DCIT 55 - Reviewer

studied byStudied by 8 people
4.0(1)
Get a hint
Hint

Database Administrator

1 / 43

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

44 Terms

1

Database Administrator

Responsible for physical database design and for dealing with technical issues such as security enforcement, database performance, backup and recovery.

New cards
2

Technical Responsibility of DBA:

Selection of hardware and software

Installing/upgrading DBMS

Tuning database performance

Improving query processing performance

Managing data security, privacy, and integrity

Data backup and recovery

New cards
3

Database Performance Tuning

set of activities and procedures designed to ensure that end-user query is processed by DBMS in minimum amount of time

New cards
4

SQL Performance Tuning

activities on client side designed to generate SQL code that returns correct answer in least amount of time, using minimum number of resources at server end

New cards
5

Views

an application programs or individual user’s picture of the database, a derived table because data in it is retrieved from the base table, a table that is not really a table

New cards
6

Updatable Views

is when a view is derived by joining two tables on primary key of each table

New cards
7

Dropping a View

remove a view that is no longer needed with DROP VIEW command

New cards
8

Security

the prevention of unauthorized access to a database

New cards
9

Grant Command

main mechanism for providing access to a database

New cards
10

Revoke Command

remove privileges from users

New cards
11

Integrity Rules

a rule for the data in the database

New cards
12

Integrity Support

the process of specifying integrity constraints for the database

New cards
13

Primary Keys

unique identifier on a table.

New cards
14

Foreign Key

a column in one table whose value matches the primary key in another.

New cards
15

Data Dictionary Management

defines data elements and their relationships

New cards
16

Data Storage Management

stores data and related data entry forms, report definitions, etc.

New cards
17

Data Transformation and Presentation

translates logical requests into commands to physically locate and retrieve the requested data

New cards
18

Security Management

enforces user security and data privacy within database

New cards
19

Multi-user Access Control

creates structures that allow multiple users to access the data

New cards
20

Backup and Recovery Management

provides backup and data recovery utilities

New cards
21

Data Integrity Management

Promotes and enforces integrity rules to eliminate data integrity problems

New cards
22

Database Language and Application Programming Interfaces

provides data access through a query language

New cards
23

Database Communication Interfaces

allows database to accept end-user requests within a computer network environment

New cards
24

Importance of Good Design:

  • Eliminates data redundancy

  • Eliminates errors leading to bad decisions

New cards
25

Practical Approach:

Focus on principles and concepts of database design

Importance of logical design

New cards
26

Data Administrator

broader data management activity, more managerially oriente

New cards
27

Enterprise Data Model

a visual representation, or graph, of an enterprise business' data

New cards
28

Why do you need EDM?:

Improve Data Quality

Defining All Data

Managing Data

Data Governance

New cards
29

Enterprise Subject Area Model

could include Stores, Staff, Warehouses, Products, Payments, and Customers, to name a few

New cards
30

Enterprise Conceptual Model

could be broken down by ID and type, or Payments could be broken down by credit cards, debit cards, and cash

New cards
31

Enterprise Entity Model

identify the main areas of interest for each conceptual model

New cards
32

EDM Tools:

LucidChart

Erwin Data Model er

Diagrams.net

ER/Studio

Ab Init io

New cards
33

Security

refers to activities and measures to ensure the confidentiality, integrity, and availability of an information system and its main asset, dat

New cards
34

Confidentiality

deals with ensuring that data is protected against unauthorized access, and if the data are accessed by an authorized user, that the data are used only for an authorized purpose.

New cards
35

Integrity

is concerned with keeping data consistent, free of errors, or anomalies. Integrity focuses on maintaining the data free of inconsistencies and anomalies.

New cards
36

Availability

refers to the accessibility of data whenever required by authorized users and for authorized purposes.

New cards
37

Security Policy

a collection of standards, policies, and procedures created to guarantee the security of a system and ensure auditing and compliance.

New cards
38

Security Vulnerability

a weakness in a system component that could be exploited

New cards
39

Security Threat

an imminent security violation that could occur at any time due to unchecked security vulnerability.

New cards
40

Security Breach

occurs when a security threat is exploited to negatively affect the integrity, confidentiality, or availability of the system.

New cards
41

Preserved

action is required to avoid the repetition of similar security problems, but data recovery may not be necessary.

New cards
42

Corrupted

include database access by computer viruses and by hackers whose actions are intended to destroy or alter data.

New cards
43

Database Security

refers to the use of the DBMS features and other related measures to comply with the security requirements of the organization.

New cards
44

Authorization Management

defines procedures to protect and guarantee database security and integrity.

New cards

Explore top notes

note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 152 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 20 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 28 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 21 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 13609 people
Updated ... ago
4.7 Stars(59)

Explore top flashcards

flashcards Flashcard36 terms
studied byStudied by 8 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard27 terms
studied byStudied by 33 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard28 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard20 terms
studied byStudied by 114 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard40 terms
studied byStudied by 46 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard62 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard76 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard79 terms
studied byStudied by 26 people
Updated ... ago
5.0 Stars(2)