Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
44 Cards in this Set
- Front
- Back
after image |
A record that the DBMS places in the journal or log that shows what the data in a row looked like in the database after a transaction update. |
|
authentication |
A technique for identifying the person who is attempting to access a DBMS. |
|
authorization rule |
A rule that specifies which user has what type of access to which data in a database. |
|
backup |
A copy of a database made periodically. |
|
backward recovery |
See rollback. |
|
batch processing |
The processing of a transaction file that contains a group of records to update a database or another file. |
|
before image |
A record that the DBMS places in the journal or log that shows what the data in a row looked like in the database before a transaction update. |
|
biometrics |
A technique to identify users of a database or other resource by physical characteristics such as fingerprints, voiceprints, handwritten signatures, and facial characteristics. |
|
commit |
A special record in a database journal or log that indicates the successful completion of a transaction. |
|
concurrent update |
A situation in which multiple users make updates to the same database at the same time. |
|
database password |
A string of characters assigned by the DBA to a database that users must enter before they can access a database. |
|
data dictionary |
A catalog, usually found in large, expensive DBMSs, that stores data about the entities, attributes, relationships, programs, and other objects in a database. |
|
data independence |
The property that lets you change the structure of a database without requiring you to change the programs that access the database. |
|
deadlock |
A situation in which two or more database users are each waiting to use resources that are held by others. |
|
deadly embrace |
See deadlock. |
|
decrypting |
A process that reverses the encryption of a database. |
|
encryption |
A security measure that converts the data in a database to a format that's indecipherable to normal programs. Decoded by the DBMS. |
|
forward recovery |
A process used to recover a database by reading the log and applying the after image of committed transactions to bring the database up to date. |
|
growing phase |
A phase during a database update in which the DBMS locks all the data needed for a transaction and releases none of the locks. |
|
journal |
A file that contains a record of all the updates made to a database. The DBMS uses the journal to recover a database that has been damaged or destroyed. |
|
journaling |
Maintaining a journal or log of all updates to a database. |
|
locking |
A DBMS's denial of access by other users to data while the DBMS processes one user's updates to the database. |
|
log |
A file that contains a record of all the updates made to a database. DBMS uses to recover a database that has been damaged or destroyed. |
|
metadata |
Data about the data in a database. |
|
nonprocedural language |
A language in which a user describes the task that is to be accomplished by the computer rather than the steps that are required to accomplish it. |
|
password |
A string of characters assigned by a DBA to a user that the user must enter to access a database. |
|
permission |
The specification of the kind of access a user has to the objects in a database. |
|
privacy |
The right of individuals to have certain information about them kept confidential. |
|
procedural language |
A language in which a user specifies the steps that are required for accomplishing a task instead of merely describing the task itself. |
|
recovery |
The process of returning a database to a state that is known to be correct from a state know to be incorrect. |
|
replica |
A copy of the data in a database that a user can access at a remote site. |
|
replicate |
A duplicate of the data in a database that a user can access at a remote site. |
|
rollback |
A process to recover a database to a valid state by reading the log for a problem transactions and applying the before images to undo their updates. |
|
save |
See backup. |
|
shrinking phase |
A phase during a database update in which the DBMS releases all the lock previously acquired for a transaction and acquires no new locks. |
|
smart card |
Small plastic cards about the size of a driver's license that have built-in circuits containing processing logic to identify the cardholder. |
|
synchronization |
The periodic exchange by a DBMS of all updated data between two databases in a replica set. |
|
timestamp |
The unique time when the DBMS starts a transaction update to a database. |
|
timestamping |
The process of using timestamps to avoid the need to lock rows in a database and to eliminate the processing time needed to apply and release locks and to detect and resolve deadlocks. |
|
transaction |
A set of steps completed by a DBMS to accomplish a single user task. |
|
two-phase locking |
An approach to locking that is used to manage concurrent update in which there are two phases: a growing phase, in which the DBMS locks more rows and releases none of the locks, and a shrinking phase, in which the DBMS releases all the locks and acquires no new locks. |
|
utility services |
DBMS-supplied services that assist in the general maintenance of a database. |
|
victim |
In a deadlock situation, the deadlocked user's transaction that the DBMS chooses to abort to break the deadlock. |
|
workgroup |
In Access, a group of users who are assigned the same permissions to various objects in a database. |