Cache Memory
A small-sized type of volatile computer memory that provides high-speed data access to the processor and stores frequently used computer programs, applications, and data.
Cache Replacement Policies
Strategies used to determine which items to discard from cache when new data is added, including Least Recently Used (LRU), First-In-First-Out (FIFO), and Least Frequently Used (LFU).
Access Control
The process of granting or denying specific requests for accessing resources in a computing environment based on permissions.
Authentication
The process of verifying the identity of a user or system, typically through username/password combinations, biometric data, or security tokens.
Secure OS Design
The practice of designing operating systems with security principles at their core to protect against unauthorized access and attacks.
Malware
Malicious software designed to harm, exploit, or otherwise compromise the integrity, confidentiality, or availability of computers and their users.
Defense Mechanisms
Techniques or methods used to protect computer systems from malware, including antivirus software, firewalls, and intrusion detection systems.
Database Management System (DBMS)
Software that provides a systematic way to create, retrieve, update, and manage data in databases.
Relational Database Management System (RDBMS)
A type of DBMS that is based on the relational model, where data is organized in tables and relationships between tables are defined.
SQL (Structured Query Language)
A standard programming language used for managing and manipulating relational databases.
NoSQL
A class of database management systems that do not follow the traditional relational model, designed to handle large volumes of unstructured or semi-structured data.
DML (Data Manipulation Language)
A subset of SQL that deals with manipulating data in a database, such as inserting, updating, and deleting data.
DDL (Data Definition Language)
A subset of SQL that is used to define and manage all database structures, including tables, indexes, and schemas.
DCL (Data Control Language)
A subset of SQL used to control access to data within a database, specifically granting or revoking permissions.
TCL (Transaction Control Language)
A set of SQL commands used to manage transactions in a database, ensuring the integrity of data, such as COMMIT and ROLLBACK.
Functional Dependency
A relationship that exists when one attribute uniquely determines another attribute in a relation, often used in normalization.
Normalization
The process of organizing data in a database to reduce redundancy and improve data integrity.
Normal Forms
A set of guidelines to ensure database schema normalization, including First Normal Form (1NF), Second Normal Form (2NF), and Third Normal Form (3NF).