here and click Submit to turn them in to me. Once your assignment has been graded, you will be able to view the grade and feedback I have provided by clicking on Tools, View Grades from the Northeastern University Online Campus tab. Grading/Evaluation Standards Discussion Board 10% Weekly Quizzes and Assignments 60% Final Exam 30% TOTAL 100% For the quizzes, if you are tardy, without a valid excuse, you will be assessed a 10% per week late penalty. Discussion boards will close on the last day of each week. Class Schedule / Topical Outline Specific Reading Assignments will be posted online Week Dates Topic Assignments 1 11/2 11/8 Chapter 10 Transaction Management and Concurrency Control 1. About database transactions and their properties 2. What concurrency control is and what role 2
it plays in maintaining the database s integrity 3. What locking methods are and how they work 4. How stamping methods are used for concurrency control 5. How optimistic methods are used for concurrency control 6. How database recovery management is used to maintain database integrity 1. Basic database performance-tuning concepts 2. How a DBMS processes SQL queries 2 11/9 11/15 Chapter 11 Database Performance Tuning and Concurrency Control 3. About the importance of indexes in query processing 4. About the types of decisions the query optimizer has to make 5. Some common practices used to write efficient SQL code 6. How to formulate queries and tune the DBMS for optimal performance 1. About distributed database management system (DDBMSs) and their components 3 11/16 11/22 Chapter 12 Distributed Database Management Systems 2. How database implementation is affected by different levels of data and process distribution 3. How transactions are managed in a distributed database environment 4. How distributed database design draws on data partitioning and replication to balance performance, scalability, and availability 5. About the trade-offs of implementing a 3
distributed data system 11/23 11./29 No Classes Thanksgiving Week 1. How business intelligence provides a comprehensive business decision support framework 2. About business intelligence architecture, its evolution, and reporting styles 3. About the relationship and differences between operational data and decision support data 4 11/30 12/5 Chapter 13 Business Intelligence and Data Warehouses 4. What a data warehouse is and how to prepare data for one 5. What star schemas are and how they are constructed 6. About data analytics, data mining, and predictive analytics 7. About online analytical processing (OLAP) 8. How SQL extensions are used to support OLAP-type data manipulations 1. About various database connectivity technologies 2. How web-to-database middleware is used to integrate databases with the Internet 5 12/7 12/13 Chapter 14 Database Connectivity and Web Technologies 3. About web browser plug-ins and extensions 4. What services are provided by web application servers 5. What Extensible Markup Language (XML) is and why it is important for web database development 6. About cloud computing and how it enables the database-as-a-service model 4
1. That data are a valuable business asset requiring careful management 2. How a database plays a critical role in an organization 3. That the introduction of a DBMS has important technological, managerial, and cultural consequences for an organization 6 12/14 12/19 Chapter 15 Database Administration and Security 4. About the database administrator s managerial and technical roles 5. About data security, database security, and the information security framework 6. About several database administration tools and strategies 7. How various database administration technical tasks are performed with Oracle Academic Honesty and Integrity Statement The University views academic dishonesty as one of the most serious offenses that a student can commit while in college and imposes appropriate punitive sanctions on violators. Here are some examples of academic dishonesty. While this is not an all-inclusive list, we hope this will help you to understand some of the things instructors look for. The following is excerpted from the University s policy on academic honesty and integrity; the complete policy is available at http://www.cps.neu.edu/about-cps/policies-and-procedures. Cheating intentionally using or attempting to use unauthorized materials, information or study aids in an academic exercise. This may include use of unauthorized aids (notes, texts) or copying from another student s exam, paper, computer disk, etc. Fabrication intentional and unauthorized falsification, misrepresentation, or invention of any data, or citation in an academic exercise. Examples may include making up data for a research paper, altering the results of a lab experiment or survey, listing a citation for a source not used, or stating an opinion as a scientifically proven fact. Plagiarism intentionally representing the words or ideas of another as one s own in any academic exercise without providing proper documentation by source by way of a footnote, endnote or intertextual note. Unauthorized collaboration Students, each claiming sole authorship, submit separate reports, which are substantially similar to one another. While several students may have the same source material, the analysis, interpretation and reporting of the data must be each individual s. Participation in academically dishonest activities Examples include stealing an exam, using a pre-written paper through mail order or other services, selling, loaning or otherwise 5
distributing materials for the purpose of cheating, plagiarism, or other academically dishonest acts; alternation, theft, forgery, or destruction of the academic work of others. Facilitating academic dishonesty Examples may include inaccurately listing someone as coauthor of paper who did not contribute, sharing a take home exam, taking an exam or writing a paper for another student. Northeastern University Online Policies and Procedures For comprehensive information please go to http://www.cps.neu.edu/online/ Northeastern University Online Copyright Statement Northeastern University Online is a registered trademark of Northeastern University. All other brand and product names are trademarks or registered trademarks of their respective companies. This course material is copyrighted and all rights are reserved by Northeastern University Online. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual, or otherwise, without the express prior written permission of Northeastern University Online. Copyright 2015 by Northeastern University Online All Rights Reserved 6