当前位置:网站首页>Basic knowledge summary of database
Basic knowledge summary of database
2022-06-09 06:48:00 【A humble pig】
1. Databases are stored in computers for a long time , An organized and sharable collection of large amounts of data . The data in the database is organized according to a certain data model Description and storage , With less redundancy , High data independence and scalability , And can be shared for a variety of users .
2. The database system consists of a database data management system ( And its application development tools ) Storage composed of application and database administrators management A system that processes and maintains data .
3. The independence of data crying is high : Data independence Physical independence Logical independence .
4. The data is uniformly managed and controlled by the database management system : Data security protection Expression of data integrity concurrency control Database recovery .
5. Data models are usually composed of data structures Data manipulation Data integrity constraints .
6. The representation of conceptual model : Entity – contact .
7. The data structure of the relational model : Relationship : A relationship usually corresponds to a table . Tuples : A row in the table is a tuple attribute : A column is an attribute code : It's only certain ( Such as determining a student ) Domain : It's a range . component : Attribute value of a tuple .
8. The secondary image function of the database : External mode / Mode image and mode / Internal mode image .
9. Relational algebra is an abstract query language : It is a relational operation to express the query . Three elements : Operands Operator Calculation results .
10. Specialized relational operations include : choice Projection Connect In addition to the operation .
11. Database insecurity : 1. Unauthorized users' malicious access to and destruction of the database 2. Important or sensitive data in the database is leaked . 3. Vulnerability of the security environment .
12. Database security settings :(1) The system first performs user identification according to the input user ID , Only legitimate users are allowed to enter the computer system .(2) For users who have entered the system , Database management system also has access control , Only users are allowed to perform legal operations .(3) The operating system will have its own protection (4) Finally, the data will be stored in the database in the form of password .
13. The security of the database mainly includes the scope : User identification Multilayer access control Audit View Data encryption .
14. User identification : Static password authentication Dynamic password authentication Biometric identification Smart card identification .
15. grant GRANT Take back REVOKE .
16. Database role : Is a named set of permissions related to database operations , Roles are sets of permissions .
17. The role of the database : Character creation Authorize roles Give a role to another role or user Recovery of role authority .
18. Only if the subject's license level is greater than or equal to the object's secret level , The subject can read the corresponding object . Only if the subject's license level is less than or equal to the object's secret level , The subject can write the corresponding object .
19. The basic idea of encryption is to encrypt the original data according to a certain algorithm — Plaintext . Transform to unrecognizable format ---- Ciphertext , So that people who don't know the decryption algorithm can't know the content of the data . Data encryption mainly includes storage encryption and transmission encryption .
20. Trigger is a special kind of event driven process defined by user on relational table .
21. Triggers are also called events - Conditions - Action rules .
22. The basic idea of normalization is to gradually eliminate the inappropriate parts of data dependency .
23. The data dictionary : It's a description of the data in the database , Metadata , Not the data itself . The data dictionary is set up in the requirement analysis stage , Constantly modify in the process of database design Enrich Perfect . It plays a very important role in database design .
24. Multi granularity blocking protocol : Locking a node means that all descendant nodes of the node are also locked with the same type .
25. Show blocked : It is a lock directly added to a data object at the request of a transaction . Implicit locking means that the data object is not locked independently , The data object is locked because its parent node is locked .
26. Intent locks : If you add intention lock to a node , It means that the lower node of the node is being locked .
边栏推荐
- Fourier transform signal processing
- 无需剪辑软件,教你简单快速进行剪辑视频
- Comparison between hummingbird e203 hardware rv-star and nucleus ddr200t and MCU 200t
- DeFi 去风险:分析去中心化系统中的系统性风险
- Chapter_ 05 adding (fusing) two images using OpenCV
- Hummingbird e203 image recognition -- to be continued
- Solution: riscv nucleus elf gcc: command not found/ Makefile:78: recipe for target ‘rv32ui-p-simple‘ faile
- Jump from one pit to another
- zgc 与g1对比 及 color points含义
- 云原生的本手、妙手和俗手
猜你喜欢

数据可视化之特别案例的运用与分析

UML系列文章(27)體系結構建模---部署

Can I use machine learning programming without knowing mathematics?

Mendeley and other document management tools to insert references in word

跳槽,从一个坑,跳进另一个坑
![[raspberry pie 4B deep learning garbage classification] Chap.1 configure the raspberry pie with keras+tensorflow [deep learning moves]](/img/d6/a479b629e2a5e088edcbde9fcad3b9.jpg)
[raspberry pie 4B deep learning garbage classification] Chap.1 configure the raspberry pie with keras+tensorflow [deep learning moves]

傅里叶变换-信号处理

CodeBlocks always repeat the last result

数据库操作语句

Jump from one pit to another
随机推荐
Multithreaded concurrency private constructor capture mode
Yolov4 analysis | Part 2: training your own data set with yolov4 (super detailed full version)
cms 和 g1的主要区别
CodeBlocks project window management
Hummingbird e203 image recognition -- to be continued
A gadget written by yourself. The pilot library converts pictures to buf
Add space after modifying idea format single line comment
Matlab: tf2zp与tf2zpk的差异
微信小程序 思维导图
UML系列文章(24)高级行为---时间和空间
QT---创建对话框1:QDialog的子类查找关键字对话框的实现
Svn account password search
The new colleagues optimized the project performance once, trembling
跳槽,从一个坑,跳进另一个坑
ROS编译报错 genmsg/cmake/genmsg-extras.cmake:307 的解决方法
[raspberry pie 4B deep learning garbage classification] Chap.1 configure the raspberry pie with keras+tensorflow [deep learning moves]
类和对象初阶
【SDU项目实训2019级】router-link的:to 和@click谁先执行
量化交易之MySql篇 - mysql数据库 增删改查
Solution: riscv nucleus elf gcc: command not found/ Makefile:78: recipe for target ‘rv32ui-p-simple‘ faile