Chapter 2
row, record, tuple
A __ often referred to as a __ or a ___ , holds distinct units of data, and each record or row within a table is identified using unique strings of numbers or characters. Basta, Alfred; Zgola, Melissa. Database Security (Page 45). Cengage Textbook. Kindle Edition.
column, field
A ___ , also known as a ____ , is the component of a table that maintains a general category of information with similar datatypes. Basta, Alfred; Zgola, Melissa. Database Security (Page 45). Cengage Textbook. Kindle Edition.
key
A ____ is a single field or group of fields used to identify an entry in a table. Basta, Alfred; Zgola, Melissa. Database Security (Page 45). Cengage Textbook. Kindle Edition.
primary key
A _____ is a field that contains a unique label by which we can identify a record or row in a table. Basta, Alfred; Zgola, Melissa. Database Security (Page 46). Cengage Textbook. Kindle Edition.
transaction
A _____ is the group of statements or queries processed by the database to execute a user's request to update or change the database. Basta, Alfred; Zgola, Melissa. Database Security (Page 56). Cengage Textbook. Kindle Edition.
foreign key
A _______ is a field within a table that contains a label that is used to build a relationship between two tables. Basta, Alfred; Zgola, Melissa. Database Security (Page 46). Cengage Textbook. Kindle Edition.
thread
A _______ is an execution that runs independently from other processes and utilizes a portion of the CPU. Basta, Alfred; Zgola, Melissa. Database Security (Page 61). Cengage Textbook. Kindle Edition.
database model
A __________ is a representation of the way data is stored. The model for which a database is constructed also determines the way the data can be retrieved and manipulated. Basta, Alfred; Zgola, Melissa. Database Security (Page 48). Cengage Textbook. Kindle Edition.
relationship
A defines the association between two entities and binds them. A __________ can be thought of as a verb. Basta, Alfred; Zgola, Melissa. Database Security (Page 50). Cengage Textbook. Kindle Edition.
●Log file—
A file that stores information about the transactions in the database to be used for recovery and backup. Basta, Alfred; Zgola, Melissa. Database Security (Page 66). Cengage Textbook. Kindle Edition.
point of sales (POS) system
A is a system that is meant to handle cash register or sales transactions. Basta, Alfred; Zgola, Melissa. Database Security (Page 54). Cengage Textbook. Kindle Edition.
report
A query displays information within a _________, which is a document that contains a formatted result of a user's query. Basta, Alfred; Zgola, Melissa. Database Security (Page 48). Cengage Textbook. Kindle Edition.
database management system (DBMS)
A_____ is an application that allows others to search stored data in order to locate specific information. The goal of a DBMS is to provide users the means to manipulate, analyze, store, and retrieve information. Basta, Alfred; Zgola, Melissa. Database Security (Page 44). Cengage Textbook. Kindle Edition.
attribute
An _________ is a characteristic or variable that describes or further identifies an entity. An________ can be thought of as an adjective. Basta, Alfred; Zgola, Melissa. Database Security (Page 50). Cengage Textbook. Kindle Edition.
entity
An_________ is defined as a person, place, or thing stored within a table of a database for which attributes and relationships exist. Thought of as a Noun Basta, Alfred; Zgola, Melissa. Database Security (Page 50). Cengage Textbook. Kindle Edition.
One-to-one relationship—
Often expressed as 1:1. This is the most simplistic relationship that two entities can have. This relationship has only one entity in both directions. These relationships rarely occur within a relational database. They are found only in unique situations. Basta, Alfred; Zgola, Melissa. Database Security (Page 53). Cengage Textbook. Kindle Edition.
One-to-many relationship—
Often expressed as 1:N (N represents an indefinite number). This is the ideal type of relationship within a relational database schema. This relationship involves one entity who has a sole relationship with an entity that has a relationship with several other entities as well. For instance, an instructor may belong to only one department within the university (e.g., Information Security), yet that department has many instructors that are members. Basta, Alfred; Zgola, Melissa. Database Security (Page 54). Cengage Textbook. Kindle Edition.
Many-to-many relationship—
Often expressed as M:N. This is a type of relationship that refers to an entity that has one or many partnerships with another entity that also has one or many other partnerships. For example, an instructor may be a member of several school committees, and school committees may have several members. Basta, Alfred; Zgola, Melissa. Database Security (Page 54). Cengage Textbook. Kindle Edition.
parallel processing
Queries can be processed individually, where one process parses and optimizes one query at a time, in batches, where one process parses and optimizes several queries at one time; or in parallel (known as), when more than one server process processes one query at the same time. Basta, Alfred; Zgola, Melissa. Database Security (Page 56). Cengage Textbook. Kindle Edition.
worker processes
SQL server keeps a pool of either threads or fibers for all user connections; these pools are called . Basta, Alfred; Zgola, Melissa. Database Security (Page 70). Cengage Textbook. Kindle Edition.
Process Global Area (PGA
The ) is the central area where information is stored for background and server processes. Basta, Alfred; Zgola, Melissa. Database Security (Page 59). Cengage Textbook. Kindle Edition.
buffer pool, or buffer cache
The , as described earlier, is the area where data pages from the database are stored to minimize the need to read and write from the database file located on the hard disk.
buffer manager
The ____ is a portion of the SQL Server responsible for accessing data pages and updating the database. Basta, Alfred; Zgola, Melissa. Database Security (Page 69). Cengage Textbook. Kindle Edition.
virtual address space
The _______ is the complete virtual memory area allotted to a program. Basta, Alfred; Zgola, Melissa. Database Security (Page 67). Cengage Textbook. Kindle Edition.
hierarchical database structure
The ___________ is a treelike storage schema that represents records and relationships through the use of tiers and parent-to-child relationships. Basta, Alfred; Zgola, Melissa. Database Security (Page 49). Cengage Textbook. Kindle Edition.
●Primary filegroup—
The collection of files that contain all of the SQL Server system files, including the primary data files Basta, Alfred; Zgola, Melissa. Database Security (Page 66). Cengage Textbook. Kindle Edition.
pagefile.
The dedicated swap space for the page is known as a Basta, Alfred; Zgola, Melissa. Database Security (Page 67). Cengage Textbook. Kindle Edition.
pages.
The fixed units of storage that are transferred or swapped from one storage device to another are known as ______ Basta, Alfred; Zgola, Melissa. Database Security (Page 67). Cengage Textbook. Kindle Edition.
transaction manager
The is responsible for avoiding and resolving deadlocks and corrupted data by initiating the COMMIT and ROLLBACK commands on the server.
memory target.
The reserved space for the buffer cache is called the Basta, Alfred; Zgola, Melissa. Database Security (Page 69). Cengage Textbook. Kindle Edition.
undo
To a transaction commit is to roll back changes made through users'API or SQL transactions. Basta, Alfred; Zgola, Melissa. Database Security (Page 56). Cengage Textbook. Kindle Edition.
commit
a change means to make it permanent and visible to other users. Basta, Alfred; Zgola, Melissa. Database Security (Page 56). Cengage Textbook. Kindle Edition.
Storage engines
are components of a MySQL database architecture that read and write data to and from the database and offer services to enable customization of an environment. Basta, Alfred; Zgola, Melissa. Database Security (Page 63). Cengage Textbook. Kindle Edition.
session
begins when a user connects to the database and it ends when the user logs out of a database. Basta, Alfred; Zgola, Melissa. Database Security (Page 57). Cengage Textbook. Kindle Edition.
online transaction processing (OLTP)
database is a database that is created for real-time storage and manipulation of data within an organization. Basta, Alfred; Zgola, Melissa. Database Security (Page 54). Cengage Textbook. Kindle Edition.
database connection manager
does just what its name implies. It manages connections to the MySQL server. The connection management layer is very versatile, enabling virtually any client to connect to a MySQL server. Basta, Alfred; Zgola, Melissa. Database Security (Page 61). Cengage Textbook. Kindle Edition.
parsing
involves the act of analyzing the construction of a query for correct syntax and semantics. During the _________ process, the database applications also identify the tables and data the user is requesting, checking that these items exist as well. Basta, Alfred; Zgola, Melissa. Database Security (Page 56). Cengage Textbook. Kindle Edition.
Tabular Data Stream (TDS)
is a Microsoft-defined protocol that describes the specifications as to how the SQL Server and a client can communicate. Basta, Alfred; Zgola, Melissa. Database Security (Page 65). Cengage Textbook. Kindle Edition.
instance
is a broad term that refers to the background processes and structured memory used during interaction with the database. Basta, Alfred; Zgola, Melissa. Database Security (Page 57). Cengage Textbook. Kindle Edition.
database
is a collection of data stored on a computer using an application called a database management system. Basta, Alfred; Zgola, Melissa. Database Security (Page 44). Cengage Textbook. Kindle Edition.
filegroup
is a collection of one or more physical data files within a SQL Server database. Basta, Alfred; Zgola, Melissa. Database Security (Page 66). Cengage Textbook. Kindle Edition.
online analytical processing (OLAP), or decision support system (DSS),
is a database that stores large volumes of historical data for report generating and analyzing. Basta, Alfred; Zgola, Melissa. Database Security (Page 54). Cengage Textbook. Kindle Edition.
query
is a search initiated by users in an attempt to retrieve certain information from the database. A_______consists of sets of variables or keywords that are formatted in a way that is defined by the programming language being used to query the DBMS in hopes of retrieving specific information. Basta, Alfred; Zgola, Melissa. Database Security (Page 48). Cengage Textbook. Kindle Edition.
process
is a set of instructions that is executed by the operation system and intended to complete a task. Basta, Alfred; Zgola, Melissa. Database Security (Page 60). Cengage Textbook. Kindle Edition.
deadlock
is a situation when two transactions cannot proceed because each user has data that the other needs. Basta, Alfred; Zgola, Melissa. Database Security (Page 56). Cengage Textbook. Kindle Edition.
relational database ,
is a storage model in which common entities are stored within separate tables that use unique key identifiers to build relationships among these entities. There are three main concepts to understand when referring to a ___________: entities, keys, and relationships. Basta, Alfred; Zgola, Melissa. Database Security (Page 50). Cengage Textbook. Kindle Edition.
fiber
is a subcomponent of a thread, and is handled by the server to accomplish a task. Basta, Alfred; Zgola, Melissa. Database Security (Page 69). Cengage Textbook. Kindle Edition.
Virtual memory
is a technique for extending the availability of memory where by units of storage located on different memory devices are used to store data from one entity in such a way that it appears the data has been stored in one continuous block of the same memory. Basta, Alfred; Zgola, Melissa. Database Security (Page 67). Cengage Textbook. Kindle Edition.
network database model
is a treelike structure that stores information in the form of a hierarchy, using tiers and parent-child-like entities to represent relationships.the parent is referred to as a set of which the child entities are members. It is possible for child entities to be a member of more than one set (to hold more than one parent).
flat model
is a two-dimensional list of data entries, where all data within a field are understood to be similar, and all data within a record are understood to be related to one another. Basta, Alfred; Zgola, Melissa. Database Security (Page 48). Cengage Textbook. Kindle Edition.
executable code
is essentially the server engine within SQL Server. It includes the executable (exe) and dynamic link library (dll) files for the server itself. The executable code includes the following components: ●SQL Server code ●Server Net-Library DLLs ● Open services code ●Extended stored procedures ● OLE Automation ● Object code ●Distributed Query OLE DB provider DLLs Basta, Alfred; Zgola, Melissa. Database Security (Page 68). Cengage Textbook. Kindle Edition. Basta, Alfred; Zgola, Melissa. Database Security (Page 67). Cengage Textbook. Kindle Edition.
table
is one of the most basic units of storage within a database, typically representing unique and specific data objects. Basta, Alfred; Zgola, Melissa. Database Security (Page 45). Cengage Textbook. Kindle Edition.
System Global Area (SGA)
is the central area in which all shared data and processes are stored. The information contained in the SGA includes information shared by users and database processes. Basta, Alfred; Zgola, Melissa. Database Security (Page 59). Cengage Textbook. Kindle Edition.
query engine
is the component of the architecture that optimizes and manages queries and SQL statements. Basta, Alfred; Zgola, Melissa. Database Security (Page 62). Cengage Textbook. Kindle Edition.
Optimization
is the process of locating the quickest and most efficient way to retrieve the data requested by the user. Basta, Alfred; Zgola, Melissa. Database Security (Page 56). Cengage Textbook. Kindle Edition.
Caching
is the process of saving a duplicate of requested data to another area of a system in hopes of saving resources and speeding up the future requests for that same data. Basta, Alfred; Zgola, Melissa. Database Security (Page 58). Cengage Textbook. Kindle Edition.
Concurrency
is the simultaneous access of resources and data. Basta, Alfred; Zgola, Melissa. Database Security (Page 56). Cengage Textbook. Kindle Edition.
he Memory Pool The memory pool
is the total amount of memory available for an instance of SQL Server. Virtually everything that uses memory in an instance of SQL Server uses the Basta, Alfred; Zgola, Melissa. Database Security (Page 68). Cengage Textbook. Kindle Edition.
query cache
maintains a set of recently requested queries within its storage space to save time and resources in the event that a similar query is requested again. Basta, Alfred; Zgola, Melissa. Database Security (Page 62). Cengage Textbook. Kindle Edition.
open source
refers to software that has been written to be distributed for use and download free of charge. Besides cost, open-source applications provide the advantage of customization. Basta, Alfred; Zgola, Melissa. Database Security (Page 55). Cengage Textbook. Kindle Edition.
Read consistency
refers to the accuracy and reliability of data within a database and is dependent on a database's ability to process and commit transactions in a timely manner, as well as control concurrency effectively by applying the following locking mechanisms: Basta, Alfred; Zgola, Melissa. Database Security (Page 55). Cengage Textbook. Kindle Edition.
Storage management
refers to the process of storing and retrieving data throughout the database. Basta, Alfred; Zgola, Melissa. Database Security (Page 63). Cengage Textbook. Kindle Edition.
Query Management
refers to the steps taken by a database management application to process a user query. ________ often involves retrieving, parsing, and optimizing user SQL requests. Basta, Alfred; Zgola, Melissa. Database Security (Page 56). Cengage Textbook. Kindle Edition.
●Secondary data file
—An optional data file found within a SQL Server database that is not a primary data file. Basta, Alfred; Zgola, Melissa. Database Security (Page 66). Cengage Textbook. Kindle Edition.
Alternate key
●A field with values that are not chosen as a primary key, but can be used in cases where the primary key is not available. For instance, if a Social Security number is used as the primary key and an employee is hired from outside the United States, then an alternate key is used. Basta, Alfred; Zgola, Melissa. Database Security (Page 47). Cengage Textbook. Kindle Edition.
User-defined filegroup
●—A collection of files created by a user Basta, Alfred; Zgola, Melissa. Database Security (Page 66). Cengage Textbook. Kindle Edition.
Sort or control key
●—A field with values that are used to sequence data. Basta, Alfred; Zgola, Melissa. Database Security (Page 47). Cengage Textbook. Kindle Edition.
Secondary or alternative key
●—A field with values that contains nonunique data and that can refer to several records at one time. For instance, Michael Jackson sings two songs from another table. Basta, Alfred; Zgola, Melissa. Database Security (Page 47). Cengage Textbook. Kindle Edition.
Candidate key
●—A field with values that meet the requirements for a primary key. This key meets the characteristics of a primary key. Basta, Alfred; Zgola, Melissa. Database Security (Page 47). Cengage Textbook. Kindle Edition.
Composite key
●—A group of two or more fields where their values can be combined to be used as a primary key. Basta, Alfred; Zgola, Melissa. Database Security (Page 47). Cengage Textbook. Kindle Edition.
Primary data file
●—The main data file for an SQL Server database, it references all other secondary data files and is the file of origin for the entire database. Basta, Alfred; Zgola, Melissa. Database Security (Page 66). Cengage Textbook. Kindle Edition.