Database Terms And Internet Terms Flashcards
Data
- smallest unit of info
- eg employees hourly wage rate
- processed and stored as bits and bytes
- data is raw numbers and information is processed data
Record
- a log for eg of employees hourly wage rate, hours worked in a week
File
A collection of related records. An example is a payroll file containing payroll records.
Directory
The list of files stored on a disk (e.g., payroll directory).
Dataset
A collection of related bytes, or characters, of secondary storage. For example, a dataset may be a file of payroll records or a library of payroll programs.
In z/OS, a data set is a named collection of related data records that is stored and retrieved by an assigned name. A data set is equivalent to a file in other operating systems. Data sets are stored on tape or disks.
Database
A collection of interrelated data stored together, using a common and controlled approach (e.g., payroll)
Database System
Data is maintained independently of the application programs.
Data can be shared by many programs and users.
Database management system (DBMS) software manages and controls the data and the database software.
Data Dictionary
Contains attributes and characteristics of each data element or field in a computer record. It also includes file organization and structure and edit and validation rules.
Schema
A set of specifications that defines a database.
Specifically, it includes entity names, sets, groups, data items, areas, sort sequences, access keys, and security locks.
A logical view of an entire database is called a schema. Schemas may be external, conceptual, or internal. A synonym for the word “schema” is “view.”
Subschema
A subset of a schema. It represents a portion of a database as it appears to a user or application program.
A subschema is a part of schema. In other words, a schema is made up of one or more subschemas.
Subject
A person who is using a computer system (e.g., employee, contractor, and consultant).
Object
A passive entity that contains or receives information. Examples of objects are data, records, blocks, files, and programs.
Access
A specific type of interaction between a subject (e.g., user) and an object (e.g., data) that results in the flow of information from one to the other.
Check-point
A point, generally taken at regular intervals, at which a program’s intermediate results are dumped to a secondary storage (e.g., disk) to minimize the risk of work loss. Databases operate on checkpoints.
Deadlock
A consequence of poor resource management
Occurs when two programs each control a resource (e.g., printer, data file, database, and record) needed by the other and neither is willing to give in its resource.
Databases can run into deadlocks.
Tuple
A row of a relational table in a relational database.
Rollback
Restores the database from one point in time to an earlier point.
Roll forward
Restores the database from a point in time when it is known to be correct to a later time.
Recovery
The process of reconstituting a database to its correct and current state following a partial or complete hardware, software, network, operational, or processing error or failure.
What is a DBMS comprised of?
Software, hardware and procedures
What should the DBMS be compatible with?
The OS
Advantages of a DBMS
1) Min. Data redundancy resulting in data consistency
2) Data independence from application programs except during computer processing
3) Consistent and quality information for decision making
4) Adequate security and integrity controls
5) Shared access to data
6) Single storage location for each data item
7) Built in backup and recovery procedures
Disadvantages of a DBMS
1) Can be expensive to acquire, operate, and maintain.
2) Requires additional main memory.
3) Requires additional disk storage.
4) Requires knowledgeable and technically skilled staff (e.g., database administrator [DBA] and data administrator).
5) Results in additional system overhead, thereby slowing down the system response time.
6) Needs additional CPU processing time.
7) Requires sophisticated and efficient security mechanisms.
8) Is difficult to enforce security protection policies.
When is redundancy of data sometimes necessary?
When high system performance and high data availability are required.