版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
1、外文資料Database Management SystemsA database (sometimes spelled data base) is also called an electronic database , referring to any collection of data, or information, that is specially organized for rapid search and retrieval by a computer. Databases are structured to facilitate the storage, retrieval
2、 , modification, and deletion of data in conjunction with various data-processing operations .Databases can be stored on magnetic disk or tape, optical disk, or some other secondary storage device.A database consists of a file or a set of files. The information in these files may be broken down into
3、 records, each of which consists of one or more fields. Fields are the basic units of data storage , and each field typically contains information pertaining to one aspect or attribute of the entity described by the database . Using keywords and various sorting commands, users can rapidly search , r
4、earrange, group, and select the fields in many records to retrieve or create reports on particular aggregate of data.Complex data relationships and linkages may be found in all but the simplest databases .The system software package that handles the difficult tasks associated with creating ,accessin
5、g, and maintaining database records is called a database management system(DBMS).The programs in a DBMS package establish an interface between the database itself and the users of the database. (These users may be applications programmers, managers and others with information needs, and various OS p
6、rograms.)A DBMS can organize, process, and present selected data elements form the database. This capability enables decision makers to search, probe, and query database contents in order to extract answers to nonrecurring and unplanned questions that arent available in regular reports. These questi
7、ons might initially be vague and/or poorly defined ,but people can “browse” through the database until they have the needed information. In short, the DBMS will “manage” the stored data items and assemble the needed items from the common database in response to the queries of those who arent program
8、mers.A database management system (DBMS) is composed of three major parts:(1)a storage subsystem that stores and retrieves data in files;(2) a modeling and manipulation subsystem that provides the means with which to organize the data and to add , delete, maintain, and update the data;(3)and an inte
9、rface between the DBMS and its users. Several major trends are emerging that enhance the value and usefulness of database management systems;Managers: who require more up-to-data information to make effective decisionCustomers: who demand increasingly sophisticated information services and more curr
10、ent information about the status of their orders, invoices, and accounts.Users: who find that they can develop custom applications with database systems in a fraction of the time it takes to use traditional programming languages.Organizations : that discover information has a strategic value; they u
11、tilize their database systems to gain an edge over their competitors.The Database ModelA data model describes a way to structure and manipulate the data in a database. The structural part of the model specifies how data should be represented(such as tree, tables, and so on ).The manipulative part of
12、 the model specifies the operation with which to add, delete, display, maintain, print, search, select, sort and update the data.Hierarchical Model The first database management systems used a hierarchical model-that is-they arranged records into a tree structure. Some records are root records and a
13、ll others have unique parent records. The structure of the tree is designed to reflect the order in which the data will be used that is ,the record at the root of a tree will be accessed first, then records one level below the root ,and so on.The hierarchical model was developed because hierarchical
14、 relationships are commonly found in business applications. As you have known, an organization char often describes a hierarchical relationship: top management is at the highest level, middle management at lower levels, and operational employees at the lowest levels. Note that within a strict hierar
15、chy, each level of management may have many employees or levels of employees beneath it, but each employee has only one manager. Hierarchical data are characterized by this one-to-many relationship among data.In the hierarchical approach, each relationship must be explicitly defined when the databas
16、e is created. Each record in a hierarchical database can contain only one key field and only one relationship is allowed between any two fields. This can create a problem because data do not always conform to such a strict hierarchy.Relational Model A major breakthrough in database research occurred
17、 in 1970 when E. F. Codd proposed a fundamentally different approach to database management called relational model ,which uses a table as its data structure.The relational database is the most widely used database structure. Data is organized into related tables. Each table is made up of rows calle
18、d and columns called fields. Each record contains fields of data about some specific item. For example, in a table containing information on employees, a record would contain fields of data such as a persons last name ,first name ,and street address.Structured query language(SQL)is a query language
19、for manipulating data in a relational database .It is nonprocedural or declarative, in which the user need only specify an English-like description that specifies the operation and the described record or combination of records. A query optimizer translates the description into a procedure to perfor
20、m the database manipulation.Network ModelThe network model creates relationships among data through a linked-list structure in which subordinate records can be linked to more than one parent record. This approach combines records with links, which are called pointers. The pointers are addresses that
21、 indicate the location of a record. With the network approach, a subordinate record can be linked to a key record and at the same time itself be a key record linked to other sets of subordinate records. The network mode historically has had a performance advantage over other database models. Today ,
22、 such performance characteristics are only important in high-volume ,high-speed transaction processing such as automatic teller machine networks or airline reservation system.Both hierarchical and network databases are application specific. If a new application is developed ,maintaining the consiste
23、ncy of databases in different applications can be very difficult. For example, suppose a new pension application is developed .The data are the same, but a new database must be created.Object Model The newest approach to database management uses an object model , in which records are represented by
24、entities called objects that can both store data and provide methods or procedures to perform specific tasks.The query language used for the object model is the same object-oriented programming language used to develop the database application .This can create problems because there is no simple , u
25、niform query language such as SQL . The object model is relatively new, and only a few examples of object-oriented database exist. It has attracted attention because developers who choose an object-oriented programming language want a database based on an object-oriented model.Distributed DatabaseSi
26、milarly , a distributed database is one in which different parts of the database reside on physically separated computers . One goal of distributed databases is the access of information without regard to where the data might be stored. Keeping in mind that once the users and their data are separate
27、d , the communication and networking concepts come into play .Distributed databases require software that resides partially in the larger computer. This software bridges the gap between personal and large computers and resolves the problems of incompatible data formats. Ideally, it would make the ma
28、inframe databases appear to be large libraries of information, with most of the processing accomplished on the personal computer.A drawback to some distributed systems is that they are often based on what is called a mainframe-entire model , in which the larger host computer is seen as the master an
29、d the terminal or personal computer is seen as a slave. There are some advantages to this approach . With databases under centralized control , many of the problems of data integrity that we mentioned earlier are solved . But todays personal computers, departmental computers, and distributed process
30、ing require computers and their applications to communicate with each other on a more equal or peer-to-peer basis. In a database, the client/server model provides the framework for distributing databases.One way to take advantage of many connected computers running database applications is to distri
31、bute the application into cooperating parts that are independent of one anther. A client is an end user or computer program that requests resources across a network. A server is a computer running software that fulfills those requests across a network . When the resources are data in a database ,the
32、 client/server model provides the framework for distributing database.A file serve is software that provides access to files across a network. A dedicated file server is a single computer dedicated to being a file server. This is useful ,for example ,if the files are large and require fast access .I
33、n such cases, a minicomputer or mainframe would be used as a file server. A distributed file server spreads the files around on individual computers instead of placing them on one dedicated computer.Advantages of the latter server include the ability to store and retrieve files on other computers an
34、d the elimination of duplicate files on each computer. A major disadvantage , however, is that individual read/write requests are being moved across the network and problems can arise when updating files. Suppose a user requests a record from a file and changes it while another user requests the sam
35、e record and changes it too. The solution to this problems called record locking, which means that the first request makes others requests wait until the first request is satisfied . Other users may be able to read the record, but they will not be able to change it .A database server is software tha
36、t services requests to a database across a network. For example, suppose a user types in a query for data on his or her personal computer . If the application is designed with the client/server model in mind ,the query language part on the personal computer simple sends the query across the network
37、to the database server and requests to be notified when the data are found.Examples of distributed database systems can be found in the engineering world. Suns Network Filing System(NFS),for example, is used in computer-aided engineering applications to distribute data among the hard disks in a netw
38、ork of Sun workstation.Distributing databases is an evolutionary step because it is logical that data should exist at the location where they are being used . Departmental computers within a large corporation ,for example, should have data reside locally , yet those data should be accessible by auth
39、orized corporate management when they want to consolidate departmental data . DBMS software will protect the security and integrity of the database , and the distributed database will appear to its users as no different from the non-distributed database .In this information age, the data server has
40、become the heart of a company. This one piece of software controls the rhythm of most organizations and is used to pump information lifeblood through the arteries of the network. Because of the critical nature of this application, the data server is also the one of the most popular targets for hacke
41、rs. If a hacker owns this application, he can cause the companys heart to suffer a fatal arrest.Ironically, although most users are now aware of hackers, they still do not realize how susceptible their database servers are to hack attacks. Thus, this article presents a description of the primary met
42、hods of attacking database servers (also known as SQL servers) and shows you how to protect yourself from these attacks. You should note this information is not new. Many technical white papers go into great detail about how to perform SQL attacks, and numerous vulnerabilities have been posted to se
43、curity lists that describe exactly how certain database applications can be exploited. This article was written for the curious non-SQL experts who do not care to know the details, and as a review to those who do use SQL regularly. What Is a SQL Server?A database application is a program that provid
44、es clients with access to data. There are many variations of this type of application, ranging from the expensive enterprise-level Microsoft SQL Server to the free and open source mySQL. Regardless of the flavor, most database server applications have several things in common. First, database applic
45、ations use the same general programming language known as SQL, or Structured Query Language. This language, also known as a fourth-level language due to its simplistic syntax, is at the core of how a client communicates its requests to the server. Using SQL in its simplest form, a programmer can sel
46、ect, add, update, and delete information in a database. However, SQL can also be used to create and design entire databases, perform various functions on the returned information, and even execute other programs.To illustrate how SQL can be used, the following is an example of a simple standard SQL
47、query and a more powerful SQL query: Simple: Select * from dbFurniture.tblChairThis returns all information in the table tblChair from the database dbFurniture.Complex: EXEC master.xp_cmdshell dir c:This short SQL command returns to the client the list of files and folders under the c: directory of
48、the SQL server. Note that this example uses an extended stored procedure that is exclusive to MS SQL Server. The second function that database server applications share is that they all require some form of authenticated connection between client and host. Although the SQL language is fairly easy to
49、 use, at least in its basic form, any client that wants to perform queries must first provide some form of credentials that will authorize the client; the client also must define the format of the request and response.This connection is defined by several attributes, depending on the relative locati
50、on of the client and what operating systems are in use. We could spend a whole article discussing various technologies such as DSN connections, DSN-less connections, RDO, ADO, and more, but these subjects are outside the scope of this article. If you want to learn more about them, a little Googleing
51、 will provide you with more than enough information. However, the following is a list of the more common items included in a connection request.Database source Request type Database User ID PasswordBefore any connection can be made, the client must define what type of database server it is connectin
52、g to. This is handled by a software component that provides the client with the instructions needed to create the request in the correct format. In addition to the type of database, the request type can be used to further define how the clients request will be handled by the server. Next comes the d
53、atabase name and finally the authentication information.All the connection information is important, but by far the weakest link is the authentication informationor lack thereof. In a properly managed server, each database has its own users with specifically designated permissions that control what
54、type of activity they can perform. For example, a user account would be set up as read only for applications that need to only access information. Another account should be used for inserts or updates, and maybe even a third account would be used for deletes. This type of account control ensures tha
55、t any compromised account is limited in functionality. Unfortunately, many database programs are set up with null or easy passwords, which leads to successful hack attacks.譯文數(shù)據(jù)庫管理系統(tǒng)介紹數(shù)據(jù)庫也可以稱為電子數(shù)據(jù)庫,是專門組織起來的一組數(shù)據(jù)或信息,其目的是為了便于計算機(jī)快速查詢及檢索。數(shù)據(jù)庫的結(jié)構(gòu)是專門設(shè)計的,在各種數(shù)據(jù)處理操作命令的支持下,可以簡化數(shù)據(jù)的存儲,檢索,修改和刪除。數(shù)據(jù)庫可以存儲在磁盤,磁帶,光盤或其他輔
56、助存儲設(shè)備上。數(shù)據(jù)庫由一個或一套文件組成,其中的信息可以分解為記錄,每一記錄又包含一個或多個字段(或稱為域)。字段是數(shù)據(jù)存取的基本單位。數(shù)據(jù)庫用于描述實體,其中的一個字段通常表示與實體的某一屬性相關(guān)的信息。通過關(guān)鍵字以及各種分類(排序)命令,用戶可以對多條記錄的字段進(jìn)行查詢,重新整理,分組或選擇,以實體對某一類數(shù)據(jù)的檢索,也可以生成報表。所有數(shù)據(jù)庫(最簡單的除外)中都有復(fù)雜的數(shù)據(jù)關(guān)系及其鏈接。處理與創(chuàng)建,訪問以及維護(hù)數(shù)據(jù)庫記錄有關(guān)的復(fù)雜任務(wù)的系統(tǒng)軟件包叫做數(shù)據(jù)庫管理系統(tǒng)(DBMS)。DBMS軟件包中的程序在數(shù)據(jù)庫與其用戶間建立接口。(這些用戶可以是應(yīng)用程序員,管理員及其他需要信息的人員和各種操
57、作系統(tǒng)程序)。DBMS可組織,處理和表示從數(shù)據(jù)庫中選出的數(shù)據(jù)元。該功能使決策者能搜索,探查和查詢數(shù)據(jù)庫的內(nèi)容,從而對在正規(guī)報告中沒有的,不再出現(xiàn)的且無法預(yù)料的問題做出回答。這些問題最初可能是模糊的并且(或者)是定義不恰當(dāng)?shù)模侨藗兛梢詾g覽數(shù)據(jù)庫直到獲得所需的信息。簡言之,DBMS將“管理”存儲的數(shù)據(jù)項,并從公共數(shù)據(jù)庫中匯集所需的數(shù)據(jù)項以回答非程序員的詢問。DBMS由3個主要部分組成:(1)存儲子系統(tǒng),用來存儲和檢索文件中的數(shù)據(jù);(2)建模和操作子系統(tǒng),提供組織數(shù)據(jù)以及添加,刪除,維護(hù),更新數(shù)據(jù)的方法;(3)用戶和DBMS之間的接口。在提高數(shù)據(jù)庫管理系統(tǒng)的價值和有效性方面正在展現(xiàn)以下一些重要發(fā)
58、展趨勢;1.管理人員需要最新的信息以做出有效的決策。2.客戶需要越來越復(fù)雜的信息服務(wù)以及更多的有關(guān)其訂單,發(fā)票和賬號的當(dāng)前信息。3.用戶發(fā)現(xiàn)他們可以使用傳統(tǒng)的程序設(shè)計語言,在很短的一段時間內(nèi)用數(shù)據(jù)庫系統(tǒng)開發(fā)客戶應(yīng)用程序。4.商業(yè)公司發(fā)現(xiàn)了信息的戰(zhàn)略價值,他們利用數(shù)據(jù)庫系統(tǒng)領(lǐng)先于競爭對手。數(shù)據(jù)庫模型數(shù)據(jù)庫模型描述了在數(shù)據(jù)庫中結(jié)構(gòu)化和操縱數(shù)據(jù)的方法,模型的結(jié)構(gòu)部分規(guī)定了數(shù)據(jù)如何被描述(例如樹,表等):模型的操縱部分規(guī)定了數(shù)據(jù)添加,刪除,顯示,維護(hù),打印,查找,選擇,排序和更新等操作。分層模型第一個數(shù)據(jù)庫管理系統(tǒng)使用的是分層模型,也就是說,將數(shù)據(jù)記錄排列成樹形結(jié)構(gòu)。一些記錄時根目錄,在其他所有記錄都
59、有獨(dú)立的父記錄。樹形結(jié)構(gòu)的設(shè)計反映了數(shù)據(jù)被使用的順序,也就是首先訪問處于樹根位置的記錄,接下來是跟下面的記錄,等等。分層模型的開發(fā)是因為分層關(guān)系在商業(yè)應(yīng)用中普遍存在,眾所周知,一個組織結(jié)構(gòu)圖表就描述了一種分層關(guān)系:高層管理人員在最高層,中層管理人員在較低的層次,負(fù)責(zé)具體事務(wù)的雇員在最底層。值得注意的是,在一個嚴(yán)格的分層結(jié)構(gòu)體系中,在每個管理層下可能有多個雇員或多個層次的雇員,但每個雇員只有一個管理者。分層結(jié)構(gòu)數(shù)據(jù)的典型特征是數(shù)據(jù)之間的一對多關(guān)系。在分層方法中,當(dāng)數(shù)據(jù)庫建立時,每一關(guān)系即被明確地定義。在分層數(shù)據(jù)庫中的每一記錄只能包含一個關(guān)鍵字段,任意兩個字段之間只能有一種關(guān)系。由于數(shù)據(jù)并不總是遵循這種嚴(yán)格的分層關(guān)系,所以這樣可能會出現(xiàn)一些問題。關(guān)系模型在1970年,數(shù)據(jù)庫研究取得了重大突破。E.F.Codd提出了一種截然不同的數(shù)據(jù)庫管理方法,使用表作為數(shù)據(jù)結(jié)構(gòu),稱之為關(guān)系模型
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2024年大數(shù)據(jù)服務(wù)合同違約金問題及處理辦法
- 2024版合法借款合同模板
- 2024年店鋪經(jīng)營權(quán)代理協(xié)議
- 2024年度電機(jī)維修配件銷售與代理合同
- 2024年度安全環(huán)保施工與社區(qū)關(guān)系和諧協(xié)議
- 2024年保險合同(財產(chǎn))
- 2024年度智能物流系統(tǒng)研發(fā)與實施合同
- 2024年度租賃合同標(biāo)的及服務(wù)內(nèi)容詳細(xì)描述
- 對聯(lián)課件名稱教學(xué)課件
- 2024年衛(wèi)星發(fā)射服務(wù)提供商與客戶的發(fā)射合同
- FZ/T 01137-2016紡織品熒光增白劑的測定
- 9-馬工程《藝術(shù)學(xué)概論》課件-第九章(20190403)【已改格式】.課件電子教案
- 土地開發(fā)整理項目預(yù)算編制實務(wù)課程
- 農(nóng)貿(mào)市場索證索票制度(3篇)
- 第三章-信用評級方法-《信用評級理論與實務(wù)》課件
- 社區(qū)工作者經(jīng)典備考題庫(必背300題)
- 介入治療質(zhì)量管理考核標(biāo)準(zhǔn)
- 三年級上冊數(shù)學(xué)教案-7.2噸的認(rèn)識:感受并認(rèn)識質(zhì)量單位噸▎冀教
- 部編版《美麗的小興安嶺》第二課時(完美版)課件
- 杭州市高層次人才分類認(rèn)定申請表-
- 混凝土建筑結(jié)構(gòu)設(shè)計顧祥林混凝土結(jié)構(gòu)設(shè)計概論
評論
0/150
提交評論