database management Flashcards

1
Q

criteria for data integtrity

A

relevance (provides meaningful info)
accuracy (degree to which data measures against true value)
correctness (conforms to approved standard or agrees with logic)
currency (up to date)
completeness (all required essential data is known)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

corruption of data

A

errors in computer data that occur during writing,reading,storage,transmission or processing which introduces unintended changes to og data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

hard drive failure

A

failure of hard drive that stores data results in loss of data or data corruption

RAID 1 (mirroring) + RAID 5 (striping) :provides one or more hard drives in case of failure
backup: used to recover prev version of data
audit trails: identify change to data since corruption (if stored in place separate to faulty drive)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

human error

A

data accidentally deleted or updated incorrectly

minimise edit privileges: only few trusted,experienced users have edit privileges
audit trail: record changes made, who made it and when
data validation: reject data that does not comply with validation rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

power outages

A

saving data, stopping applications and services process not executed - data loss/corruption

UPS- protects system by providing power
redundant power supply- second power supply will provide power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

malware

A

corrupted data w viruses,ransomware pr users unintentionally download malware
firewall : prevent malware from entering
anti malware: detect malware + take action
education: educate users on network abt social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

sql injection

A

running maliciously intended sql queries to gain access to confidential data or destroy tables

data validation: validate user input to check for possible sql injections
gui components: restrict data input
limit website access to database : remove INSERT,UPDATE,DELETE rights to any website
don’t send db error messages to clients web browser: can be used to understand db structure and adapt their sql injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

outdated data

A

affects currency
add new records
change existing records
deleting records no longer needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

invalid data

A

can be exposed + corrected using validation checks required by scenario w gui components, exception handling and if statements to apply validation rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

file synchronisation

A

done through internet connectivity
having same data on more than 1 device using the same internet credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

file synchronisation

A

done through internet connectivity
having same data on more than 1 device using the same internet credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SQL

A

Structured query language
programming language to perform CRUD (create,read,update,delete) operations on a relational database
w data structured into tables linked by primary and foreign keys
relationsl/SQL databases are not flexible, schema (tables) must be designed before data can be added

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

database schema

A

table design
highly structured and not flexible
column cannot be added or table deleted w/o altering schema
if deleted- may violate referential integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

database schema

A

table design
highly structured and not flexible
column cannot be added or table deleted w/o altering schema
if deleted- may violate referential integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NoSQL

A

unstructured, flexible
store data in documents
ideal for storing massive amounts of unstructured data without predefined schema
can adapt to changing data
Types : Document NoSQL db- fileholder that collects data of many diff types
Key-Value NoSQL database
uses JSON files with key-value pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OLTP

A

databases quickly process large volume of simple queries using OnLine Transactional Processing to immediately respond to user’s requests

17
Q

data warehouse

A

combines data from variety of sources w/in an org for the purpose of producing reports and analysis
reports created from complex queries
unlike database, does not contain current info and is not updated in real time
data denormalised

18
Q

OLAP

A

OnLine Analytical Processing
process data warehouse data - massive volumes of data quickly analysed using OLAP to produce reports
faster than OLTP but queries come out slower

19
Q

big data

A

massive volume of structured and unstructured data slows large that it is difficult to process using traditional database + software techniques
gathered using many sources (eg mobile devices, sensory technologies,sensors,audit trails,pictures,videos,gps signals, transaction records, RFID readers)
used in many areas (eg business, genomics,meteorology, biological and environmental research,complex physics simulations

20
Q

big data charcaterisations

A

volume: size of data that needs to be analysed and processed. so large- requires different processing techniques- cant be processed by laptop or desktop

velocity- speed at which data is generated. so high- requires distributed processing techniques

variety: variety of sources . data either structured or unstructured

veracity: quality of data, accuracy, applicability . high veracity- many valuable records. low- large proportion of meaningless data

21
Q

KDD

A

knowledge discoverability in databases
process of discovering useful knowledge from, collection of data
data cleaning ( remove inconsistent data)
data integration (combine data from multiple sources)
data selection ( select data relevant to analysis task)
data transformation ( transform data into appropriate form for mining)
data mining ( apply intelligent methods to extract patterns)
pattern evaluation ( interpret patterns of interest )
knowledge presentation ( translate useful patterns into tables/graphs understandable by others)

22
Q

data mining

A

set of techniques for discovering hidden valid and potentially useful patterns/trends in a data set
attempts to find new relationships amongst data to extract useful info
uses machine learning, statistics, AI, database technology
-extract transform + load data onto data warehouse
-store + manage data in multidimensional db system
-provide data access to business analysts
-analyse data by app software
present data in useful format

23
Q

JSON Files

A

JavaScript Object Notation
Convenient way of sharing data
Platform independent
More organised than text file
Flexible- can be used in most programming
Data representation format
Commonly used for APIs and configurations

{“Key” : value} - key value pair

24
Q

arrayList

A

Dynamic- does not store an initial value - grows/shrinks as elements are added/removed

[ //array

{ //each individual object
“Name”: Mr BG , “Age”: 23, “hobbies” : [“weight lifting”,”bowling”]
},
{“Name” : Mr Klaus, “Age” :24, “hobbies”: [“drama”, “singing”]
}
]

25
Q

security measures to ensure data in database is properly protected

A

keep data up to date with regular edits and purges

refrain from printing out personal info relating to users

26
Q

actions to take in data breach

A

POPIA requires
- users notified by email or on website that info has been accessed

  • authorities notified
27
Q

data persistence

A

data stored in permanent storage so it’s available again after programme closed and reopened later