Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
155 views
Database Administration & Data Mining
Data mining
Uploaded by
satoshi
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Database administration & data mining For Later
Download
Save
Save Database administration & data mining For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
155 views
Database Administration & Data Mining
Data mining
Uploaded by
satoshi
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Database administration & data mining For Later
Carousel Previous
Carousel Next
Save
Save Database administration & data mining For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 18
Search
Fullscreen
Introduction to Database Management System To study different models and types of DBMS. To understand the purpose of DBMS. To know the advantages and disadvantages of DBMS. i INTRODUCTION « Inany organization, data is the basic resource needed to run the organization. This data is required by decision makers for processing and retrieving information. * Data is collection of information or real facts which can be recorded and have implicit meaning. Customer_name, item_price, balance etc. can be considered as data. + A database is a shared collection of related data. By data, we mean known facts that can be recorded and that have implicit meaning. * For example: Consider the names, telephone numbers and addresses of the people that you know. This data is recorded in an indexed address book or stored on a diskette or using a personal computer. This is a collection of related data with an implicit meaning and hence is a database. * A Database Management System is a computer based system or program to record and maintain information or data. A database can be viewed as a repository of data that is defined once and then accessed by various users as shown in the figure below:* DBMS performs following functions: + Examples of \de convenient ‘The objective of DBMS Is to provi storing and retrieving the information contained are to be shared among several users, the system must avold possibl ‘The main objectives of database management system are data availability, data Interty data security and data independance, 1. Data Availability: Database Managem Data availability refers tothe fact thatthe data are made available: = Bs. o toawide variety of users. “ant tae © inameaningful format. 1. Bank database which stores customers banking data. 2. Hospital sbase which stores patient data, 3. University database which stores student * A Database Management System (DBM: Gefine, manipulate and process the data i tion, at reasonable cost. with ease of access. © when and where required. Ra ae i 1e degree or extent to which data is readily usable along ina database, in order to produe _* Data availability defines the degree or with the necessary IT and % Bata ‘Security and Data Integrity: This is the most important functon a database which handles the security and ity scheme of database ta definition defines the structure of database. It also define manufacturers and storage structure, vices thi "ntains manipulation of data, ie. inserting, modifying deleting data ‘4 Data Recovery: It recovers data inthe database after system failure. Concurrency: It handles concurrent access of multiple users smmon DBMS Software: * ver. known as id be minutes, hours or days. Data availability is ¥¢ design, implementation and usage of any system. ves data, Sybase Informix Mysqu idity checks that make your cura rity the maintenance and assurance of accuracy and consistency of dataDatabase Administration & Data Minky -Sem.¥)_14 In to Database Management System over its entire lifecycle, Data integrity is implemented within a database by suitable design, ané authenticating the data by using error checking and validation routines For example, to maintain data Integrity numeric columns/cells should not accept security, Data security refers to protective di unauthorized access to computers, refers tothe fact that only authorized enforced by passwords. If two separate users are accessing a particular same time, the DEMS must not allow them to make conflicting changes. Data security protects data from corruption, Italso refers tothe collective measures used to protect, base and ts management software from illegal use and malicious cludes the processes, tools and methodologies that ensure secu ina database environment, Data security is an essential aspect of I for organizations of every size and type. Database security professionals employ a number of practices to assure data integrity, including cryption, which locks data by encryption ckup which store acopy of data in an alternate location. 3. Access controls, including assignment of read/write privileges 4 Input validation that prevents incorrect d 5. Data validation that certifies uncorrupted transmission Data independ (ne ofthe main objectives of DBMS is to facilitate sharing of a database by current and future applications. The DBMS should not be tailored toa specific platform. One should be able to run DBMS on any platform, DBMS must ensure data independence for application programs. racy measures that are appl databases or parts thereof. and secure a di ‘+ For example, if we want to change or upgrade the storage system itself like replacing «hard-drive with a SSD it should not have any effect on the logical data or schemas. Data independence allows Change of database without affecting application programs. Change of hardware or system software without affecting appli Sharing of data by different applications by providing views appropriate for the application. Control of Redundancy. programs. inserted/updated/deleted from a database. Query: A query isa request for data or information from a database table or combination of tables. SQL Is the most widely-used and well-known query language, It is familiar to most database administrators (DBAs) also called a storage engine. software that stores database. It may be a self-contained program or part of a database management system (DBMS) that performs the storage and retrieval. Hl three-tier Architecture for DBMS DBMS architecture helps in design, development, implementation, and maintenance of a database. A database stores critical information for a business. Selecting the correct Database Architecture helps in quick and secure access to this data. ‘+ Three-tier architecture is a type of software architecture which is composed of three specific type of client added between the user sy ‘management server environment ‘al computing. They are often used in applications as a fet system. In the three tier architecture, a middle tier was interface client environment and the database “layers” of I Three-Tiers of Architecture: + This architecture has the following 3-tiers: a 3. Di Presentation Tier: The presentation tier is the front end layer in the 3-tier system. and consists of the user interface. This user interface is often a graphical one accessible through a web browser or web-based application. This displays content ‘and information useful to an end user. This tier is often built on web technologies such as HTMLS, JavaScript, CSS, or through other popular web development frameworks, and communicates with other layers through API calls. ‘Application (logic) Tier: The application tier contains the functional business logic which drives an application's core capabilities. I's often written in Java, NET, Ce, Python, C++, etc ‘Tier: The data tier comprises of the database/data storage system and data access layer. Examples of such systems are MySQL, Oracle, PostgreSQL, Microsoft SQL Server, MongoDB, etc. Data is accessed by the application layer via API calls. | a==. {nto Database Management System pqigpase Adminstration & Deta Mining (BBA-Sem.V) 1.7 ___ In. to Database Management System Database Administration & Data Mining (BBA Sem.¥) 1.6 bstraction. It describes how the data is \ctures and access methods to be used by the database. At the physical level, low-level data structures are described in detail. The internal view is expressed by the internal schema which contains the definition of stored records, the method of representing the data fields and the access aids used. ‘The DBA is able to change the conceptual structure of the databa affecting all users. the highest level of abstraction. It describes only a part of the entire of the database syster tructure is more complex as compared to 1 and 2 ti Applications: + E-comi «Database related Websites. EEE) vata abstraction and 3-Schema Architecture rovide users with an abstract view of the data. Many ined; hence the complexity is hidden specified table or tables, Dynamic views are ted objects or extended objects are created or details of how the da maintained 2 © Fig di? shows the thresteyslactabetrectionst /s must be manually updated when related objects or extended objects cor changed.Advantages: 4. Provide additional level of table security: By restricting access to a predetermined set of rows or columns of a table. 2. Wide Data complexity: The view hides the fact that this information actually ‘originates from several tables. 3. Simplify Statements for User: Views allow users to select information from ‘multiple tables without actually knowing how to perform a join. 44. Present Data in different perspective: Columns of views can be renamed without affecting the tables on which the views are based. base tables: If a view is a fifth column is added or applications are unaffected referencing three columns of a fourth column is changed, the Disadvantages: ‘4. Rows available through a view are not sorted and are not orderec cither. 12. When tableis dropped view becomes inactive, it depends on the table ot 3, Itaffects performance, querying from view takes more time than directly querying from the table. © An example in the real-world is a mobile or Smartphone. The user d ‘understand the details of how a phone calls are placed or how ‘These details are abstracted away from the phone's interface phone easier and more effective to use. The design of the mobile or Smartphone Clearly separates the interface from the implementation. The user can learn the functions of the phone without ever having to know anything about how the phone ‘works internally FEE) pata Instances and Data Schema of information stored in the database at a parti + The design of a database at ph; + Design of datat 1s Analogy to the concept of data types, variables and values in programming language: Consider a structure inc. struct student design of the dat show the data present in those tables. Schema is only a structural view (d sn) of a database as shown in the diagram below: Course Student Course ie Sudent CCouree_name ‘Student_name| Department Course le ‘Schema ‘Seaton ‘Section i Stusent id Course |e Fig. 1.4 DBMS Schema level is called Physical schema. This describes rage is described at this level. alled Logical schema, Programmers and hhow the dat interaction with database systems,‘Database Administration & Data Mining (BBA. Sem. ¥) 1.10 Database Languages ‘© Data language consists of two parts: Data Definition Language and Data Manipulation Language. Data Definition Language: Database schema is specified by a set of definitions which are expressed by a special language called Data Definition Language (DDL). (a) Data Dictionary: The result of compilation of DDL statements is a set of tables. is stored in a special file called Data Dictionary or System catalogues. This file contains Metadata ie. data about data. Data Dictionary stores the definition of characteristics of data and relationships. Data Dictionary provides the DBMS with its self-describing characteristic. () Data Storage and Definition Language: The storage structure and access ‘methods used by the database system are specified by a set of definitions in a special type of language - DDL(Data Storage and Definition Language) Data Manipulation Language: DML isa language that enables users to access or manipulate appropriate data model. ata manipulation means: © Toretrieve the information from the database, © Toinsert information into the database. © Todelete information from the database. ‘© Temodify information from the database. Types of DML: ‘+ There are two types of DML: 41. Procedural DML: It requires a user to specify what data is needed and how to get that data, 2. Non-procedural DML: It requires a user to specify what data is needed without specifying how to get that data, Database Users IMS provide an environment to store and retrieve information. On the basis of {interaction with the system, users are differentiated as following types: 1. Database Designers: Database designers are the computer professionals who responsible for developing database oriented application/softwares. Database Designers use various database software for developing database applications / softwares, (fr example, MySQL, SOL server. 3s organized by the ummers: These computer professionals are responsible for ion programs. For development of application programs, these sd a general purpose programming language like C, COBOL. Pascal. ‘Through these programs they handle or manipul not write programs. To interact with the system, they use query SQL. These are users who may communicate with the database dire line terminal or indirectly via a user interface and application program. These users are aware of the presence of the database system and have limited Interaction with database through appl of these users may also use a data manipulation language to manipulate the database directly. They are also called on-line users, End Users (Naive users): The users who are not aware of the presence of database system or any other system are called as unsophisticated users, These users called En Specialized Us which does not nal data framework. For example: Computer-aided design system, knowledge base and expert systems, ete that store data with complex data types (For example: graphics data and audio environment-modeling systems, }. Database Manager: Databases require a large amount of storage space, so storing the database requires secondary storage. It is essential that the database systems, structure the data to minimize the need to move data between disk and main tabase manager is a program module, which provides the interface low-level data stored in the database and the application programs submitted to the system. The database manager {s responsible for the sd on the disk using the ‘manager: The raw data is st sually provided by a conver The database manager translates the various DML file system commands. Thus, the database manager is responsible for the actual storing, retrieving and updating of data in the database. Integrity enforcement: The data values stored in the database must satisfy certain types of consistency constraints eg. the number of hours an employee may work in one week may not exceed more than some specific (ay 80 hrs) otherwise appropriate action is taken by database manager. (lil) Security: Security to users is provided by database manager ie. toaccess only required data. (iv) Backup and Recovery: In case of hard disk crash or power failure or software errors, the database manager has the responsibility to detect such failures and restore the data (ii)Oe i all aaa Ly ov eee, ie
Administrative DBA:They maintain and run the organization. They are mainly concerned with the and backup of data. © Development DBA: They work on developing SQL queries and to meet the requirements of the business. They speci relationships. They are mainly business requirements ina s © Data Warehouse DBA: They them in a data warehouse. Todevelop and manage back up. ‘To.construct recovery plans. ‘memory, disk space, network requirements, ete.ra ————— tt tt—‘“—S Sr ions pabase Administration & Osta Mining (BBA~Sem.V) 25 Database Administration «6g, Authentication: ‘setting up employee access is an important aspect of database security. DBAS control ‘who has access and what type of access they are allowed. For Instance, a user may only certain pieces of information or they may be denied the nave permission ability to make changes to the system. ‘The DBA needs to know how large the database currently is and how fast itis growing in order to make predictions about future needs, Storage refers to how much room — i. the database takes up in server and backup space. Capacity refers to usage level 1fthe company is growing quickly and adding many new users, the DBA will have to create the capacity to handle the extra workload. jata is availabi primary job is to ensure that data is ie tion, and easily accessible as needed. Below are some ‘make up the day-to-day work of a DBA. ‘8, Performance Monitoring: Monitoring databases for performance issues is part of the on-going system or use, As updates an for wae DBA handles the trar saintenance a DBA performs. If some part ofthe system is slowing dawn processing, dace from the esting pete tothe new platform. 2. Data Extraction, Transformation and Loading : ied from importing large oumes of data that have Ben extrac a ta ‘warehouse environment. This external data is cleaned up monitoring tools are available, and part of the the DBA may need to make conf 1ey need to track to improve the system. 3° party hardware capacity. Many typ ‘DBA's job is to understand w! organizations can be ideal for outsourcing this aspect, but make sure they offer ‘modern DBA support. images, documents, or sound and video files. Managing a very large may require higher-level skils and additional monitoring and tuning to efficiency. 4 Database Backup and Recovery: DBAs create backup and recovery plans and procedures based on practices, then make sure that the necessary steps are followed 10. Troubleshoot any problems. Whether they need to to minimize damage, a DBA needs to ‘and money, $0 the DBA may have to persuade management precautions to preserve data ‘System admins or other personnel may actually create the backups, bu! e responsibility to make sure that everything is done on In the case of a server failure or other form of data ‘when they occur. TRANSACTION MANAGEMENT ; 2 * Collection of operations that forms a single logical unit of work is called transaction, the result of execution of a user program, written in a high very strategies an: possiblity. With technology change, itis becoming ever backup databases to the cloud, Oracle Cloud for Oracle Databas SQL Server. 5. Security: A DBA needs to know pote company's overall system and work to mi cent immune to attacks, but implementing In the case ofa security breach or irregularity, who has done what to the data. Audit trails are also impo regulated data.26 ‘Database Administration the same time and they may be accessing cess to the database may result in some DDatabose Administration & Data Mining ( ‘+ Number of transactions can be executed ich concurrent a transaction management preserves the Jymanagement unit of ant accesses. base in case of concurre! Concept of Transaction Processing Concept of ra ran that acer change te nef database ‘© Transaction processing means indivisible operations, called transactions. ‘+ Transaction processing is designed dividing information processing up into individual, database integrity (the consis which would be a customer order, consists of a stock and so forth) that are treated as awhole, ‘+ Transaction is a logical unit of. Tear (CONDE or ct nea ety (CMT oe oF LBACK A ane could bean ete BOTAN, & jrtion of a program ora single command. Operations in Transaction The main operations ina transaction are 1. Read Operation 2. Write Operation 1. Read Operation: + Read operation reads the data from the database and then stores it in the buffer in main memory, + For example instruction will read the value of A from the database and will store it in the buffer in main memory. 2. Write operation: + Write operation writes the updated data value back tothe database from the buffer. + For example, Write (A) will write the updated value of A from the buffer to the database. ‘Simple Transaction Example Following example shows bank transaction. 1. Read your account balance. Deduct the amount from your balance. ‘Write the remaining balance to your account. Read your friend's account balance. Add the amount Write the new updated balance to his account. either completed in its ‘account balance. ae ase Administration & Date Wing BBA Sem.v) 27 Ontabase Adminisretion || This whole set of operations canbe called transaction, Although you write and update oper in the above example but the tra ‘operations like in DBMS, we write the above 6 steps transaction like this: Let's say your account is A and your friend's account is B, you are transferring 10000 from A to B, the steps of the transaction are: 1 RA) 2, A=A-10000; seen read, fon can have 5. wet above transaction, R refers to the Read operation and W refers to the write ion. E) AcID Properties + To ensure the integrity of data, database system maintains following properties of transaction. 1. Atomicity: By this, we mean that either the entire transaction takes place at once or doesn't happen at all. There is no midway ie. transactions do not occur ‘considered as one unit and either runs to completion, ©) commit known as the ‘All or nothing rule’ 2. Consistency: Consistency property of transaction implies that ifthe database was in consistent state before the start of a transaction, then on termination of a transaction, the database will also be ina consistent state. In other words, all data Ina database must work as a state machine. The database must ensure all data is ‘lation property of transaction indicates that action performed by a ll be hidden from outside the transaction until the transaction terminates. Thus each transaction is unaware of other transactions executing ly in the system, In other words, queries and transactions always run at time. You can query data while many other users are changing data and. ‘you will not see their changes and they will not see each other's changes. 4. Durability: Durability property of a transaction ensures that once a transaction ‘completes successfully (commits), the changes ithas made to the database persist, feven if there are system failures. Write-ahead logs provide absolute data durability until data is eventually wi to permanent data and index files. ft ..ts ns RR EIT OE teat Database Administration & Data Mining (BBA Sem. V) 28 Database Administratag ‘© These four properties are often called ACID (Atomicity, Consistency, Isolation, Durability) properties of transaction. The ACID properties are intended to guarantey valid database transactions, even if there are network errors, disruptions, hardwayy failures, etc. For this reason, ACID-compliant databases are important fo, organizations in many different types of industries, especially those who condug, ‘monetary transact! time-sensitive data, or manage/monitor data in ‘manufacturing, transportation or energy production. ACID Property Example: 1. Atomicity: Consider the following transaction T consisting of Tt and T2: Transfer of 100 from, account X to account ¥. Table 2.4: Atomicity of Transaction Transaction T After: X 1 400 ‘+ If the transaction fails after completion of Ti but before com; write(®) but before write()), then amount has been deduct Y. This results in an inconsistent database state. Ther executed in entirety in order to ensure correctness of. ‘example above, the total amount before and a! ‘must be maintained, Total before T occurs = 400 + 300 = 700. Therefore, database is cons completes but T2 fails. Asa result Tis incomplete ! 3. Isolation: VetX= 500, ¥=500, Consider two transactions T and”, Table 2.2: Isolation of Transaction patbase Administration & Data Mining (BBA-Sem.) 2.9 ‘| suppose Thas been executed till Read (Y) and then T" starts. As a result, interleaving cof operations takes place due to which 7” reads correct value of X but incorrect value of and sum computed by T's (HY = 50, 000+500=50, 500) is thus not consistent with the sum at end of transaction: 1. (K+¥=50, 000 + 450= 50, 450), «This results in database inconsistency, due to a loss of 50 units. Hence, transactions ‘must take place in isolation and changes should be visible only after they have been made tothe main memory. 4, Durability: «once the transaction has completed execution, the updates and modification database are stored in and written to disk and they persist even ‘eccurs, These updates now become permanent and are memory. The effects ofthe transaction, thus, are never lost. PFW) states of Transaction ‘Transaction States Falea Completed Aborted 2.1: States of Transaction, es of a transaction during its execution, cycle of a transaction, + All the changes made by the transaction now are memory. 2, Partially Committed State: fed in the buffer in main of transaction has executed, it enters into apartiallyDatabase Administraven Database Administration & Data Mining (BBA Sem.) 2.10 + After a transaction has entered the committed state, transaction. ‘+ In other words, itis not possible to undo the chang transaction. + This is because the system is update 7 + The only way to undo the changes is by carrying out another transaction caleg as compensating transaction that performs the reverse operations. 4, Failed state: © Whena transaction is and some failure occurs due to which ‘execution, it enters into failed state. 5. Aborted state: ‘After the transaction has failed and entered into a failed state, all the changes mate by it havetobe undone. + To undo the changes made by the transaction, it becomes necessary to roll back the jt possible to roll back the ave been made by the ‘a new consiste setting executed in the active state or partially committed state becomes impossible to continue the transaction. ‘+ After the transaction has rolled back completely, it enters into an aborted state 6, Terminated State: ‘+ Thisis the last state in the lifecycle of a transaction ‘After entering the comm into a terminated state where its lifecycle finally comes to an end. State Diagram of Transaction states in DBMS: ‘+ Thestate diagram corresponding to transac transaction finally enters states is given in Fig, 22. -_ Administration & Date Mining (BBA-Sem.v) 241 Database Aamivara paabase on + When it completes exe committed state and ‘enters into the Committed state, afsome failure occurs in Active state or Partially Committed into the Failed state. When the transaction is in fail «When the transaction is in aborted state, the system has two options: 4. If the transaction was aborted as a result of some hardwat some Fe oF software error (software error which is not created because of some internal logic of Management System (DBMS) is an IT 18, querying and tuning the database ‘processing in a DBMS which entails oneSS Q1 Multiple Choice Questions. 1. Traditional data administrator performs which of the following roles? (a) Tune database performance. (©) Establish backuy ry procedures, (d)_ Protect the security of the database. -none” property is commonly referred to as (&) Durability (@) None of the mentioned (©) Atomicity 3. Which of the following is a property of transactions? (a) Atomicity (@) Durability (©) Isolation (@) Allofthe mentioned 4, Execution of translation in isolation preserves the ofa database. () consistency (@) Allof the mentioned Which of the following systems is responsible for ensuring durab Recovery system {tomic system Concurrency control system ‘Compiler system ich ofthe following systems is responsible for ensuring isolation? Atomicsystem ‘q.2Filtinthe blanks. ‘consists of everything required to manage a database and make it a responsible for building a structure the meets the business requirements inaspecificarea. 5, A___ is the execution of a program that accesses or changes the contents of a database. ‘Atransaction always starts with ‘The is the person who manages, backs up and ensures the availability of the data produced and consumed by today's organizations via their IT systems. ‘Transaction is ‘When a transaction completes its fin 1fthe system decides that the normal execution proceed, then transaction is termed as. When the transaction completes its execution successfully it enters partially committed state. 40, Astateis said tobe is committed or aborted ‘ans. : 1 Database Adminis Data Architect, 3. transaction, 4. A 5 database administrator (DBA), 6. active, 7. partially committed state, 8. failed 9,committed state, 10, terminated. q3Match the pairs. Haw, ep] state, entersin the transaction can no longer from a. Recovery system Concurrency control system Compiler system A | atomicity 1 [Enables transactions to operate | 8 Which ofthe following is nt a transaction state? | independently of and transparent to Active Partially committed |e failed (@) Compensated oe ach other — — 9, Whatare ACID properties of Transactions? 8 | consistency 2 | Ensures that the database properly (a) atomicity, Consistency, 10 changes states upon a successfully (b) Atomicity, Consistency, Is — (¢)Atomicity, Consistency, incor © | Isolation | 3 or effect of a) (@) Automatically, Concurrency, isolation, Durability insaction persists in case | Answers ofasystem failure, | 10 | 2@ 4.0) D | purabitity 4 | Ensures that all operations within the work unit are completed successfully 8.(4) .B-2, C4, D-3,
You might also like
Lalit ISM File
PDF
No ratings yet
Lalit ISM File
28 pages
Group8 - Ratio Analysis of Yes Bank
PDF
No ratings yet
Group8 - Ratio Analysis of Yes Bank
14 pages
Final Ishita Sayaji Hotel Project For Marketing Management
PDF
No ratings yet
Final Ishita Sayaji Hotel Project For Marketing Management
34 pages
Project On Ratio Analysis
PDF
No ratings yet
Project On Ratio Analysis
18 pages
Current Visualization Practitioners Note
PDF
No ratings yet
Current Visualization Practitioners Note
4 pages
Final
PDF
No ratings yet
Final
77 pages
Economic Value Added A Study On Selected Indian Banks
PDF
No ratings yet
Economic Value Added A Study On Selected Indian Banks
71 pages
Summer Training Project Report
PDF
No ratings yet
Summer Training Project Report
60 pages
Financial Statements, Mis and Financial Kpis
PDF
No ratings yet
Financial Statements, Mis and Financial Kpis
2 pages
Project Report On Financial Analysis of Reliance Industry Limited PDF Free
PDF
No ratings yet
Project Report On Financial Analysis of Reliance Industry Limited PDF Free
85 pages
Jain Industries
PDF
No ratings yet
Jain Industries
84 pages
Role of MIS in Banking Industry
PDF
No ratings yet
Role of MIS in Banking Industry
2 pages
Ratio Analysis
PDF
No ratings yet
Ratio Analysis
48 pages
Assignment Group 11 - MBA ZG541 - v3.0
PDF
No ratings yet
Assignment Group 11 - MBA ZG541 - v3.0
33 pages
MB0048 Operations Research
PDF
No ratings yet
MB0048 Operations Research
27 pages
Organization Study of KSRTC
PDF
100% (2)
Organization Study of KSRTC
3 pages
Presentation On Project Report
PDF
No ratings yet
Presentation On Project Report
13 pages
Master of Business Administration 2020-2022: Financial Analysis of Infosys Ltd. For THE YEAR 2016-20
PDF
No ratings yet
Master of Business Administration 2020-2022: Financial Analysis of Infosys Ltd. For THE YEAR 2016-20
36 pages
Completed Project
PDF
No ratings yet
Completed Project
64 pages
A Study On Inventory Management in Manna Southern Health Foods Private Limited (1) - 1
PDF
No ratings yet
A Study On Inventory Management in Manna Southern Health Foods Private Limited (1) - 1
49 pages
Project On Ratio Analysis
PDF
No ratings yet
Project On Ratio Analysis
64 pages
Financial Statement Analysis of ICICI Bank and A Comparative Study With Axis Bank
PDF
100% (1)
Financial Statement Analysis of ICICI Bank and A Comparative Study With Axis Bank
7 pages
A Financial Statement Analysis Project
PDF
100% (1)
A Financial Statement Analysis Project
14 pages
Synopsis of Financial Analysis Canara Bank
PDF
No ratings yet
Synopsis of Financial Analysis Canara Bank
2 pages
Project On PSU Bank
PDF
No ratings yet
Project On PSU Bank
92 pages
Ratio Analysis Project
PDF
0% (1)
Ratio Analysis Project
65 pages
Analysis of Financial Performance of State Bank of India Using Camels Approach
PDF
No ratings yet
Analysis of Financial Performance of State Bank of India Using Camels Approach
4 pages
A Summer Projectreport ON Profitability Analysis of Mahindra and Mahindra
PDF
No ratings yet
A Summer Projectreport ON Profitability Analysis of Mahindra and Mahindra
38 pages
Database Administration and Data Mining
PDF
No ratings yet
Database Administration and Data Mining
32 pages
Review of Literature
PDF
No ratings yet
Review of Literature
27 pages
Presented By: Rudra S Chowdhury, Rahul Mahajan, Sarthak Ravi Bhaskar, Rohan Engineer, Rishi Kapoor
PDF
100% (1)
Presented By: Rudra S Chowdhury, Rahul Mahajan, Sarthak Ravi Bhaskar, Rohan Engineer, Rishi Kapoor
14 pages
Finanial Analysis of HDFC Bank
PDF
No ratings yet
Finanial Analysis of HDFC Bank
15 pages
04216603920
PDF
No ratings yet
04216603920
43 pages
Ratio Analysis Pankaj 180000502015
PDF
No ratings yet
Ratio Analysis Pankaj 180000502015
64 pages
Final Accounts Conclusions
PDF
No ratings yet
Final Accounts Conclusions
6 pages
Cross Sectional Financial Statement Analysis of TCS, Infosys and Wipro For 5 Years I.E. (2015-2019)
PDF
No ratings yet
Cross Sectional Financial Statement Analysis of TCS, Infosys and Wipro For 5 Years I.E. (2015-2019)
2 pages
Data Analsis Using Software Tools (MS-Excel)
PDF
No ratings yet
Data Analsis Using Software Tools (MS-Excel)
22 pages
Nitesh Gupta Majour Project Bba Vi-E
PDF
No ratings yet
Nitesh Gupta Majour Project Bba Vi-E
55 pages
Computerized Accounting PDF Download
PDF
No ratings yet
Computerized Accounting PDF Download
17 pages
LPG
PDF
No ratings yet
LPG
11 pages
Chapter 2 Profile of The Organisation
PDF
No ratings yet
Chapter 2 Profile of The Organisation
50 pages
"RATIO ANALYSIS OF ASTEC LIFESCIENCES LTD." Final Report
PDF
100% (1)
"RATIO ANALYSIS OF ASTEC LIFESCIENCES LTD." Final Report
73 pages
Industry Profile & Company Profile
PDF
No ratings yet
Industry Profile & Company Profile
42 pages
A 12 Kaksha Satardey PSS PPT W 2024
PDF
No ratings yet
A 12 Kaksha Satardey PSS PPT W 2024
40 pages
Final Project
PDF
No ratings yet
Final Project
55 pages
Financial Analysis Report On Yes Bank
PDF
No ratings yet
Financial Analysis Report On Yes Bank
40 pages
Cost Value Profit Analysis of Aachi Masala Food Products PVT LTD
PDF
100% (1)
Cost Value Profit Analysis of Aachi Masala Food Products PVT LTD
69 pages
A Study On Understanding The Banking Services Provided by Uttarakhand Gramin Bank
PDF
0% (1)
A Study On Understanding The Banking Services Provided by Uttarakhand Gramin Bank
52 pages
Rane Madras LTD
PDF
No ratings yet
Rane Madras LTD
58 pages
Non Performing Assets in Allahabad Bank MBA Banking Projects
PDF
50% (2)
Non Performing Assets in Allahabad Bank MBA Banking Projects
68 pages
Accenture Q4FY23 Supporting Materials
PDF
100% (1)
Accenture Q4FY23 Supporting Materials
11 pages
MARKETING MANG NOTES Unit-2 AKTU
PDF
No ratings yet
MARKETING MANG NOTES Unit-2 AKTU
9 pages
HDFC Ratio Analysis Study
PDF
No ratings yet
HDFC Ratio Analysis Study
27 pages
Institute of Technology and Management: A Project Report ON Financial Analysis OF
PDF
No ratings yet
Institute of Technology and Management: A Project Report ON Financial Analysis OF
26 pages
Ratio Analysis About S.R. Steel Industries
PDF
No ratings yet
Ratio Analysis About S.R. Steel Industries
51 pages
Ratio Analysis of Bajaj
PDF
No ratings yet
Ratio Analysis of Bajaj
9 pages
A Study On Cash Flow Analysis at BEML Limited., KGF
PDF
No ratings yet
A Study On Cash Flow Analysis at BEML Limited., KGF
61 pages
Five Mark Questions & Answer - Financial Accounting
PDF
No ratings yet
Five Mark Questions & Answer - Financial Accounting
12 pages
SYNOPSIS Project Sbi
PDF
No ratings yet
SYNOPSIS Project Sbi
3 pages
Dbms Notes
PDF
No ratings yet
Dbms Notes
28 pages