• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/44

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

44 Cards in this Set

  • Front
  • Back

after image

A record that the DBMS places in the journal or log that shows what the data in a row looked like in the database after a transaction update.

authentication

A technique for identifying the person who is attempting to access a DBMS.

authorization rule

A rule that specifies which user has what type of access to which data in a database.

backup

A copy of a database made periodically.

backward recovery

See rollback.

batch processing

The processing of a transaction file that contains a group of records to update a database or another file.

before image

A record that the DBMS places in the journal or log that shows what the data in a row looked like in the database before a transaction update.

biometrics

A technique to identify users of a database or other resource by physical characteristics such as fingerprints, voiceprints, handwritten signatures, and facial characteristics.

commit

A special record in a database journal or log that indicates the successful completion of a transaction.

concurrent update

A situation in which multiple users make updates to the same database at the same time.

database password

A string of characters assigned by the DBA to a database that users must enter before they can access a database.

data dictionary

A catalog, usually found in large, expensive DBMSs, that stores data about the entities, attributes, relationships, programs, and other objects in a database.

data independence

The property that lets you change the structure of a database without requiring you to change the programs that access the database.

deadlock

A situation in which two or more database users are each waiting to use resources that are held by others.

deadly embrace

See deadlock.

decrypting

A process that reverses the encryption of a database.

encryption

A security measure that converts the data in a database to a format that's indecipherable to normal programs. Decoded by the DBMS.

forward recovery

A process used to recover a database by reading the log and applying the after image of committed transactions to bring the database up to date.

growing phase

A phase during a database update in which the DBMS locks all the data needed for a transaction and releases none of the locks.

journal

A file that contains a record of all the updates made to a database. The DBMS uses the journal to recover a database that has been damaged or destroyed.

journaling

Maintaining a journal or log of all updates to a database.

locking

A DBMS's denial of access by other users to data while the DBMS processes one user's updates to the database.

log

A file that contains a record of all the updates made to a database. DBMS uses to recover a database that has been damaged or destroyed.

metadata

Data about the data in a database.

nonprocedural language

A language in which a user describes the task that is to be accomplished by the computer rather than the steps that are required to accomplish it.

password

A string of characters assigned by a DBA to a user that the user must enter to access a database.

permission

The specification of the kind of access a user has to the objects in a database.

privacy

The right of individuals to have certain information about them kept confidential.

procedural language

A language in which a user specifies the steps that are required for accomplishing a task instead of merely describing the task itself.

recovery

The process of returning a database to a state that is known to be correct from a state know to be incorrect.

replica

A copy of the data in a database that a user can access at a remote site.

replicate

A duplicate of the data in a database that a user can access at a remote site.

rollback

A process to recover a database to a valid state by reading the log for a problem transactions and applying the before images to undo their updates.

save

See backup.

shrinking phase

A phase during a database update in which the DBMS releases all the lock previously acquired for a transaction and acquires no new locks.

smart card

Small plastic cards about the size of a driver's license that have built-in circuits containing processing logic to identify the cardholder.

synchronization

The periodic exchange by a DBMS of all updated data between two databases in a replica set.

timestamp

The unique time when the DBMS starts a transaction update to a database.

timestamping

The process of using timestamps to avoid the need to lock rows in a database and to eliminate the processing time needed to apply and release locks and to detect and resolve deadlocks.

transaction

A set of steps completed by a DBMS to accomplish a single user task.

two-phase locking

An approach to locking that is used to manage concurrent update in which there are two phases: a growing phase, in which the DBMS locks more rows and releases none of the locks, and a shrinking phase, in which the DBMS releases all the locks and acquires no new locks.

utility services

DBMS-supplied services that assist in the general maintenance of a database.

victim

In a deadlock situation, the deadlocked user's transaction that the DBMS chooses to abort to break the deadlock.

workgroup

In Access, a group of users who are assigned the same permissions to various objects in a database.