G12 IT Data & Information Management

Cards (34)

  • A relational database is a type of database that organizes data into tables with rows and columns allowing for the establishment of relationships between tables using primary and foreign keys for structured storage and efficient retrieval of information.
  • A primary key is a unique identifier within a relational database table that uniquely identifies each record and ensures data integrity by preventing duplicate or null values.
  • A foreign key is a field or set of fields in a table that refers to the primary key of another table establishing a relationship between the two tables in a relational database system.
  • A composite key is a combination of two or more fields that collectively act as a unique identifier within a database table ensuring data integrity by providing a unique identifier.
  • Normalization is the process of organizing and structuring a database to minimize data redundancy improve data integrity and eliminate anomalies by applying a set of normalization rules.
  • An insert anomaly occurs when data cannot be inserted into a table without also adding unrelated or incomplete information resulting in incomplete or incorrect data records.
  • An update anomaly occurs when modifying data in a table leads to inconsistencies or unintentional changes in other related data within the database causing data integrity issues.
  • A delete anomaly occurs when removing data from a table unintentionally removes other related data that should have been retained resulting in data loss or inconsistencies.
  • Referential integrity is a constraint that ensures relationships between tables in a relational database are maintained preventing actions that would violate or invalidate these relationships.
  • A transaction is a sequence of database operations that are treated as a single unit ensuring that all operations either complete successfully or are rolled back to maintain data consistency.
  • A record lock is a mechanism used in a database to prevent simultaneous access or modification of the same data by multiple users ensuring data integrity and avoiding conflicts.
  • Post: In the context of databases this refers to the process of saving or submitting data to a database typically after completing a transaction or entering new information.
  • Purge refers to the process of permanently deleting or removing data from a database ensuring that it cannot be recovered or restored.
  • Rollback is an operation that reverts a database to its previous consistent state by undoing or reversing the effects of an incomplete or unsuccessful transaction.
  • Data redundancy refers to the unnecessary duplication of data within a database often resulting in wasted storage space increased maintenance efforts and potential data inconsistencies.
  • Access control: Use of software settings and various technologies to controls user's access to data and recources. Can include physical access to equipment.
  • Logical data integrity: The correctness of data or data "making sense" in a particular context.
  • Physical data integrity: Overcoming practical issues such as power failures mechanical issues natural disasters etc and dealing with the physical storage and retrieval of data.
  • Verification is the process of checking whether data or information is accurate complete and free from errors or inconsistencies.
  • Validation is the process of ensuring that data or information meets specific rules standards or criteria and is reliable and usable.
  • An audit trail is a chronological record or log that tracks and documents all activities and changes made to a database for security purposes.
  • Parallel data sets refer to multiple copies or versions of a dataset that are stored and processed simultaneously often for comparison or data analysis purposes. Also called mirroring.
  • Data warehousing is the process of collecting storing and organizing large volumes of structured and sometimes unstructured data from a range of sources and databases.
  • Data mining is the process of extracting useful and meaningful patterns trends or insights from large datasets using statistical mathematical and machine learning techniques.
  • SQL injection attacks are malicious attempts to exploit vulnerabilities in a database-driven application by injecting malicious SQL code allowing unauthorized access or manipulation of data.
  • A database administrator (DBA) is an individual responsible for managing and maintaining a database system including installation configuration security backup and performance optimization.
  • Data collection is the process of gathering and capturing information or data from various sources such as surveys sensors or forms.
  • RFID (Radio Frequency Identification) is a technology that uses radio waves to automatically identify and track objects or individuals.
  • An RFID tag is a small electronic device or label that contains a unique identifier and can be attached to or embedded in an object.
  • An RFID reader is a device that uses radio waves to communicate with and read the information stored on RFID tags.
  • Active tags have their own power source and can transmit data continuously while passive tags rely on the reader's power to transmit data.
  • Invisible data capture refers to the collection of data without direct human interaction or intervention often through automated processes or sensors.
  • Location-based data refers to information that is associated with or determined by the geographical location of a person or object.
  • SQL (Structured Query Language) is a programming language used to manage and manipulate relational databases enabling the retrieval insertion modification and deletion of data.