Unit 5 - Administration Flashcards

1
Q

ACID

A

An acronym for the four properties that ensure data validity: Atomicity, Consistency, Isolation, and Durability. Transactions are database operations that satisfy the ACID properties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Atomicity

A

The quality of indivisibility. In SQL database terms, atomicity means the transaction cannot be partially executed: Either all statements are executed or none of them are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Atomocity

A

The quality of being indivisible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

The assurance that data will be available when it is needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

B-Tree Index

A

A type of index that uses an upside-down tree to create a hierarchical system of nodes that reference the data being searched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BEGIN

A

A statement that marks the beginning of a transaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Backup Strategy

A

A plan that specifies what will be backed up and how often.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Balanced Structure

A

A B-tree index structure in which all leaf nodes are at the same level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIA Triad

A

The combination of confidentiality, integrity, and availability that ensures data and systems are fully protected from security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

COMMIT

A

A statement that marks the end of a transaction and makes the transaction’s results permanent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CREATE INDEX

A

A statement that enables you to create a new index for a column in a table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CREATE ROLE

A

A statement that creates a new role in a PostgreSQL database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Child Node

A

A node that appears below another node (its parent node) in a B-tree.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Confidentiality

A

The assurance that private data is not accessible to unauthorized persons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Consistency

A

The quality of something being done the same way in all cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Consistent State

A

A state in which all of the data integrity constraints on the database are satisfied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DROP INDEX

A

A statement that enables you to drop (delete) an index.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data Migration

A

The process of moving data from one database system or platform to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Differential Backup

A

A backup strategy that runs a full backup only on certain days and then backs up only the data that has changed since the last full backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Dumping

A

The process of extracting data or information from a system or application and storing it in a file or memory space for backup, analysis, or debugging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Durability

A

The quality of continuing to exist without being undone or removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Full Backup

A

A backup strategy where every backup performed backs up all data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

GRANT

A

A statement used to grant permission to use or access a role, or to assign privileges to a role.

24
Q

Group Role

A

A role that represents a group of users and is used to assign privileges to them.

25
Q

Hash Collision

A

A situation in which multiple data values produce the same hash value, so the index returns erroneous results.

26
Q

Hash Function

A

An algorithm that computes the hash value of data by performing math operations on it.

27
Q

Hash Index

A

An index that stores the hashes of the values of the indexed fields and looks up data by hashing the query’s request and comparing it to the hash values.

28
Q

Hash Value

A

The result of running data through a hash function.

29
Q

Incremental Backup

A

A backup strategy that runs a full backup only on certain days and then backs up only the data that has changed since the last backup of any kind.

30
Q

Index

A

A database object that improves the speed of data retrieval operations on a database table at the expense of additional writes and storage space.

31
Q

Integrity

A

The assurance that data is consistent and free from errors.

32
Q

Internal Node

A

A node located between the root node and the leaf nodes in a B-tree.

33
Q

Isolation

A

The quality of being inaccessible until certain conditions are met.

34
Q

Key

A

A representation of the data being searched for.

35
Q

Leaf Node

A

A node that contains pointers to the table location containing the data being looked up.

36
Q

Login Role

A

A role that determines the ability of a user to connect to the database.

37
Q

Multi-Factor Authentication (MFA)

A

A security measure that requires multiple authentication methods for a user to access a system.

38
Q

Multiple Inheritance

A

In the context of database roles, the ability to inherit attributes or privileges from more than one role.

39
Q

Node

A

A logical unit within a B-tree that contains a set of keys and pointers.

40
Q

Pointer

A

A connector between one node level and the next.

41
Q

Principle of Least Privilege

A

A security best practice that dictates that each account should have only the privileges it needs for the user to accomplish their assigned work.

42
Q

Privilege

A

A permission assigned to a role, such as the ability to add or update records.

43
Q

REVOKE

A

A statement used to revoke a privilege.

44
Q

ROLLBACK

A

An operation that returns the database to some previous state.

45
Q

Role

A

Entity used for authentication and access control.

46
Q

Root Node

A

The node at the top of a B-tree.

47
Q

SQL Injection

A

A hacking technique that inserts malicious SQL statements into a data entry field in an attempt to execute the statements on the database.

48
Q

Superuser

A

An account role that has unlimited access and privilege to every object and activity in the database system.

49
Q

Transaction

A

A sequence of statements that are performed as a group; if one fails to execute, they all fail.

50
Q

Value

A

The data associated with a key.

51
Q

Virtual Private Network (VPN)

A

A software-based tunnel within a larger network that data can pass through securely, even if the larger network is not secure.

52
Q

pg_dump

A

A utility for backing up a single PostgreSQL database.

53
Q

pg_dumpall

A

A utility for backing up all the databases on a server.

54
Q

pg_restore

A

A command line tool used for restoring databases that were created in non-text formatting using pg_dump or pg_dumpall.

55
Q

psql

A

A command line tool for restoring a database from a plain-text SQL dump file made using pg_dump or pg_dumpall.