Practice TestTake a test on your terms and definitions
Spaced RepetitionScientifically backed study method
Matching GameHow quick can you match all your cards?
FlashcardsStudy terms and definitions
1 / 43
There's no tags or description
Looks like no one added any tags here yet for you.
44 Terms
1
Database Administrator
Responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, backup and recovery.
New cards
2
Technical Responsibility of DBA:
Selection of hardware and software
Installing/upgrading DBMS
Tuning database performance
Improving query processing performance
Managing data security, privacy, and integrity
Data backup and recovery
New cards
3
Database Performance Tuning
set of activities and procedures designed to ensure that end-user query is processed by DBMS in minimum amount of time
New cards
4
SQL Performance Tuning
activities on client side designed to generate SQL code that returns correct answer in least amount of time, using minimum number of resources at server end
New cards
5
Views
an application programs or individual user’s picture of the database, a derived table because data in it is retrieved from the base table, a table that is not really a table
New cards
6
Updatable Views
is when a view is derived by joining two tables on primary key of each table
New cards
7
Dropping a View
remove a view that is no longer needed with DROP VIEW command
New cards
8
Security
the prevention of unauthorized access to a database
New cards
9
Grant Command
main mechanism for providing access to a database
New cards
10
Revoke Command
remove privileges from users
New cards
11
Integrity Rules
a rule for the data in the database
New cards
12
Integrity Support
the process of specifying integrity constraints for the database
New cards
13
Primary Keys
unique identifier on a table.
New cards
14
Foreign Key
a column in one table whose value matches the primary key in another.
New cards
15
Data Dictionary Management
defines data elements and their relationships
New cards
16
Data Storage Management
stores data and related data entry forms, report definitions, etc.
New cards
17
Data Transformation and Presentation
translates logical requests into commands to physically locate and retrieve the requested data
New cards
18
Security Management
enforces user security and data privacy within database
New cards
19
Multi-user Access Control
creates structures that allow multiple users to access the data
New cards
20
Backup and Recovery Management
provides backup and data recovery utilities
New cards
21
Data Integrity Management
Promotes and enforces integrity rules to eliminate data integrity problems
New cards
22
Database Language and Application Programming Interfaces
provides data access through a query language
New cards
23
Database Communication Interfaces
allows database to accept end-user requests within a computer network environment
New cards
24
Importance of Good Design:
Eliminates data redundancy
Eliminates errors leading to bad decisions
New cards
25
Practical Approach:
Focus on principles and concepts of database design
Importance of logical design
New cards
26
Data Administrator
broader data management activity, more managerially oriente
New cards
27
Enterprise Data Model
a visual representation, or graph, of an enterprise business' data
New cards
28
Why do you need EDM?:
Improve Data Quality
Defining All Data
Managing Data
Data Governance
New cards
29
Enterprise Subject Area Model
could include Stores, Staff, Warehouses, Products, Payments, and Customers, to name a few
New cards
30
Enterprise Conceptual Model
could be broken down by ID and type, or Payments could be broken down by credit cards, debit cards, and cash
New cards
31
Enterprise Entity Model
identify the main areas of interest for each conceptual model
New cards
32
EDM Tools:
LucidChart
Erwin Data Model er
Diagrams.net
ER/Studio
Ab Init io
New cards
33
Security
refers to activities and measures to ensure the confidentiality, integrity, and availability of an information system and its main asset, dat
New cards
34
Confidentiality
deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.
New cards
35
Integrity
is concerned with keeping data consistent, free of errors, or anomalies. Integrity focuses on maintaining the data free of inconsistencies and anomalies.
New cards
36
Availability
refers to the accessibility of data whenever required by authorized users and for authorized purposes.
New cards
37
Security Policy
a collection of standards, policies, and procedures created to guarantee the security of a system and ensure auditing and compliance.
New cards
38
Security Vulnerability
a weakness in a system component that could be exploited
New cards
39
Security Threat
an imminent security violation that could occur at any time due to unchecked security vulnerability.
New cards
40
Security Breach
occurs when a security threat is exploited to negatively affect the integrity, confidentiality, or availability of the system.
New cards
41
Preserved
action is required to avoid the repetition of similar security problems, but data recovery may not be necessary.
New cards
42
Corrupted
include database access by computer viruses and by hackers whose actions are intended to destroy or alter data.
New cards
43
Database Security
refers to the use of the DBMS features and other related measures to comply with the security requirements of the organization.
New cards
44
Authorization Management
defines procedures to protect and guarantee database security and integrity.