Logo

Navigation
  • Home
  • Services
    • ERP Solutions
    • Implementation Solutions
    • Support and Maintenance Solutions
    • Custom Solutions
    • Upgrade Solutions
    • Training and Mentoring
    • Web Solutions
    • Production Support
    • Architecture Designing
    • Independent Validation and Testing Services
    • Infrastructure Management
  • Expertise
    • Microsoft Development Expertise
    • Mobile Development
    • SQL Server Database and BI
    • SAP BI, SAP Hana, SAP BO
    • Oracle and BI
    • Oracle RAC
  • Technical Training
    • Learn Data Management
      • Business Intelligence
      • Data Mining
      • Data Modeling
      • Data Warehousing
      • Disaster Recovery
    • Learn Concepts
      • Application Development
      • Client Server
      • Cloud Computing Tutorials
      • Cluster Computing
      • CRM Tutorial
      • EDI Tutorials
      • ERP Tutorials
      • NLP
      • OOPS
      • Concepts
      • SOA Tutorial
      • Supply Chain
      • Technology Trends
      • UML
      • Virtualization
      • Web 2.0
    • Learn Java
      • JavaScript Tutorial
      • JSP Tutorials
      • J2EE
    • Learn Microsoft
      • MSAS
      • ASP.NET
      • ASP.NET 2.0
      • C Sharp
      • MS Project Training
      • Silverlight
      • SQL Server 2005
      • VB.NET 2005
    • Learn Networking
      • Networking
      • Wireless
    • Learn Oracle
      • Oracle 10g
      • PL/SQL
      • Oracle 11g Tutorials
      • Oracle 9i
      • Oracle Apps
    • Learn Programming
      • Ajax Tutorial
      • C Language
      • C++ Tutorials
      • CSS Tutorial
      • CSS3 Tutorial
      • JavaScript Tutorial
      • jQuery Tutorial
      • MainFrame
      • PHP Tutorial
      • VBScript Tutorial
      • XML Tutorial
    • Learn Software Testing
      • Software Testing Types
      • SQA
      • Testing
  • Career Training
    • Career Improvement
      • Career Articles
      • Certification Articles
      • Conflict Management
      • Core Skills
      • Decision Making
      • Entrepreneurship
      • Goal Setting
      • Life Skills
      • Performance Development
      • Personal Excellence
      • Personality Development
      • Problem Solving
      • Relationship Management
      • Self Confidence
      • Self Supervision
      • Social Networking
      • Strategic Planning
      • Time Management
    • Education Help
      • Career Tracks
      • Essay Writing
      • Internship Tips
      • Online Education
      • Scholarships
      • Student Loans
    • Managerial Skills
      • Business Communication
      • Business Networking
      • Facilitator Skills
      • Managing Change
      • Marketing Management
      • Meeting Management
      • Process Management
      • Project Management
      • Project Management Life Cycle
      • Project Management Process
      • Project Risk Management
      • Relationship Management
      • Task Management
      • Team Building
      • Virtual Team Management
    • Essential Life Skills
      • Anger Management
      • Anxiety Management
      • Attitude Development
      • Coaching and Mentoring
      • Emotional Intelligence
      • Stress Management
      • Positive Thinking
    • Communication Skills
      • Conversation Skills
      • Cross Culture Competence
      • English Vocabulary
      • Listening Skills
      • Public Speaking Skills
      • Questioning Skills
    • Soft Skills
      • Assertive Skills
      • Influence Skills
      • Leadership Skills
      • Memory Skills
      • People Skills
      • Presentation Skills
    • Finding a Job
      • Etiquette Tips
      • Group Discussions
      • HR Interviews
      • Interview Notes
      • Job Search Tips
      • Resume Tips
      • Sample Resumes
 

Important Terminologies used in Database

By Exforsys | on October 16, 2006 |
Concepts

Important Terminologies used in Database

First let us know what a database is. A database is a collection of interrelated data. RDBMS stands for Relational Database Management System. To name a few Relational Database Management Systems are Oracle, Sybase and Informix and so on. Now let us see important concepts and terms used in this. Database systems are composed of DBMS and database application.

Table

This is the structure defined to store data under it. It is also called as an ENTITY.

Fields

It is also known as attributes in database terminology. It defines the property of an entity. In other words it is called as column in a table.

For example if we have a company where employee details and department details are gathered.

Employee details like empname, age, address and so on each of which form attribute is stored under structure called as EMP table

Similarly department details like department name, manager and so on each of which denote field are stored in a structure called d DEPT table.

Relational Database is nothing but organizing data in tabular form by creating structures as above.

Normalization:

This is an important term or technique used while creating tables. Normalization refers to removing redundancy of data.

Normalization is required because

  • To structure the data so that pertinent relationship between entities or tables can be maintained
  • To permit simple retrieval of data in response to queries.
  • For simple maintenance of data when updates, insertions and deletions take place.
  • To reduce the need to restructure or reorganize data when new application requirement arise.

There are four levels of normalization. They are namely:

  • First Normal Form
  • Second Normal Form
  • Third Normal Form and
  • Boyce Codd Normal Form

In each level redundancy of data is reduced.

JOIN:

We have seen that we can create number of tables. So a situation may arise where rows of one table need to be joined with rows in another by common values in corresponding columns. This is done in database terminology by using JOIN concept. So join helps to fetch data from one or more table that can be related by some condition.

Referential Integrity

This is important terminology in Relational Database Management System also called as RDBMS in short. It is created on a table with reference to another table or tables. In this concept foreign key figures out. The table on which the column or a combination of columns is defined by this constraint is called the foreign key is called child table. When this constraint is defined a relation is defined between this table which has the foreign key and a table that has the primary key in relationship with this. This is called as referenced key. The table which has the primary key or in other words the referenced key is called as parent table.

Foreign Key

It is defined as a column or set of columns in a child table to declare referential integrity constraint.

Importance of Data Integrity

Data Integrity refers to accuracy of data. This is very essential for a proper maintenance and usage of database. Integrity of data can be achieved by placing constraints or rules. By placing integrity constraints one can place restrictions or checking while inserting or updating data in database. These two operations are the place when data gets into database.

Concept of Index

This is vital in database. Indexing in database is similar to the concept of pointers. This concept is needed because a database may have thousands of data or values in it and for fetching a particular value one need to perform search on database and this is a time consuming process. In order to have efficient usage of them while doing this search process indexing is used on columns. It is also possible to create unique index. When a column or combination of columns is defined as unique index then those columns cannot have duplicate values. Like dropping of tables and views it is also possible to drop an index.

Security and the concept of Locking in Database

It is very essential to have good security provided to database in order for the data to be kept safe from improper access or from improper updating of data. It is important to give security in database management system in three levels namely

Users: It is essential that only valid users and authorized users must have access to database. This is achieved in database management system by assigning user-id

Objects: It is also essential to give security to objects to tables, views and data and so on which are the important elements of a database.

Privilege: These are nothing but the actions permitted by a particular user on the database. It is essential to define this which gives security for database objects.

Concurrency of data access can be taken care by the technology of locking in database. In other words we know that a table can be accessed by many users and when a user is accessing a table and updating a data care and steps must be taken to prevent another user from accessing the same data at the same time in which the data is getting altered. This is taken care by the concept of locking in database.

When talking about locking the concept of deadlock is very important for one to know in database.

Deadlock

Transaction is unit of work done. So a database management system will have number of transactions. There may be situations when two or more transactions are put into wait state simultaneously .In this position each would be waiting for the other transaction to get released. Suppose we have two transactions one and two both executing simultaneously.

In transaction numbered one we update student table and then update course table. We have transaction two in which we update course table and then update student table. We know that when a table is updated it is locked and prevented from access from other transactions from updating. So in transaction one student table is updated it is locked and in transaction two course table is updated and it is locked. We have given already that both transactions gets executed simultaneously. So both student table and course table gets locked so each one waits for the other to get released. This is the concept of deadlock in DBMS.

Though the database concepts are numerous the above gives an overall idea about the important terminologies used in database.

« « Semaphore in UNIX – An Overview
C++ Variables Scope in Functions » »

Author Description

Avatar

Editorial Team at Exforsys is a team of IT Consulting and Training team led by Chandra Vennapoosa.

Free Training

RSSSubscribe 394 Followers
  • Popular
  • Recent
  • Semaphore in UNIX – An Overview

    October 16, 2006 - 0 Comment
  • ISPF – Know about it

    October 17, 2006 - 0 Comment
  • Features of OOP

    October 22, 2006 - 0 Comment
  • Multiple Virtual Storage (MVS)

    October 22, 2006 - 0 Comment
  • Structured Query Language (SQL) – Basic Concepts

    November 8, 2006 - 0 Comment
  • Quality Aspects to Check While Writing COBOL Program

    October 23, 2006 - 0 Comment
  • Debugging – An Important Aspect in Programming

    August 31, 2006 - 0 Comment
  • Pros and cons of client/server computing

    October 25, 2006 - 0 Comment
  • Design Documents in Programming Methodology

    September 17, 2006 - 0 Comment
  • Feasibility Study – Why needed before programming

    September 17, 2006 - 0 Comment
  • Structured Query Language (SQL) – Basic Concepts

    November 8, 2006 - 0 Comment
  • Pros and cons of client/server computing

    October 25, 2006 - 0 Comment
  • Quality Aspects to Check While Writing COBOL Program

    October 23, 2006 - 0 Comment
  • Multiple Virtual Storage (MVS)

    October 22, 2006 - 0 Comment
  • Features of OOP

    October 22, 2006 - 0 Comment
  • ISPF – Know about it

    October 17, 2006 - 0 Comment
  • Semaphore in UNIX – An Overview

    October 16, 2006 - 0 Comment
  • Software Development Life Cycle

    October 12, 2006 - 0 Comment
  • Table space – Important concept of Database

    October 12, 2006 - 0 Comment
  • Types and Levels of Testing in Programming

    October 2, 2006 - 0 Comment

Exforsys e-Newsletter

ebook
 

Related Articles

  • Structured Query Language (SQL) – Basic Concepts
  • Pros and cons of client/server computing
  • Quality Aspects to Check While Writing COBOL Program
  • Multiple Virtual Storage (MVS)
  • Features of OOP

Latest Articles

  • Project Management Techniques
  • Product Development Best Practices
  • Importance of Quality Data Management
  • How to Maximize Quality Assurance
  • Utilizing Effective Quality Assurance Strategies
  • Sitemap
  • Privacy Policy
  • DMCA
  • Trademark Information
  • Contact Us
© 2023. All Rights Reserved.IT Training and Consulting
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.AcceptReject Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT