Unit 5 - Administration Flashcards

1
Q

ACID

A

An acronym for the four properties that ensure data validity: Atomicity, Consistency, Isolation, and Durability. Transactions are database operations that satisfy the ACID properties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Atomicity

A

The quality of indivisibility. In SQL database terms, atomicity means the transaction cannot be partially executed: Either all statements are executed or none of them are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Atomocity

A

The quality of being indivisible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

The assurance that data will be available when it is needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

B-Tree Index

A

A type of index that uses an upside-down tree to create a hierarchical system of nodes that reference the data being searched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

BEGIN

A

A statement that marks the beginning of a transaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Backup Strategy

A

A plan that specifies what will be backed up and how often.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Balanced Structure

A

A B-tree index structure in which all leaf nodes are at the same level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIA Triad

A

The combination of confidentiality, integrity, and availability that ensures data and systems are fully protected from security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

COMMIT

A

A statement that marks the end of a transaction and makes the transaction’s results permanent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CREATE INDEX

A

A statement that enables you to create a new index for a column in a table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CREATE ROLE

A

A statement that creates a new role in a PostgreSQL database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Child Node

A

A node that appears below another node (its parent node) in a B-tree.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Confidentiality

A

The assurance that private data is not accessible to unauthorized persons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Consistency

A

The quality of something being done the same way in all cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Consistent State

A

A state in which all of the data integrity constraints on the database are satisfied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DROP INDEX

A

A statement that enables you to drop (delete) an index.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data Migration

A

The process of moving data from one database system or platform to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Differential Backup

A

A backup strategy that runs a full backup only on certain days and then backs up only the data that has changed since the last full backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Dumping

A

The process of extracting data or information from a system or application and storing it in a file or memory space for backup, analysis, or debugging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Durability

A

The quality of continuing to exist without being undone or removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Full Backup

A

A backup strategy where every backup performed backs up all data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

GRANT

A

A statement used to grant permission to use or access a role, or to assign privileges to a role.

24
Q

Group Role

A

A role that represents a group of users and is used to assign privileges to them.

25
Hash Collision
A situation in which multiple data values produce the same hash value, so the index returns erroneous results.
26
Hash Function
An algorithm that computes the hash value of data by performing math operations on it.
27
Hash Index
An index that stores the hashes of the values of the indexed fields and looks up data by hashing the query's request and comparing it to the hash values.
28
Hash Value
The result of running data through a hash function.
29
Incremental Backup
A backup strategy that runs a full backup only on certain days and then backs up only the data that has changed since the last backup of any kind.
30
Index
A database object that improves the speed of data retrieval operations on a database table at the expense of additional writes and storage space.
31
Integrity
The assurance that data is consistent and free from errors.
32
Internal Node
A node located between the root node and the leaf nodes in a B-tree.
33
Isolation
The quality of being inaccessible until certain conditions are met.
34
Key
A representation of the data being searched for.
35
Leaf Node
A node that contains pointers to the table location containing the data being looked up.
36
Login Role
A role that determines the ability of a user to connect to the database.
37
Multi-Factor Authentication (MFA)
A security measure that requires multiple authentication methods for a user to access a system.
38
Multiple Inheritance
In the context of database roles, the ability to inherit attributes or privileges from more than one role.
39
Node
A logical unit within a B-tree that contains a set of keys and pointers.
40
Pointer
A connector between one node level and the next.
41
Principle of Least Privilege
A security best practice that dictates that each account should have only the privileges it needs for the user to accomplish their assigned work.
42
Privilege
A permission assigned to a role, such as the ability to add or update records.
43
REVOKE
A statement used to revoke a privilege.
44
ROLLBACK
An operation that returns the database to some previous state.
45
Role
Entity used for authentication and access control.
46
Root Node
The node at the top of a B-tree.
47
SQL Injection
A hacking technique that inserts malicious SQL statements into a data entry field in an attempt to execute the statements on the database.
48
Superuser
An account role that has unlimited access and privilege to every object and activity in the database system.
49
Transaction
A sequence of statements that are performed as a group; if one fails to execute, they all fail.
50
Value
The data associated with a key.
51
Virtual Private Network (VPN)
A software-based tunnel within a larger network that data can pass through securely, even if the larger network is not secure.
52
pg_dump
A utility for backing up a single PostgreSQL database.
53
pg_dumpall
A utility for backing up all the databases on a server.
54
pg_restore
A command line tool used for restoring databases that were created in non-text formatting using pg_dump or pg_dumpall.
55
psql
A command line tool for restoring a database from a plain-text SQL dump file made using pg_dump or pg_dumpall.