Chapter 4

Cards (37)

  • Access controls
    Controls that ensure that only authorized personnel have access to the firms assets.
  • Attribute
    : Equivalents to adjectives in the English language coding techniques that serve to describe the objects.
  • Backup controls
    :Controls that ensure that in the event of data loss due to unauthorized access, equipment failure,
    or physical disaster the organization can recover its database.
  • Biometric devices
    : Devices that measure various personal characteristics, such as fingerprints, voice prints, retina prints,or signature characteristics.
  • Conceptual view
    : An entire database that represents the database logically and abstractly, rather than the way ti si physically stored.
  • Concurrency control
    Labelingeach transaction by two
    criteria.
  • Currency of information
    : Aproblem of failing to update all the user files that are affected by a change in status basedonoutdatedinformation.
  • Access method
    : The technique used to locate records and to navigate through the database.
  • Data definition language
    : Programming language used to define the database to the database management system.
  • Data dictionary
    :Description of every d a t aelement in the
    database.
  • Data manipulation language
    : Language used to insert special database commands into application programs written in conventional languages.
  • Data redundancy
    : The replication of essentially the same data in multiple files.
  • Data storage
    : Storing data only once and makes this single source available to al users who need it by efficient data management.
  • Data structure
    : Techniques for physically arranging re- cords in the database.
  • Data updating
    : Organizations that store a great deal of data on master files and reference files that require peri- odic updating to reflect changes.
  • Database administrator (DBA)

    : The individual responsi ble for managing the database resource.
  • Database management system
    : Software system that con- trols access to the data resource.
  • Database model
    : A type of data model thatdetermines the framework of a database in which the data can be stored, organized, and manipulated.
  • Deadlock
    : Amultiple sites to lock out each other from the
    database, thus preventing each from processing its transactions.
  • Entity
    : Aresource, event, or agent.
  • Flat-file model
    : An older system that are still in operation today. Private ownership of data, which characterizes this model, is the root cause of several problems that inhibit data integration.
  • Grandfather-father-son (GFS)

    : Atechnique that is used ni sequential file batch systems.
  • Hierarchical data model
    : Adatabase model that represents data in a hierarchical structure and permits only a single
    parent record for each child.
  • Integrated database management system (IDMS)

    : A net work model in which Cullinane/Cullinet Software introduced into commercial market in the 1980s
  • Inference controls
    : controls that prevent users from inferring specific datavalues through normal query features.
  • Information management system (IMS)

    : It is a hierarchi- cal database that describe the relationship between two linked files.
  • Internal view
    : The physical arrangement of records in the database.
  • Legacy systems
    : It is a flat-file approach that contain records with n o structured relationships to other files.
  • Many-to-many (M: M) association
    : The business rela- tionship between an organization's inventory and its suppliers illustrates the M: M association
  • Navigational models:

    Model that possesses explicit links or paths among data elements.
  • Network model
    : Variation of the hierarchical model.
  • Off-site storage
    : Storing backup files in a secure location.
  • One-to-many (1: M) association
    : For every occurrence customer in the customer able. there are zero, one. or
    many sales orders in the sales order table.
  • Organization
    : Recording data on the storage device either sequential or random
  • Partitioned database approach
    : Database approach that splits the central database into segments or partitions that are distributed to their primary users.
  • Physical database
    : A lowest level of the database and the only level that exists in physical form. It consists ofmag- netic spots on metallic coated disks that create alogical collection of files and records.
  • Record type
    : a physical database representation ofanentity.