Index – Introduction to Database Management Systems

Index

1:m (1 to many) 77

2NF 152

3NF 152

A

Abstraction 355, 357, 363

access control 128

access path selection 256

access rights 231

ACID 173, 314

acquire phase 207

address 15, 28, 29, 32

aggregate functions 267

aggregation 361, 364

alternate key 118

artificial intelligence 393, 395

association 158, 361, 369, 372

asymmetric key cryptography 224, 226

atomic 49, 95, 174

atomicity 43, 170

attribute 158, 159, 344, 349, 354, 355, 360, 361, 363, 369, 374, 377, 383, 384, 385

Attribute constraints 112

Authentication 221, 222, 400

authorisation 400

Availability 217, 287, 303

Avoid a deadlock 308, 309

B

back-pointer 19, 20

backup site 303, 304

backward recovery 179

base class 363

base station 407

base tables 127

batch processing 7, 71

batch program 45

BCNF 151, 152

before image record 50

Binary associations 369

Binary Large Object (BLOB) 403

binary relationship 158

Binary search 261, 264

Boyce-Codd normal form (BCNF) 149, 156

browser 397, 398

brute force 265

C

candidate key 117, 118, 149, 150, 156

canonical form 255

cardinality 92

Cartesian product 99, 266

CASCADE 125

cell 407

central coordinator 182, 183

centralised 277

centralised computing 278

Centralised control 310

centralised database 299, 300

centralised DBMS 302, 304, 307

centralised system 287

chain 16, 18, 20, 22, 23, 24, 26, 27, 44

chained 180

chained transactions 181

chains/pointers 55

checkpoint records 177

checkpoints 176, 181

child record 77, 80, 81

ciphertext 224

class 350, 352, 353, 354, 361, 363, 367, 369, 366, 373, 374, 383, 384

classification level 232

clearance level 232

client 310, 311, 312, 313, 396, 405

client-side OLAP 335

client/server 378

client/server architecture 310

client/server computing 310, 311

client/server model 310

code reusability 363

column 55, 56

Commit 50, 184

Committed read 209

community user view 84

complex query 26, 41

composite 144

composite candidate key 150

composite key 116, 127, 145, 153

composite primary key 122

compression 403

concatenated primary key 144

conceptual level 84

concurrency 50, 184, 293, 300, 302, 400

concurrency control 306

concurrency control mechanism 185

concurrency problem 185, 186, 196, 203

concurrent transactions 185, 186

confidential 217

confidentiality 221, 400

conjunctive condition 265

connectors 80

consistency 170, 174, 299, 314

consistent 174, 206

constraints 110, 114

conversational 8

coordinator 304

coordinator site 302

cost 256, 294

cost of the query 255

cryptography 224, 226

cursor 74

D

Data 320

data availability 293

Data Base Administrator (DBA) 44

data compression 403

Data consistency 43, 47, 138

data control 59

Data Control Language 70

Data Control Language (DCL) 59

data definition 59

Data Definition Language (DDL) 59, 380

data distribution 399

data duplication 41, 47

Data Encryption Standard (DES) 225

data file 28

data fragmentation 290

data inconsistency 41, 47

data independence 46

data integrity 49, 138, 299

data item 3, 40

data localisation 287

data manipulation 59

Data Manipulation Language 67

Data Manipulation Language (DML) 59, 380

data mart 331, 332, 333, 334

data mining 330, 335

data redundancy 41, 47, 139, 174, 328, 399

data replication 293, 301, 314, 399

data sharing 47

data warehousing 323, 325, 327, 328, 332, 334, 335, 337

database 40, 43, 47

Database Administrator 404

database buffers 176

database catalog 60, 256

database constraints 112, 113

database control 231

database design 136, 138, 142, 148, 157, 160, 404

database integrity 71, 110, 328

database locking 289

Database Management System (DBMS) 40, 43

database modelling 160

database organisation 151

database statistics 272

Datalog 392

DBA 404

DBMS 43, 44, 45, 47, 50

DDBMS 283, 287, 289, 294, 299, 301, 303, 305, 306, 308, 309, 310, 313, 314

deadlock 199, 203, 205, 301, 308, 309, 313

deadly embrace 199

Decision Support Systems (DSS) 325, 334, 335

declarative 111

declarative constraints 112

declarative language 392

decomposition 139, 140, 141, 143, 151, 152, 154, 155

decrypt 224, 225, 226, 227, 229

deductive database 392, 394, 395

deductive mechanism 392

Deductive Object Oriented Databases (DOODB) 393

degree 92

degree n 92

Denormalisation 157

dependent data mart 333

DES-2 226

DES-3 226

Desktop OLAP 335

Detect a Deadlock 308, 309

determinant 149, 151, 156

Difference 96, 104, 266

Digital libraries 404

digital signature 229

direct files 32

dirty (uncommitted) read 190, 199, 200

dirty (uncommitted) read problem 188, 193

dirty read 190

discretionary control 231

distinguished copy 301, 302, 306, 307

distributed 277

distributed computing 278, 311

Distributed control 310

distributed database 277, 278, 280, 282, 284, 287, 289, 299, 300

Distributed Database Management System (DDBMS) 278

distributed deadlock 301

distributed processing 278

distributed queries 294, 297

Distributed query processing 287, 314

distributed systems 307, 308

distributed transaction 288, 301, 308

Distributed transaction processing 314

distributed/replicated databases 400

distribution 299

distribution transparency 283

Divide 96, 107

Division method 33, 34

domain 93

driver index 259, 269

dynamic SQL 75

dynamic Web page 397, 398, 399

E

E:R relationships 160

election 304

Embedded SQL 71, 73, 75

Encapsulation 358, 360, 378

encryption 224, 225, 226, 229

enterprise data warehouse 332, 333, 334

entity 158, 160

entity integrity 126

entity set 158, 159

Entity/Relationship (E/R) modelling 158

equi-join 105

exclusive (X) 196

exclusive (X) lock 198, 199, 204

exclusive lock (X) 197

expert database 392

Extensible Markup Language (XML) 400

external view 84

F

fabrication 222

Facts 393, 394

failure recovery 175

fault tolerance 293

field 3, 9, 40

fifth normal form (5NF) 153, 156

file 2, 8, 40, 41, 43, 44, 45

File Management System (FMS) 40

file name 3

file reorganisation 15

first normal form (1NF) 143, 144, 145, 156

first-level index 31

flat 180

Flat transactions 180

FMS 43, 45

Folding method 33, 34

force-written 176

foreign key 119, 121, 122, 123, 125, 127, 144, 235, 238, 370, 372, 382, 384

Fourth Generation Languages (4GLs) 57

fourth normal form (4NF) 149, 152, 153

fragmentation 284, 287, 290, 291, 299

full database 293

full replication 294

fully replicated database 293

Functional dependency 136, 137, 141, 142, 147, 151, 156

G

gateway 407

generalisation 363, 373

generalise 361

global state 309

Grouping 107

H

handoff 408

hash 32, 229

hashed files 32

Hierarchical 52, 77, 78, 79

Hierarchical control 310

hierarchical database 81, 80

hierarchical model 79, 80

home page 396

horizontal fragmentation 285, 291, 292

host language 71

HTTP 405, 406

hybrid fragmentation 292

Hybrid OLAP 338

Hyper Text Markup Language (HTML) 396

Hyper Text Transfer Protocol (HTTP) 396

hypercubes 337

I

IDEA 226

impedance mismatch 74, 382

inconsistent analysis problem 191, 200

independent data mart 334

index 22, 23, 24, 25, 26, 27, 28, 29, 31, 44, 54, 61, 75, 118

index corruption 26

index file 28, 32

indexed files 27

inference engine 392

information 320

information hiding 360

Inheritance 361, 362, 363, 364, 373, 378

inner join 106

inner query 69

Instance constraints 113

integrated data files 43

integrity 110, 185, 217, 221, 223, 400

integrity constraints 156

interception 222

interface 358, 359, 360, 383

interference 207

interleaved 205

interleaved schedule 205

internal level 84

internal representation 255

Internet 396, 399, 407

Intersect 96

intersection 102, 104, 266

isolation 174, 209

isolation level 207, 209

J

Join 69, 83, 96, 105, 155, 256, 296, 297, 337

joining 68

journal 171

K

key 9, 12, 115, 224, 225, 226, 114

key agreement and distribution 225, 228

key pair 226

knowledge representation 394

knowledge-based database 392

L

legacy systems 325

linear search 260

link records 81

links 80

list merge 259, 269

location transparency 283

lock 196, 197, 199, 207

locking 50, 196, 205

log 50

Logging 289, 307

logic databases 392

logical 83

logical level 84

logical view 45

logically deleted 14

lossless decomposition 140, 141, 142, 144, 154

lossy decomposition 139, 140, 144, 154

lost update problem 186

M

mandatory control 231

many-to-many 79, 371

Many-to-many associations 369

many-to-many relationship 160

master 4

master file 6

master maintenance 4

mathematical logic 393

MDBMS 326

Media recovery 175, 179

message 345, 347, 357, 360

message digest 229

meta-data 60

method 344, 346, 347, 349, 354, 358, 360, 361, 363

Mid-square method 33, 34

mini-transaction 181

mobile computing 404

mobile databases 408

modification 223

multi-level index 30

multi-valued dependency (MVD) 152, 153, 156

Multidimensional DBMS 326

Multidimensional OLAP (MOLAP) 336

multimedia 401, 403

Multimedia databases 403

MVD 154

N

naming transparency 283

natural join 106, 155

nested 180

nested loop join 265

nested query 69

nested transactions 182

Network 52, 77

network model 79, 80

network portioning 300

network transparency 283

networked architecture with one centralised database 281

NO ACTION 125

no replication 294

non hashed files 32

non-atomic 95

non-equi-join 105

non-lossy decomposition 140

non-procedural 109

non-repeatable read 201

non-repeatable read problem 191, 195, 200, 202

non-repudiation 221, 223, 230

non-serial schedule 205

normal form 142

Normalisation 142, 152, 154, 156, 157, 167, 174, 326

O

object 343, 344, 346, 347, 349, 351, 352, 354, 355, 358, 359, 360, 365

Object Definition Language (ODL) 380

Object Identifier (OID) 378

Object Manipulation Language (OML) 380

object orientation 348

Object Oriented Database Management Systems (OODBM 378

object privileges 233, 240

Object Query Language (OQL) 380, 386

object technology 343, 344, 347, 348, 350, 354, 355, 356, 358, 364, 365

objects 344, 349, 354, 357

OLAP 335

On-Line Analytical Processing (OLAP) 334

On-Line Transaction Processing (OLTP) 334

one-to-many 79, 371, 372

One-to-many associations 369

one-to-many record types 78

one-to-many relationship 160

one-to-one relationship 160

one-way chains 18, 19

online processing 8

online query 8, 10

operational data 332

operational data store (ODS) 334

optimisation 75, 272, 403

optimiser 255, 256, 258, 259, 260, 267, 268, 269, 271, 272

origin server 405, 406

outer join 106

outer query 69

P

parent 78, 79

parent key 124, 125, 235

parent record 77, 80, 81

parent-child hierarchy 83

partially replicated database 294

participants 182, 183

performance 157, 257, 293, 304

performance improvement 27

phantom insert problem 195, 202

phantom inserts 209

phantom read problem 195, 202

phantom row 196

physical 83

physical view 45, 84

physically deleted 14

plaintext 224

pointer 15, 16, 22, 23, 25, 27, 28, 31, 44

pre-compiler 73, 75

Prepare phase 183

Prevent a deadlock 308

primary copy 304

primary key 9, 10, 27, 28, 32, 117, 118, 121, 122, 123, 126, 144, 145, 146, 147, 148, 150, 153, 160, 292, 364, 365, 367, 370, 371, 377

primary site 302, 303, 304

Primary site with backup site 304

prime number 229

private key 226, 227, 229

privilege 231, 233, 234, 236, 237, 238, 240, 241, 242, 244

procedural 109, 111

procedural constraints 112

Product 96, 100

Project 96, 99

project-join normal form 153

projection 138, 156, 256, 266, 291, 292

public key 226, 227, 229

public key cryptography 226, 228

public key encryption 228

Q

quantising 401

query 53

query decomposition 299

query optimisation 27, 313

query plans 256

query tree 255

R

RC2 226

RC5 226

RDBMS 52

read 196

read committed 208

read uncommitted 208

real-time processing 8

recomposition 140, 141

record 8, 40, 92

record counts 25

record key 9

record keys 10

record layout 3

record number 32

records 3

recovery 21, 24, 174, 289, 293, 300, 302, 308

Redo 178, 179, 289

redundancy 138, 140, 142, 144, 154, 157, 293

referential integrity 126, 127, 141, 144, 146

referential triggered actions 124

relation 92

Relational 52, 77

Relational algebra 96, 108

Relational calculus 96, 108, 109

relational database 56, 92

Relational Database Management Systems (RDBMS) 40, 58

Relational DBMS 52

relational model 81

Relational OLAP (ROLAP) 336

relationship 158

relationship set 158, 159

relative files 32

release phase 207

Reliability 287, 303

Repeatable read 208, 209

repeatable read problem 209

replication 284, 287, 289, 290, 299

replication transparency 284

Restrict 96, 98, 256

reverse chain 24

Rivest-Shamir-Adleman (RSA) 228

Roll back 50

root 78

row 55, 56, 92

RSA 228

rule 393, 394

S

sampling 401

sampling rate 401

schedule 205, 206

search 10

Second Generation Languages (2GLs) 58

second normal form (2NF) 145, 147, 156

second-level indexes 31

secondary key 9, 118

secret key cryptography 225

security 47, 290

selection 256

Semi-join 297, 298

sequential file 11, 13

Sequential organisation 11, 12, 13

Sequential search 15, 260, 261, 264

serial schedule 205

Serialisable 205, 206, 208, 209

serialised 205

server 310, 311, 312, 313, 396, 397, 405

set 98

Set default 125

Set null 125

shared (S) 196

shared (S) lock 198, 199

shared lock (S) 197

shared nothing 281

single loop join 265

sort join 265

specialisation 363

split 30

spurious row 155

star join 337

static SQL 75

static Web page 397, 398

statistical database 246, 248

stored procedures 111

strong entity set 160

Structured Query Language (SQL) 40, 57

sub-query 69, 299

subclass 361, 363, 364, 373, 374, 376, 377

subset 98

super class 361, 363, 364, 373, 374, 376, 377

superkey 115

symbolic logic 393

symmetric key cryptography 224, 226

synch-points 176

synchronisation 289

syntax tree 255

system 179

system log 171

System privileges 233

System recovery 174

T

table 52, 55, 92

tags 397

Third Generation Language (3GL) 58

third normal form (3NF) 147, 148, 156, 377

TP monitor 172, 176

transaction 4, 43, 49, 50, 71, 167, 168, 170, 172, 174, 176, 181, 182, 184, 186, 188, 189, 191, 193, 194, 196, 197, 198, 199, 202, 207, 209, 328, 408

transaction file 4, 6

transaction management 313

Transaction models 180

transaction processing 174, 179, 289, 400

Transaction Processing (TP) system 170

Transaction Processing monitor (TP monitor) 171

transaction recovery 174

transactions 47, 177

transitive dependencies 156

transitive dependency 147, 148

transparencies 282

triggers 111

truly distributed database 282

tuple 92

tuple variable 109

two-level index 31

two-phase commit 182, 289, 301, 308

two-phase commit protocol 207

Two-phase locking 206

two-way chain 20, 21, 22, 23

Type constraints 112

U

uncommitted dependency problem 188

Uncommitted read 209

Undo 50, 178, 179, 289

Uniform Resource Locator (URL) 396

Union 96, 100, 101, 102, 104, 266

union-compatible 102, 104

unit of recovery 174

update anomalies 145, 148, 151, 156

update anomaly 153

URL 398, 399, 405

V

vertical fragmentation 285, 286, 292

victim 205

views 83

vote 306

Voting 307

voting method 306

W

Wait-die method 308

WAP 406, 407

WAP browser 405, 406

WAP device 405

WAP gateway 405, 406

WAP request 406

weak entity set 160

Web browser 399, 405

Web page 396, 397, 398, 399

Web server 396, 398, 405

Websites 396

Wireless Application Protocol (WAP) 405

Wireless Markup Language (WML) 406

wireless networking 404

WML 407

World Wide Web (WWW) 396

Wound-wait method 308

write 196

write-ahead log 176