key terms Flashcards
The column or set of columns that can be used to uniquely identify a record in a table.
Primary Key
A column in a table that refers to a primary key column in another table.
Foreign Key
A primary key that includes more than one column.
Composite Key
A record in the table. For example in a students table the row is all the information about one student.
Row
A category of data in a table such as name, address, cost, etc.
Column
One cell in the table or one column in the record eg. the first name of the student identified by 356789.
Field
All the information about one thing in a table, eg. a row.
Data Record
Mismatched, duplicated, missing or inaccurate data. It can occur during insert, update or delete of data in a table when there are insufficient data integrity constraints in a table or if the table is not normalized or structured correctly.
Data Anomaly
The opposite of a data anomaly. It describes the extent to which data is correctly matched, complete and accurate.
Data Integrity
A rule that prevents duplicate data from being stored in one column of a table. For example, a primary key.
Uniqueness Constraints
The relationship between related data records eg. 1-to-1, 1-to-many, many-to-many.
Cardinality
The quality of data relationships between primary keys and foreign keys in a database.
Referential Integrity
An outline of how that data is organized in a database. It is a graphical illustration that shows how each table is a database is laid out, including the fields, the types of data they contain and how the different tables are connected.
Relational Schema
Contains information about attributes or fields of a certain data set (attribute name(field name), format, max field size, data type, etc).
Data Dictionary
The SQL statement created to align with the Data Dictionary in a practical setting when creating tables.
Table Definition
Allows data administrators to provide different levels of access for users. This will link to user authentication because if their User Level Access cannot be authenticated the user will not be able to access certain data.
User Level Access
A process used to secure data, databases and the overall database solution. Passwords can be hashed so they are not stored in plain text in the database table.
Encryption
Databases need to be regularly backed up. Most of these processes will be automated in a Database Management System.
Backup and Disaster Recovery Process
Potential security threats are malware, data theft and identity theft, invasion of privacy.
Security and Protection
The type of data stored in a column. For example text, numbers, boolean, etc. The data type of a column is a type of domain constraint as it prevents the wrong type of data from being stored in a field.
Data Type