Save
SOFTWARE ENG (Midterm)
Save
Share
Learn
Content
Leaderboard
Learn
Created by
RealisticHyena16857
Visit profile
Cards (53)
Collection of stored data that is centrally managed and controlled. -
Database
Database is manage and controlled by a -
database management system
a system software component that is generally purchased -
DBMS
Actual data for the problem domain -
application
domain data
contains descriptive information about the application domain data -
schema
it describes the structure and rules for accessing the application domain data -
schema data
collection of steps that help with designing -
database design
main purpose is to produce physical and logical model of designs -
database
design
responsibility for the structure and integrity of the data itself -
data administrator
Naming standards -
Data standards
Ownership of data -
data use
Validation rules -
data quantity
maintains the database after it has been deployed - database
administrator
their job is to ensure the database, both data and the DDBMS, is configured correctly -
Database administrator
Database administrator responsibilities:
Managing
multiple
DBMS environment
organizes stored data into structures called tables or relations -
relation
database
management
system
two dimensional structure composed of rows and columns -
table
(
relation
)
table row represent data -
tuple
each column represents an -
attribute
each intersection of a row and column represents a
single
data value
set of attributes -
key
group of attributes that determine the values of other attributes -
key
attributes that uniquely identifiers -
Super key
a super key without any unnecessary attributes -
Candidate Key
Candidate key selected to uniquely identify all other attribute value -
Primary Key
combination of attributes in one table whose value must either match the primary key -
Foreign Key
used to strictly for data retrieval -
Secondary Key
technique by which any update to database is logged with such audit -
Transaction
logging
objectives of transaction logging:
helps to
discourage
fraudulent
provides
recovery
mechanism for
erroneous
transactions
piece of work that has several steps -
transaction
steps of
transaction
:
read database
update database
start a timer
accept user purchase information
verify credit and send a charge
post the users payment
permanently update the seat database
update the user information
apply
database lock
to protect against lost updates
only needs to read the data -
shared lock
needs to read and then
rewrite
the data -
exclusive lock
/write
lock
application of standard business practices to building software applications -
Software development life cycle
project can be planned and organized -
predictive approach
users needs are not well understood -
adaptive approach
secures approval to develop new system -
project initiation
involves planning organizing and scheduling the project - project
planning
focuses on discovering and understanding the deteail of the problem -
analysis
See all 53 cards