Database Management/Database Administration

Objectives and SkillsEdit

This lesson allows users to learn more about database administration and data administrator positions.

ReadingsEdit

  1. Watt: Database Design - Chapter 14 (Database Users).
  2. Wikipedia: Database Administrator
  3. Wikipedia: Database administration and automation
  4. Wikipedia: Database activity monitoring
  5. Wikipedia: Database security
  6. Database Administrators and Users
  7. Database Locking: What it is, Why it Matters and What to do About it
  8. 8 Simple Steps For How to Become a Database Administrator
  9. Oracle Database Administrator Guide

MultimediaEdit

  1. Youtube: Database Design Fundamentals - Database Administration
  2. Youtube: Q&A - Database Administrator|What They Do
  3. Youtube: Cloud DBA - Role of DBA in Cloud
  4. Youtube: Database Administrator
  5. Youtube: What IS A Typical Day Like As An Oracle DBA

ActivitiesEdit

  1. Review Wikipedia: Cloud Database. With the cloud databases, research the impact of cloud storage on data administrator roles.
  2. Database Positions - Complete one or more of the following:

Lesson SummaryEdit

  1. Database administrator is a person who analyzes, administers, coordinates, controls and manages activities within the data administration department. Also, this person handles organization’s database” administration and data relationship.[1]
  2. There are three types of database administrators including: System DBAs, Development DBAs, and Application DBAs.[2]
  3. Cloud storage is a model of computer data storage in which the digital data is stored in logical file resources.[3]

Key TermsEdit

archive
Data archiving is a process of transferring data from a database and store it in an alternate storage system.[4]
archive management
Archives management is the area of management concerned with the maintenance and use of archives. It is concerned with acquisition, care, arrangement, description and retrieval of records once they have been transferred from an organisation to the archival repository.[5]
database activity monitoring
A database security technology that is used to monitor and analyze any database activity that operates on its own.
database administrator
Database administrators (DBAs) use specialized software to store and organize data[6]
data warehouse
Data warehouses are central repositories of integrated data from one or more disparate sources. They store current and historical data in one single place that are used for creating analytical reports for workers throughout the enterprise.[7]
deadlock
Deadlock refers to a specific condition when two or more processes are each waiting for each other to release a resource. It can also be that more than two processes are waiting for a number of resources. Deadlock is a common problem in multiprocessing where many processes share a specific type of mutually exclusive resource known as a software lock or soft lock.[8]
disaster recovery
Disaster recovery involves a set of policies, tools and procedures to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster.[9]
intranet
Intranet is a private network accessible only to an organization's staff. Often, a wide range of information and services are available on an organization's internal intranet that are unavailable to the public, unlike the Internet.[10]
local area network
A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.[11] Computer networks support an enormous number of applications and services such as access to the World Wide Web, digital video, digital audio, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications.[12]
Patriot Act
Administered by the FBI, the Patriot Act initially started to enhance the ability of domestic security services to prevent terrorism. The system interfaces with existing law enforcement databases to report and audit information related to border security, enhance security against terrorism, and improved intelligence.[13]
RAID
RAID (Redundant Array of Independent Disks, originally Redundant Array of Inexpensive Disks) is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.[14]
record locking
Record locking is the technique of preventing simultaneous access to data in a database, to prevent inconsistent results.[15]
Sarbanes-Oxley Act
The Sarbanes-Oxley Act of 2002 was a significant piece of legislation designed to help prevent corporate financial fraud. The act requires companies to disclose when their financial information has been tampered with, describe the measures used to protect the data, and safeguard the information used to track the information security.[16]
simple testing
Software testing is meant to see how the software works under different conditions. These conditions might be different depending on what the audience is. Testing is done to understand if it will work correctly, partially fail to work properly, or totally fail to work properly. Each test may be used to see how one, or many, parts of the software work at a point in its development.[17]
Uninterruptible power supply
An uninterruptible power supply (or uninterruptible power source; UPS) is an apparatus that provides electric power in an emergency when there is a problem with the normal electricity supply. It provides an almost instantaneous supply of electricity during any power failure. It is used normally to protect any sensitive hardware (computer, data center, telecommunication) in which if there is any disruption of power supply, it might easily damage that equipment.[18]

Review QuestionsEdit

Enable JavaScript to hide answers.
Click on a question to see the answer.
  1. Backups are a simple form of _________________ and should be part of a ______________________.
    Backups are a simple form of disaster recovery and should be part of a disaster recovery plan.[19]
  2. ____________________ is a system used for reporting and data analysis, and is considered a core component of business intelligence.
    Data warehouse is a system used for reporting and data analysis, and is considered a core component of business intelligence.[20]
  3. _____________________ allow you to modify that data (add, change or delete data), doing it in real-time.
    Operational databases allow you to modify that data (add, change or delete data), doing it in real-time.[21]
  4. ______ role includes Controlling user access to the database, monitoring and optimizing the performance of the database, planning for backup and recovery of database information, maintaining archived data and backing up and restoring databases.
    DBA's role includes Controlling user access to the database, monitoring and optimizing the performance of the database, planning for backup and recovery of database information, maintaining archived data and backing up and restoring databases.[22]
  5. A _____________________ is a document describing a database or collection of databases.
    A data dictionary is a document describing a database or collection of databases.[23]
  6. _______ ______ _______ includes all of the following: communication security, software, logical, physical access restrictions, both legal and administrative
    Computer Security Mechanisms
  7. ____ ________ is the act of securing critical data from being breached by intruders.
    Data security is the act of securing critical data from being breached by intruders.
  8. ________ _____ implicates that large databases will always be subject to security issues.
    Anderson's Rule.
  9. ________ _____ is a process of transferring data from a database and store it in an alternate storage system.
    Data archiving [24]
  10. ________ is a private network accessible only to an organization's staff.
    Intranet

See AlsoEdit

ReferencesEdit