click below
click below
Normal Size Small Size show me how
Mr. Timmons
DTP Chapter 8 - Concepts
Question | Answer |
---|---|
Access | Microsoft Access is the only available personal DBMS |
Attribute | A quality or characteristic inherent in or ascribed to someone or something. |
Byte | A sequence of adjacent bits, usually eight, operated on as a unit by a computer. |
Crow’s foot | If two entities have a line between them, but at the end of one line in one of the two directions (left or right) exists an arrow (crow’s foot), then this type of relationship is called one-to-many. |
Crow’s-foot diagram version | A Diagram |
Data integrity problem | The data integrity problem can occur only if data are duplicated. |
Data model | A data model is an abstract model that describes how data is represented and used. |
Database | A computer database is a structured collection of records or data that is stored in a computer system so that a computer program or person using a query language can consult it to answer queries. |
Database administration | A database administrator (DBA) is a person who is responsible for the environmental aspects of a database |
Database application system | A database application system includes the database, the database management system (DBMS), and database applications. |
DBA | A database administrator. |
DB2 | is one of IBM's lines of relational database management system |
Foreign key | In the context of relational databases, a foreign key is a referential constraint between two tables.[1] The foreign key identifies a column or a set of columns in one (referencing) table that refers to a column or set of columns in another (referenced) t |
Form | A webform on a web page allows a user to enter data that is, typically, sent to a server for processing and to mimic the usage of paper forms. |
Identifier | Identifiers (IDs) are lexical tokens that name entities. The concept is analogous to that of a "name". |
Key | In cryptography, a key is a piece of information (a parameter) that controls the operation of a cryptographic algorithm. |
Lost-update problem | When more than one user is trying to access a particular database table at same time. |
Maximum cardinality | The crow’s-foot notation shows the maximum number of entities that can be involved in a relationship. |