Database Chapter 8

Get Started. It's Free
or sign up with your email address
Rocket clouds
Database Chapter 8 by Mind Map: Database Chapter 8

1. Data

1.1. Dirty data

1.2. Data quality

1.3. Data profiling software

1.4. Master data management ( MDM ) software

2. Types of Tablespace

2.1. SYSTEM

2.1.1. Stores the data dictionary data

2.2. USERS

2.2.1. Stores the table data created by the end users

2.3. TEMP

2.3.1. Stores the temporary tables and indexes created during the execution of SQL statements

2.4. UNDOTBS1

2.4.1. Stores database transaction recovery information

3. Special Considerations

3.1. Technological aspect

3.2. Managerial aspect

3.3. Cultural aspect

4. Evolution of the Database Administration Function

4.1. Information systems (IS) department

4.2. Database administrator

4.3. Systems administrator

4.4. Data administrator (DA) or information resource manager (IRM)

5. Contrasting DA and DBA activities and characteriestics

5.1. DA(Data administrator)

5.1.1. Perform strategic planning

5.1.2. Sts long-term goals

5.1.3. Sets policies and standards

5.1.4. job is broad in scope

5.2. DBA(Database administrator)

5.2.1. Controls and supervises

5.2.2. Executes plans to reach goals

5.2.3. Enforces policies and procedures

5.2.4. Job is narrow in scope

6. DBA’s Managerial Role

6.1. Disaster management

6.2. Concurrent backup

6.3. Incremental backup

6.4. Full backup or database dump

7. Developing a Data Administration Strategy

7.1. Information engineering (IE):

7.2. Information systems architecture (ISA):

8. Data Dictionary

8.1. Active data dictionary

8.1.1. Automatically updated by the DBMS with every database access

8.2. Passive data dictionary

8.2.1. Requires running a batch process

9. Computer-Aided Systems Engineering (CASE) Tools

9.1. Front-end CASE tools

9.1.1. Provide support for the planning, analysis, and design phases

9.2. Back-end CASE tools

9.2.1. Provide support for the coding and implementation phases

10. Security Vulnerability

10.1. Security threat

10.1.1. Imminent security violation

10.2. Security breach

10.2.1. Occurs when a security threat is exploited and could lead to a database whose integrity is preserved or corrupted