- •Reznichenko Valery
- •Lecture 1. Introduction
- •Lecture 1. Introduction
- •Lecture 1. Introduction
- •Lecture 1. Introduction
- •Lecture 1. Introduction
- •Lecture 1. Introduction
- •Lecture 1. Introduction
- •Lecture 1. Introduction
- •Lecture 1. Introduction
- •Lecture 1. Introduction
- •Lecture 1. Introduction
- •Lecture 1. Introduction
- •Lecture 1. Introduction
- •Lecture 1. Introduction
- •Lecture 1. Introduction
- •Lecture 1. Introduction
Lecture 1. Introduction
Data integrity in DB
Data integrity is supporting a variety of restrictions on data in database
The following causes integrity violation:
Faults in hardware or software
Incorrect data entering, modifications and
deletions
Concurrent data access and modifications
CSF NAU |
11 |
Lecture 1. Introduction
Features of DB Integrity Supporting
Back-up coping and restoring
Checkpoints and rollbacks
Integrity constraints
Transactions
Locking
Logs activity
CSF NAU |
12 |
Lecture 1. Introduction
Data Security
User registration
Control of access rights
User identification
Automatic logging
Data encryption
CSF NAU |
13 |
Lecture 1. Introduction
DBMS Languages
Data Definition language (DDL)
Data Manipulation Language (DML)
Query Language (QL)
Structured Query Language (SQL)
Query By Example (QBE)
CSF NAU |
14 |
Lecture 1. Introduction
Data Base Users
DB administrator (group)
System analytics and designers
System and applied programmers
End users
Operators
CSF NAU |
15 |
Lecture 1. Introduction
Requirements to DB (1)
Simplicity and flexibility of applications development
Multiple-aspect data usage
Simplicity and flexibility of data usage
Simplicity and flexibility of data changes, modifications and adjustemts
Efficiency, flexibility and productivity of storage and processing
CSF NAU |
16 |
Lecture 1. Introduction
Requirements to DB (2)
Protection against the non-authorized access, distortion and deletion
Support of a required level of the data independence
Support a required level of the data integrity
Advanced DB administration features
CSF NAU |
17 |