Physical Database Design, Analytics, & Infrastructure

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/57

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

58 Terms

1
New cards

Catalog

A set of schemas that constitute the description of a database

2
New cards

Schema

The structure that contains descriptions of objects created by a user (base tables, views, constraints)

3
New cards

Data definition language (DDL)

Commands that define a database, including creating, altering, and dropping tables and establishing constraints

4
New cards

Data manipulation language (DML)

Commands that maintain and query a database

5
New cards

Data control language (DCL)

Commands that control a database, including administering privileges and committing data

6
New cards

SELECT statement

used for queries on single/multiple tables

7
New cards

SELECT

List the columns (and expressions) to be returned from the query

8
New cards

FROM

Indicate the table(s)/view(s) from which data will be obtained

9
New cards

WHERE

Indicate the conditions under which a row will be included in the result

10
New cards

GROUP BY

Indicate categorization of results

11
New cards

HAVING

Indicate the conditions under which a row will be included

12
New cards

ORDER BY

Sort the results according to a specified criteriasuch as one or more columns in ascending or descending order.

13
New cards

___,___, and ____ operators for customizing conditions in WHERE clause

AND, OR, NOT
(add () to override normal conditions)

14
New cards

Scalor aggregate

Single value returned from SQL query with aggregate function

15
New cards

Vector aggregate

Multiple values returned from SQL query with aggregate function (via Groupby)

16
New cards

Data administration

A high level function that is responsible for the overall management of data resources in an organization, including maintaining corporate-wide definitions and standards

17
New cards

Database administration

A technical function that is responsible for physical database design and for dealing with technical issues

18
New cards

File organization

A technique for physically arranging the records of a file on secondary storage devices

19
New cards

Heap

No particular order (fast write, not optimized for read)

20
New cards

Sequential

Stored sorted sequentially by primary key
-compromise ‘write’ efficiency for faster ‘read’

21
New cards

Write

Data is inserted at a position to keep the data sorted

22
New cards

Read

Binary search algorithm - compare list to midpoints

23
New cards

Indexed

Stored sorted by primary/secondary data
Storage of records sequentially/nonsequentially with an index that allows software to locate individual records

24
New cards

Index

A table/other data structure used to determine in a file the location of records that satisfy some conditions 

-primary keys are automatically indexed and called unique index

-other fields/combinations of fields can also be indexed; these are called secondary keys (nonunique)

25
New cards

Unique (primary) index

Typically done for primary keys, but could also apply to other unique fields

26
New cards

Nonunique (secondary) index

Done for fields that are often on other non-unique fieldsto optimize search and retrieval of records with duplicate values.

27
New cards

When to use indexes

-On larger tables

-When there are >100 values but not <30 values

-Index search fields (fields frequently in WHERE clause)

-Fields in SQL ORDER BY and GROUP BY commands, Avoid use of indexes for fields with long values

-DBMS may have limit on number of indexes per table and number of bytes per indexed field(s)

-Be careful of indexing attributes with null values; many DBMS will not recognize null values in an index search

-Understand that indexes slow down the WRITE operation while speeding up the READ operation

28
New cards

Database Security

Protection of the data against accidental/intentional loss, destruction, or misuse

29
New cards

Sarbanes-Oxley (SOX)

Requires companies to audit the access to sensitive data, designed to ensure integrity of public companies financial statements

30
New cards

Three areas of SOX audits

IT change management, logical access to data, IT operations

31
New cards

IT change management

Process by which changes to operational systems and databases are authorized

32
New cards

Logical access to data

Security procedures to prevent unauthorized access, personnel controls, and physical access cards

33
New cards

IT operations

Policies and procedures for day-to-day management of infrastructure, applications, and databases

34
New cards

Physical access controls

Swipe cards, equipment locking, check-out procedures, screen placement, laptop protection

35
New cards

Personnel controls

Hiring policies, employee monitoring, security training, segregation of duties (SOD)

36
New cards

Internet security

Firewall (IP whitelisting), intrusion detention systems (IDS), encryption-decryption

37
New cards

Authentication

Ensuring that a user is who they claim to be

38
New cards

Authorization

Rules to specify who has what access rights to what data elements

39
New cards

Authentication schemas

Single factor, two factor, three factor

40
New cards

Single factor

Something you know (password)

41
New cards

Two factor

Something you know plus something you have

42
New cards

Three factor

something you know plus something you have plus something you are (biometric identifier)

43
New cards

Authorization matrix for

Subjects, objects, actions, constraints permissions within a system.

44
New cards

Basic facilities for backup and recovery

Backup, journalizing, checkpoint, and recovery managerfeatures that ensure data is protected and can be restored in case of loss or corruption.

45
New cards

Back-up facilities

DBMS cop utility that produces periodic backup copy of the entire database/subset

46
New cards

Cold backup

Database is shutdown during backup, usually full

47
New cards

Hot backup

Selected portion is shut down and backed up at a given timewhile the rest of the database remains operational, allowing continuous access to the data.

48
New cards

Journalizing facilities

Audit trail of transactions and database updates

49
New cards

Transaction log

Record of essential data for each transaction process against the database

50
New cards

Database change loss

Images of updated data

Before-image-copy before modification

After-image-copy after modificationto prevent data loss during changes. It ensures that updates can be reverted if necessary.

51
New cards

Checkpoint facilities

DBMS periodically refuses to accept new transaction and goes momentarily into a quiet state

Database and transaction logs are synchronized

A DBMS may perform checkpoints automatically (preferred) or in response to commands in user application programs

If the checkpoint fails, it allows recovery manager to resume processing from short period, instead of repeating entire day

52
New cards

Recovery manager

DBMS module that restores the database to a correct condition when a failure occurs and then resumes processing user request

53
New cards

Disk mirroring

Switch between identical copies of database needs, two copies maintained, expensive fault tolerant system

54
New cards

Restore/rerun

Restore and reprocess transactions against the backup manually (only done as last resort)

55
New cards

Backward recovery

Roll back

56
New cards

Forward recovery

Roll forward

57
New cards

Disaster recovery plan

Develop a detailed written disaster recovery plan and test this regularly

Choose and train a multidisciplinary team to carry out the plan

Establish a backup data center at an off-site location, located a sufficient distance from the primary site

Send backup copies of databases to the backup data center on a scheduled basisand ensure that all team members are familiar with their responsibilities during an emergency.

58
New cards

Cloud computing

Provisioning/acquiring computing services on demand using a centralized resource accessed through public internet/private networks