Chapter 9-12

Ace your homework & exams now with Quizwiz!

Trojan horse

- a program designed to breach the security of a computer system while ostensibly performing some innocuous function.

Data Dictionary

- a set of information describing the contents, format, and structure of a database and the relationship between its elements, used to control access to and manipulation of the database.

Deadlock

- a situation, typically one involving opposing parties, in which no progress can be made.

Microcomputer

- a small computer that contains a microprocessor as its central processor.

Centralized database

- (sometimes abbreviated CDB) is a database that is located, stored, and maintained in a single location. This location is most often a central computer or database system, for example a desktop or server CPU, or a mainframe computer.

Wide area networks (WANs)

- A computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more local-area networks (LANs). Computers connected to a wide-area network are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites.

Hardware failures

- A malfunction within the electronic circuits or electromechanical components (disks, tapes) of a computer system. Recovery from a hardware failure requires repair or replacement of the offending part.

Large Internet service providers (ISPs)

- An ISP provides access to the Internet. ... Some ISPs now offer high-speed fiber connections, which provide Internet access through fiber optic cables. Companies like Comcast and Time Warner provide cable connections while companies like AT&T and Verizon provide DSL Internet access.

Algorithm

- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

Repeating groups

- Any attribute that can have multiple values associated with a single instance of some entity. For example, a book might have multiple authors.

View integration

- Combining the data needs of all users into a single schema or enterprise-wide view

Indexed sequential file structure

- This structure uses an index in conjunction with a sequential file organization. It facilitates both direct access to individual records and batch processing of the entire file. Multiple indexes can be used to create a cross-reference, called an inverted list, which allows even more flexible access to data.

Association

- a connection or cooperative link between people or organizations. - a mental connection between ideas or things.

Web page

- a hypertext document connected to the World Wide Web.

Query Language

- a language for the specification of procedures for the retrieval (and sometimes also modification) of information from a database.

Data warehouse

- a large store of data accumulated from a wide range of sources within a company and used to guide management decisions.

Web sites

- a location connected to the Internet that maintains one or more pages on the World Wide Web.

Distributed data processing (DDP)

- a method of organizing data processing that uses a central computer in combination with smaller local computers or terminals, which communicate with the central computer and perhaps with one another.

Packet Switching

- a mode of data transmission in which a message is broken into a number of parts that are sent independently, over whatever route is optimum for each packet, and reassembled at the destination.

TELNET

- a network protocol that allows a user on one computer to log onto another computer that is part of the same network. - log onto a remote computer using a telnet program.

Cookies

- a packet of data sent by an Internet server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server.

Firewall

- a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

Supplier

- a person or organization that provides something needed such as a product or service.

Agents

- a person who acts on behalf of another person or group. - a person or thing that takes an active role or produces a specified effect.

Resources

- a stock or supply of money, materials, staff, and other assets that can be drawn on by a person or organization in order to function effectively. - an action or strategy that may be adopted in adverse circumstances.

Entity

- a thing with distinct and independent existence.

Digital signature

- a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.

IP addresses

- a unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.

Drill-down

- access data that is in a lower level of a hierarchically structured database.

Primary key

- also called a primary keyword, is a key in a relational database that is unique for each record. It is a unique identifier, such as a driver license number, telephone number (including area code), or vehicle identification number (VIN). A relational database must always have one and only one primary key.

Network-level firewall

- also called packet filters. - operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set. The firewall administrator may define the rules; or default rules may apply.

IP spoofing

- also known as IP address forgery or a host file hijack, is a hijacking technique in which a cracker masquerades as a trusted host to conceal his identity, spoof a Web site, hijack browsers, or gain access to a network.

Purchasing Agent

- also known as buying agents are people or companies that offer to buy goods or property on behalf of another party. There are agents for all kinds of products, from raw material commodities through to specialized custom equipment.

Inverted list

- also referred to as postings file or inverted file is an index data structure storing a mapping from content, such as words or numbers, to its locations in a database file, or in a document or a set of documents.

World Wide Web (Web)

- an information system on the Internet that allows documents to be connected to other documents by hypertext links, enabling the user to search for information by moving from one document to another.

Extranets

- an intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the Internet securely.

Physical database tables

- are constructed from the data model with each entity in the model being transformed into a separate physical table.

Data model

- are fundamental entities to introduce abstraction in a DBMS. Data models define how data is connected to each other and how they are processed and stored inside the system. The very first data model could be flat data-models, where all the data used are to be kept in the same plane.

Attributes

- are the data elements that define an entity.

International Computer Security Association (ICSA)

- began as NCSA (National Computer Security Association). Its mission was to increase awareness of the need for computer security and to provide education about various security products and technologies.

Economic events

- can be either external or internal. An external transaction would occur with an outside party, such as the purchase or sales of a good.

Deletion anomaly

- exists when certain attributes are lost because of the deletion of other attributes. For example, consider what happens if Student S30 is the last student to leave the course - All information about the course is lost.

Better Business Bureau (BBB)

- founded in 1912, is a nonprofit organization focused on advancing marketplace trust, consisting of 112 independently incorporated local BBB organizations in the United States and Canada, coordinated under the Council of Better Business Bureaus (CBBB) in Arlington, Virginia.

Semantic models

- in software engineering has various meanings: It is a conceptual data model in which semantic information is included. This means that the model describes the meaning of its instances.

Online transaction processing (OLTP)

- is a class of information systems that facilitate and manage transaction-oriented applications, typically for data entry and retrieval transaction processing on a database management system.

Core applications

- is a collection of approximately 30 computer programs that are packaged as part of the standard free and open-source GNOME desktop environment. GNOME Core Applications have the look and feel of the GNOME desktop; some applications have been written from scratch and others are ports.

Purchase Order (PO)

- is a commercial document and first official offer issued by a buyer to a seller, indicating types, quantities, and agreed prices for products or services. It is used to control the purchasing of products and services from external suppliers.

Local area networks (LANs)

- is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves

Open System Interface (OSI)

- is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology.

Closed database architecture

- is a control technique intended to prevent unauthorized access by trading partners.

Update anomaly

- is a data inconsistency that results from data redundancy and a partial update. For example, each employee in a company has a department associated with them as well as the student group they participate in.

Hierarchical Database Model

- is a data model in which the data is organized into a tree-like structure. The data is stored as records which are connected to one another through links. A record is a collection of fields, with each field containing only one value.

Distributed databases

- is a database in which storage devices are not all attached to a common processor. It may be stored in multiple computers, located in the same physical location; or may be dispersed over a network of interconnected computers.

Concurrency Control

- is a database management systems (DBMS) concept that is used to address conflicts with the simultaneous accessing or altering of data that can occur with a multi-user system.

Network Database Model

- is a database model conceived as a flexible way of representing objects and their relationships. Its distinguishing feature is that the schema, viewed as a graph in which object types are nodes and relationship types are arcs, is not restricted to being a hierarchy or lattice.

Privacy Enhanced Mail (PEM)

- is a de facto file format for storing and sending cryptography keys, certificates, and other data, based on on a set of 1993 IETF standards defining "privacy-enhanced mail."

Client-server model

- is a distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.

Data manipulation language (DML)

- is a family of syntax elements similar to a computer programming language used for selecting, inserting, deleting and updating data in a database. Performing read-only queries of data is sometimes also considered a component of DML.

Foreign keys

- is a field (or collection of fields) in one table that uniquely identifies a row of another table or the same table. In simpler words, the foreign key is defined in a second table, but it refers to the primary key in the first table.

Application-level firewall

- is a firewall where one application-level (i.e., not kernel) process is used to forward each session that an internal user makes to a network resource on the public network.

SYN Flood Attack

- is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.

Transitive dependencies

- is a functional dependency which holds by virtue of transitivity. - A transitive dependency can occur only in a relation that has three or more attributes. Let A, B, and C designate three distinct attributes (or distinct collections of attributes) in the relation.

Application Layer

- is a layer in the Open Systems Interconnection (OSI) seven-layer model and in the TCP/IP protocol suite. It consists of protocols that focus on process-to-process communication across an IP network and provides a firm communication interface and end-user services.

Resources events agents (REA)

- is a model of how an accounting system can be re-engineered for the computer age. REA was originally proposed in 1982 by William E. McCarthy as a generalized accounting model, and contained the concepts of resources, events and agents (McCarthy 1982).

Virtual private network (VPN)

- is a network that is constructed using public wires — usually the Internet — to connect to a private network, such as a company's internal network. There are a number of systems that enable you to create networks using the Internet as the medium for transporting data.

Third normal form (3NF)

- is a normal form used in database normalization. 3NF was originally defined by E.F. Codd in 1971.

Simple Network Mail Protocol (SNMP)

- is a popular protocol for network management. It is used for collecting information from, and configuring, network devices, such as servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network.

Receiving Clerk

- is a position in a warehouse or another facility that receives a large number of shipments on a regular basis. The receiving clerk's main duties often include unloading shipments, as well as verifying that their contents are correct and that no items are damaged.

Enterprise resource planning (ERP)

- is a process by which a company (often a manufacturer) manages and integrates the important parts of its business. An ERP management information system integrates areas such as planning, purchasing, inventory, sales, marketing, finance and human resources.

SMDS (Switched Multimegabit Data Service)

- is a public, packet-switched service aimed at enterprises that need to exchange large amounts of data with other enterprises over the wide-area network on a nonconstant or "bursty" basis. SMDS provides an architecture for this kind of data exchange and a set of services.

Uniform Resource Locator (URL)

- is a reference (an address) to a resource on the Internet.

External agent

- is a set of attributional biases consisting of illusions of influence, insight and benevolence, proposed by Daniel Gilbert, Timothy D. Wilson, Ryan Brown and Elizabeth Pinel.

Public key infrastructure (PKI)

- is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

Scalability

- the capacity to be changed in size or scale. - the ability of a computing process to be used or produced in a range of capabilities.

Data structures

- is a specialized format for organizing and storing data. General data structure types include the array, the file, the record, the table, the tree, and so on. Any data structure is designed to organize data to suit a specific purpose so that it can be accessed and worked with in appropriate ways.

File Transfer Protocol (FTP)

- is a standard network protocol used for the transfer of computer files from a server to a client using the Client-server model on a computer network. FTP is built on a client-server model architecture and uses separate control and data connections between the client and the server.

Value chain analysis

- is a strategy tool used to analyze internal firm activities. Its goal is to recognize, which activities are the most valuable (i.e. are the source of cost or differentiation advantage) to the firm and which ones could be improved to provide competitive advantage.

Data mart

- is a subset of the data warehouse and is usually oriented to a specific business line or team. Whereas data warehouses have an enterprise-wide depth, the information in data marts pertains to a single department.

Advanced encryption standard (AES)

- is a symmetric block cipher chosen by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data.

TRUSTe

- is a technology compliance and security company based in San Francisco, California. The company helps corporations update their technology so that it complies with government laws, or operates using best practices.

Distributed denial of service (DDos)

- is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack.

Electronic commerce

- is a type of business model, or segment of a larger business model, that enables a firm or individual to conduct business over an electronic network, typically the internet. - Also sometimes written as "e-commerce" or "eCommerce".

Inventory Status Report

- is a user view derived from the Inventory and Supplier entities.

Internet Message Access Protocol (IMAP)

- is an Internet standard protocol used by e-mail clients to retrieve e-mail messages from a mail server over a TCP/IP connection. IMAP is defined by RFC 3501.

Rivest-Shamir-Adleman (RSA)

- is an algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm.

Internet Relay Chat (IRC)

- is an application layer protocol that facilitates communication in the form of text. The chat process works on a client/server networking model. IRC clients are computer programs that a user can install on his or her system.

HyperText Transfer Protocol (HTTP)

- is an application protocol for distributed, collaborative, and hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text.

Network News Transfer Protocol (NNTP)

- is an application protocol used for transporting Usenet news articles (netnews) between news servers and for reading and posting articles by end user client applications.

Post Office Protocol (POP)

- is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.

Role-based access control (RBAC)

- is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employees, and can implement mandatory access control (MAC) or discretionary access control (DAC).

Automatic identification system (AIS)

- is an automatic tracking system used for collision avoidance on ships and by vessel traffic services (VTS). When satellites are used to detect AIS signatures, the term Satellite-AIS (S-AIS) is used.

Hyper-Text Transport Protocol-Next Generation (HTTP-NG)

- is an enhanced version of the HTTP protocol that maintains the simplicity of HTTP while adding important features such as security and authentication.

Receiving Report

- is an important record of the merchandise that a retailer has actually received from a supplier because it documents what is owed to the supplier in terms of payment for the goods received or the return of the goods, in some cases.

International Standards Organization

- is an international standard-setting body composed of representatives from various national standards organizations.

Denial of service attack (Dos)

- is any type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses.

Presentation Layer

- is layer 6 of the 7-layer Open Systems Interconnection (OSI) model. It is used to present data to the application layer (layer 7) in an accurate, well-defined and standardized format. The presentation layer is sometimes called the syntax layer.

Data currency

- is monetary value assigned to data to identify its financial significance to an organization. Once the monetary value of data assets is identified, it may be used as the unit of exchange in a transaction, either as the sole payment or in combination with money.

Partitioned database

- is normally done for manageability, performance or availability reasons, or for load balancing.

Bolt-on software

- is software that can be easily attached to a client project, for example, a website. The term "bolt-on" is similar to the term "plug-and-play" that is used to describe pieces of software that are easily integrated into other larger systems.

Home page

- the introductory page of a website, typically serving as a table of contents for the site. - a web page set as the default or start-up page on a browser.

Transfer Control Protocol/Internet Protocol (TCP/IP)

- is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).

Navigational database

- is the combination of both the hierarchical and network model of database interfaces. Navigational techniques utilize "pointers" and "paths" to navigate among data records.

Cardinality

- is the degree of association between two entities. - Four basic forms of cardinality are possible: zero or one (0,1), one and only one (1,1), zero or many (0,M), and one or many (1,M).

Electronic data interchange (EDI)

- is the electronic interchange of business information using a standardized format; a process which allows one company to send information to another company electronically rather than with paper. Business entities conducting business electronically are called trading partners.

Electronic funds transfer (EFT)

- is the electronic transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, via computer-based systems, without the direct intervention of bank staff.

Physical Layer

- is the first layer of the Open System Interconnection Model (OSI Model). The physical layer deals with bit-level transmission between different devices and supports electrical or mechanical interfaces connecting to the physical medium for synchronized communication.

Transport Layer

- is the layer in the open system interconnection (OSI) model responsible for end-to-end communication over a network. It provides logical communication between application processes running on different hosts within a layered architecture of protocols and other network components.

Database concurrency

- is the presence of complete and accurate data at all remote sites.

Changed data capture (CDC)

- is the process of capturing changes made at the data source and applying them throughout the enterprise. CDC minimizes the resources required for ETL ( extract, transform, load ) processes because it only deals with data changes. The goal of CDC is to ensure data synchronicity.

HyperText Markup Language (HTML)

- is the set of markup symbols or codes inserted in a file intended for display on a World Wide Web browser page. The markup tells the Web browser how to display a Web page's words and images for the user.

Secure Sockets Layer (SSL)

- is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral.

Network Layer

- is the third level of the Open Systems Interconnection Model (OSI Model) and the layer that provides data routing paths for network communication. Data is transferred in the form of packets via logical network paths in an ordered format controlled by the network layer.

Unauthorized access

- is the use of a computer or network without permission. A cracker, or hacker, is someone who tries to access a computer or network illegally. Some hackers break into a computer for the challenge. However, others use or steal computer resources or corrupt a computer's data.

Consolidation

- is to combine assets, liabilities and other financial items of two or more entities into one. In the context of financial accounting, the term consolidate often refers to the consolidation of financial statements, where all subsidiaries report under the umbrella of a parent company.

Digital certificate

- is to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply. An individual wishing to send an encrypted message applies for a digital certificate from a Certificate Authority (CA).

Occurrence

- is used to describe the number of instances or records that pertain to a specific entity.

Digital authentication or e-authentication

- may be used synonymously when referring to the authentication process that confirms or certifies a person's identity and works.

Partial dependencies

- means that a nonprime attribute is functionally dependent on part of a candidate key. (A nonprime attribute is an attribute that's not part of any candidate key.) For example, let's start with R{ABCD}, and the functional dependencies AB->CD and A->C. The only candidate key for R is AB.

Insertion anomaly

- occurs when certain attributes cannot be inserted into the database without the presence of other attributes. For example this is the converse of delete anomaly - we can't add a new course unless we have at least one student enrolled on the course.

Data Link Layer

- or layer 2 is the second layer of the seven-layer OSI model of computer networking. This layer is the protocol layer that transfers data between adjacent network nodes in a wide area network (WAN) or between nodes on the same local area network (LAN) segment.

Online analytical processing (OLAP)

- performs multidimensional analysis of business data and provides the capability for complex calculations, trend analysis, and sophisticated data modeling.

Structured query language (SQL)

- pronounced either see-kwell or as separate letters. SQL is a standardized query language for requesting information from a database. The original version called SEQUEL (structured English query language) was designed by an IBM research center in 1974 and 1975.

Session Layer

- provides the mechanism for opening, closing and managing a session between end-user application processes, i.e., a semi-permanent dialogue.

Ping

- query (another computer on a network) to determine whether there is a connection to it.

Slicing and dicing

- refers to a strategy for segmenting, viewing and understanding data in a database. Users slices and dice by cutting a large segment of data into smaller parts, and repeating this process until arriving at the right level of detail for analysis.

Supply chain management (SCM)

- the management of the flow of goods and services, involves the movement and storage of raw materials, of work-in-process inventory, and of finished goods from point of origin to point of consumption.

Protocol

- the official procedure or system of rules governing affairs of state or diplomatic occasions. - the original draft of a diplomatic document, especially of the terms of a treaty agreed to in conference and signed by the parties.

Encryption

- the process of converting information or data into a code, especially to prevent unauthorized access.

Value chain

- the process or activities by which a company adds value to an article, including production, marketing, and the provision of after-sales service.

Duality

- the quality or condition of being dual. - an instance of opposition or contrast between two concepts or two aspects of something; a dualism.

Big bang

- the rapid expansion of matter from a state of extremely high density and temperature that according to current cosmological theories marked the origin of the universe.

Computer Security Institute (CSI)

- was a professional membership organization serving practitioners of information, network, and computer-enabled physical security, from the level of system administrator to the chief information security officer. It was founded in 1974.

Private Communications Technology (PCT)

- was a protocol developed by Microsoft in the mid-1990s.

Access control list (ACL)

- with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects.

Master files

-A collection of records pertaining to one of the main subjects of an information system, such as customers, employees, products and vendors. Master files contain descriptive data, such as name and address, as well as summary information, such as amount due and year-to-date sales.

Relational databases

-A database structured to recognize relations among stored items of information.

Flat-File

-A file having no internal hierarchy.

Data updating

-A manipulation involving adding, modifying, or deleting data to bring a file or database upto-date. A relatively minor release or version upgrade to an existing software product that adds minor features or corrects bugs.

Users

-A person who uses or operates something, especially a computer or other machine.

Program error/Software errors

-A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.

Database

-A structured set of data held in a computer, especially one that is accessible in various ways.

Entity relationship (ER) diagrams

-Also called an entity-relationship (ER) diagram. -Is a graphical representation of entities and their relationships to each other, typically used in computing in regard to the organization of data within databases or information systems.

Physical database

-Also known as database design -Is a representation of a data design as implemented, or intended to be implemented, in a database management system. In the life cycle of a project it typically derives from a logical data model, though it may be reverse-engineered from a given database implementation.

Data elements

-Any unit of data defined for processing is a data element; for example, ACCOUNT NUMBER, NAME, ADDRESS and CITY. A data element is defined by size (in characters) and type (alphanumeric, numeric only, true/false, date, etc.). A specific set of values or range of values may also be part of the definition.

Data

-Facts and statistics collected together for reference or analysis. -The quantities, characters, or symbols on which operations are performed by a computer, being stored and transmitted in the form of electrical signals and recorded on magnetic, optical, or mechanical recording media.

Task-Data/Data Dependecy

-In computer science is a situation in which a program statement (instruction) refers to the data of a preceding statement. In compiler theory, the technique used to discover data dependencies among statements (or instructions) is called dependence analysis.

Malicious act

-Involving malice; characterized by wicked or mischievous motives or intentions. An act done maliciously is one that is wrongful and performed willfully or intentionally, and without legal justification.

Relational database

-Is a collection of data items organized as a set of formally-described tables from which data can be accessed or reassembled in many different ways without having to reorganize the database tables. -It was invented by E. F. Codd at IBM in 1970.

Data files

-Is a computer file which stores data to be used by a computer application or system.

Data redundancy

-Is a condition created within a database or data storage technology in which the same piece of data is held in two separate places. This can mean two different fields within a single database, or two different spots in multiple software environments or platforms.

Flat-file model

-Is a database that stores data in a plain text file. -Each line of the text file holds one record, with fields separated by delimiters, such as commas or tabs. -A flat file database cannot contain multiple tables like a relational database can.

Data storage

-Is a general term for archiving data in electromagnetic or other forms for use by a computer or device. Different types of data storage play different roles in a computing environment.

Database configurations/Configuration Management Database (CMDB)

-Is a repository that acts as a data warehouse for information technology (IT) installations. It holds data relating to a collection of IT assets (commonly referred to as configuration items (CI)), as well as to descriptive relationships between such assets.

Storage procedures

-Is a subroutine available to connected relational database system applications. Stored procedures must be called or invoked, as they are sets of SQL and programming commands that perform very specific functions.

Database model

-Is a type of data model that determines the logical structure of a database and fundamentally determines in which manner data can be stored, organized and manipulated.

Database Approach

-Is a way in which data is stored within a computer. It is organized into various charts that are accessed by a variety of computer applications from different locations.

Data attribute

-Is an instance or occurrence of any attribute type. A data attribute value is a characteristic of or any fact describing the occurrence of an entity. For instance, an entity's color maybe "red" or "blue" and other color that correctly describes the entity.

Legacy systems

-Is an old method, technology, computer system, or application program, "of, relating to, or being a previous or outdated computer system." Often a pejorative term, referencing a system as "legacy" means that it paved the way for the standards that would follow it.

Data modeling

-Is often the first step in database design and object-oriented programming as the designers first create a conceptual model of how data items relate to each other. -It involves a progression from conceptual model to logical model to physical schema.

Database Administrator (DBA)

-Is responsible for the performance, integrity and security of a database. They will also be involved in the planning and development of the database, as well as troubleshooting any issues on behalf of the users. -Is the function of managing and maintaining database management systems (DBMS) software. Mainstream DBMS software such as Oracle, IBM DB2 and Microsoft SQL Server need ongoing management.

Replicated databases/Database replication

-Is the frequent electronic copying data from a database in one computer or server to a database in another so that all users share the same level of information. The result is a distributed database in which users can access data relevant to their tasks without interfering with the work of others.

Philosophy

-Is the study of general and fundamental problems concerning matters such as existence, knowledge, values, reason, mind, and language.

Data sharing

-It implies that the data are stored in one or more servers in the network and that there is some software locking mechanism that prevents the same set of data from being changed by two people at the same time. Data sharing is a primary feature of a database management system (DBMS).

Database Management System (DBMS)

-Its purpose is to provide controlled access to the database.

Hierarchical

-Of the nature of a hierarchy; arranged in order of rank.

Data normalization

-Or simply normalization, is the process of organizing the columns (attributes) and tables (relations) of a relational database to reduce data redundancy and improve data integrity. -Normalization is accomplished through applying some formal rules either by a process of synthesis or decomposition.

Relational Model (RM)

-RM for database management is an approach to managing data using a structure and language consistent with first-order predicate logic, first described in 1969 by Edgar F. Codd, where all data is represented in terms of tuples, grouped into relations.

Software

-The programs and other operating information used by a computer.

Hardware

-Tools, machinery, and other durable equipment. -The machines, wiring, and other physical components of a computer or other electronic system. -Tools, implements, and other items used in home life and activities such as gardening.

Network

-a group or system of interconnected people or things. -a group of people who exchange information, contacts, and experience for professional or social purposes. -connect as or operate with a network.

Business Information Systems

-is a boundary-spanning field of study relating to how information and communication technologies (ICT) can be deployed to improve business processes and enhance the organisation's value chain networks, which organisations use to acquire, produce, and deliver goods and services all over the world, through efficient, effective and competitive use of ICT.

Access method

-is a function of a mainframe operating system that enables access to data on disk, tape or other external devices. They were introduced in 1963 in IBM OS/360 operating system.

Data definition language (DDL)

-is a standard for commands that define the different structures in a database. DDL statements create, modify, and remove database objects such as tables, indexes, and users. Common DDL statements are CREATE, ALTER, and DROP.

Task-data/Data independence

-is the type of data transparency that matters for a centralized DBMS. It refers to the immunity of user applications to changes made in the definition and organization of data. Physical data independence deals with hiding the details of the storage structure from user applications.

Disk failure

-occurs when a hard disk drive malfunctions and the stored information cannot be accessed with a properly configured computer.

Backup and recovery

-refers to the process of backing up data in case of a loss and setting up systems that allow that data recovery due to data loss. Backing up data requires copying and archiving computer data, so that it is accessible in case of data deletion or corruption.


Related study sets

Gallbladder and Billiary System - Ch: 6

View Set

Micro Chapter 17 Wage Determination

View Set

Reading Comprehension - Chapter 2: The Basics of Reading Comprehension

View Set

Chapter 2-6 Section Quiz Questions

View Set