Database Management/Database Administration

From Wikiversity
Jump to navigation Jump to search

Objectives and Skills[edit | edit source]

This lesson allows users to learn more about database administration and data administrator positions.

Readings[edit | edit source]

  1. Wikipedia: Database Administrator
  2. Wikipedia: Database administration and automation
  3. Wikipedia: Database activity monitoring
  4. Wikipedia: Database security

Multimedia[edit | edit source]

  1. YouTube: Database Administration
  2. YouTube: Database Administrator

Activities[edit | edit source]

Lesson Summary[edit | edit source]

  1. Database administrator is a person who analyzes, administers, coordinates, controls and manages activities within the data administration department. Also, this person handles organization’s database” administration and data relationship.[1]
  2. There are three types of database administrators including: System DBAs, Development DBAs, and Application DBAs.[2]
  3. Cloud storage is a model of computer data storage in which the digital data is stored in logical file resources.[3]

Key Terms[edit | edit source]

archive
Data archiving is a process of transferring data from a database and store it in an alternate storage system.[4]
archive management
Archives management is the area of management concerned with the maintenance and use of archives. It is concerned with acquisition, care, arrangement, description and retrieval of records once they have been transferred from an organisation to the archival repository.[5]
database activity monitoring
A database security technology that is used to monitor and analyze any database activity that operates on its own.
database administrator
Database administrators (DBAs) use specialized software to store and organize data[6]
data warehouse
Data warehouses are central repositories of integrated data from one or more disparate sources. They store current and historical data in one single place that are used for creating analytical reports for workers throughout the enterprise.[7]
deadlock
Deadlock refers to a specific condition when two or more processes are each waiting for each other to release a resource. It can also be that more than two processes are waiting for a number of resources. Deadlock is a common problem in multiprocessing where many processes share a specific type of mutually exclusive resource known as a software lock or soft lock.[8]
disaster recovery
Disaster recovery involves a set of policies, tools and procedures to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster.[9]
intranet
Intranet is a private network accessible only to an organization's staff. Often, a wide range of information and services are available on an organization's internal intranet that are unavailable to the public, unlike the Internet.[10]
local area network
A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.[11] Computer networks support an enormous number of applications and services such as access to the World Wide Web, digital video, digital audio, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications.[12]
Patriot Act
Administered by the FBI, the Patriot Act initially started to enhance the ability of domestic security services to prevent terrorism. The system interfaces with existing law enforcement databases to report and audit information related to border security, enhance security against terrorism, and improved intelligence.[13]
RAID
RAID (Redundant Array of Independent Disks, originally Redundant Array of Inexpensive Disks) is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.[14]
record locking
Record locking is the technique of preventing simultaneous access to data in a database, to prevent inconsistent results.[15]
Sarbanes-Oxley Act
The Sarbanes-Oxley Act of 2002 was a significant piece of legislation designed to help prevent corporate financial fraud. The act requires companies to disclose when their financial information has been tampered with, describe the measures used to protect the data, and safeguard the information used to track the information security.[16]
simple testing
Software testing is meant to see how the software works under different conditions. These conditions might be different depending on what the audience is. Testing is done to understand if it will work correctly, partially fail to work properly, or totally fail to work properly. Each test may be used to see how one, or many, parts of the software work at a point in its development.[17]
Uninterruptible power supply
An uninterruptible power supply (or uninterruptible power source; UPS) is an apparatus that provides electric power in an emergency when there is a problem with the normal electricity supply. It provides an almost instantaneous supply of electricity during any power failure. It is used normally to protect any sensitive hardware (computer, data center, telecommunication) in which if there is any disruption of power supply, it might easily damage that equipment.[18]

See Also[edit | edit source]

References[edit | edit source]