Close

🔰 Database Terminology 🔰

S.No. Term Description
1. ACID ACID (atomicity, consistency, isolation, durability) is a set of properties of database transactions intended to guarantee data validity despite errors, power failures, and other mishaps. In the context of databases, a sequence of database operations that satisfies the ACID properties (which can be perceived as a single logical operation on the data) is called a transaction.
2. Application Server An application server is a server that hosts applications. Application server frameworks are software frameworks for building application servers. An application server framework provides both facilities to create web applications and a server environment to run them.
3. Aperiodic Server Software that is specific to a particular embedded system. Such application-specific code is generally built on a layered architecture of reusable components, such as a real-time operating system and network protocol stack or other middleware. If there is no such architecture, then this term may not be used. The application software is unlikely to be reusable across embedded platforms, simply because each embedded system has a different application.
4. Atomicity The property of a transaction that guarantees that either all or none of the changes made by the transaction are written to the database.
5. AVL-Tree An AVL tree is a self balancing binary search tree.
6. Big-Endian A data representation for a multibyte value that has the most significant byte stored at the lowest memory address. Note that only the bytes are reordered, never the nibbles or bits that comprise them. Every processor stores its data in either big-endian or little-endian format. Sun's SPARC, Motorola's 68k, and the PowerPC families are all big-endian. The Java virtual machine is big-endian as well. Similarly, every communications protocol must define the byte order of its multibyte values. TCP/IP uses big-endian representation.
7. BLOB An abbreviation for Binary Large OBject. In SQL, BLOB can be a general term for any data of type long varbinary, long varchar, or long wvarchar. It is also a specific term (and synonym) for data of type long varbinary.
8. Breakpoint A location in a program at which execution is to be stopped and control of the processor switched to the debugger. Mechanisms for creating and removing breakpoints are provided by most debugging tools.
9. B-tree An indexing method in which the values of the columns used in the index are efficiently maintained in sorted order that also provides fast access (three or four additional disk accesses) to an individual index entry.
10. Cache The computer memory that is set aside to contain a portion of the database data that has most recently been accessed by the database application program. A cache is used to minimize the amount of physical disk I/O performed by the DBMS.
11. Cascade A foreign key attribute that automatically migrates the changes made to a referenced (i.e., primary key) table to all of the referencing (foreign key) table rows.
12. Catalog A repository for the computer-readable form of a database's data definition meta-data. Sometimes called the system catalog or just syscat.
13. Checksum A numerical check value calculated from a larger set of data. A checksum is most often used when sending a packet of data over a network or other communications channel. One checksum formula is a simple addition, with overflow ignored, wherein the bytes of the packet are added together into a variable of a fixed size/width (say, 16 bits) as they are sent. The checksum is typically sent at the end of the packet and used at the receiving end to confirm the integrity of the preceding data.
14. Client A client-side process, containing proxy functions, connecting to a server process that contains the actual database functions.
15. Client/Server A server is a program that runs on a computer that directly manages the database. A client is a separate program (or process) that communicates with the database server through some kind of Remote Procedure Call (RPC) in order to perform application-specific database operations.
16. Cloud Cloud is a recently coined term used to describe an execution model for computing systems where functions and data are invoked by a name that refers to a remote system whose location is irrelevant (hence the concept of it being 'out there somewhere.' like a cloud). Cloud-based systems allow thin-client interfaces to access this functionality through the internet, and frequently with wi-fi, reducing the power requirements of the client computers.
17. Column A single unit of named data that has a particular data type (e.g., number, text, or date). Columns only exist in tables.
18. Compiler A software-development tool that translates high-level language programs into the machine-language instructions that a particular processor can understand and execute. However, the object code that results is not yet ready to be run; at least a linker or link-step must follow.
19. Compound Key A compound key (composite key) is a key that consists of multiple columns because one column is not sufficiently unique. Another term for the unique key which has more than one column.
20. Commit The action that causes the all of the changes made by a particular transaction to be reliably written to the database files and made visible to other users.
21. Concurrency The property in which two or more computing processes are executing at the same time.
22. Connection The means of communication between a client and a server. A process may have multiple connections opened, each in its own thread, to one or more databases at a time.
23. Consistency The property of a transaction that guarantees that the state of the database both before and after execution of the transaction remains consistent (i.e., free of any data integrity errors) whether or not the transaction commits or is rolled back.
24. Core/Core-level A lower-level set of database primitives in the form of a complete API, used by database processors such as SQL or Cursors.
25. Cost-based Optimization The process where data distribution statistics (e.g., the number of rows in a table) are used to guide the SQL query optimizer's choice of the best way to retrieve the needed data from the database.
26. Cross-compiler A compiler that runs on a different platform from the one for which it produces object code. Often even the processor architecture/family of the host and target platforms differ.
27. Cursor A collection of rows grouped by common criteria (key sequence, set membership, SELECT result set) that can be navigated and updated.
28. Data Type The basic kind of data that can be stored in a column. The data types that are available in RDM SQL are: char, wchar, varchar, wvarchar, binary, varbinary, boolean, tinyint, smallint, integer, bigint, real, float, double, date, time, timestamp, long varbinary, long varchar, and long wvarchar.
29. Database A database is a collection of tables, with related data. Table - A table is a matrix with data. A table in a database looks like a simple spreadsheet. Column - One column (data element) contains data of one and the same kind, for example, the column postcode.
30. Database Instance An independent database that shares the same schema as another database. Used only in RDM.
31. db_VISTA Original name from 1984 for the Raima DBMS product now called RDM.
32. DBMS Database Management System (DBMS) is a software for storing and retrieving users' data while considering appropriate security measures. ... In large systems, a DBMS helps users and other third-party software to store and retrieve data. DBMS allows users to create their own databases as per their requirement.
33. DDL Data Definition Language (DDL) is a standard for commands that define the different structures in a database. DDL statements create, modify, and remove database objects such as tables, indexes, and users. Common DDL statements are CREATE, ALTER, and DROP.
34. Deadlock A situation in which resources (i.e. locks) are held by two or more connections that are each needed by the other connections so that they are stuck in an infinite wait loop. For example, connection 1 has a lock on table1 and is requesting a lock on table2 that is currently held by connection 2, which is also requesting a lock on table1. Programming practices can be used to prevent deadlocks from occurring.
35. Debugger A tool used to test and debug software. A typical remote debugger runs on a host computer and connects to the target through a serial port or over a network. Using the debugger, you can download software to the target for immediate execution. You can also set breakpoints in the code and examine the contents of specific memory locations and registers.
36. Deterministic An attribute of a section of code whereby the limit on the time required to execute the code is known, or determined, ahead of time. This is commonly associated with real-time software.
37. Distributed Database A database in which data is distributed among multiple computers or devices (nodes), allowing multiple computers to simultaneously access data residing on separate nodes. The Internet of Things (IoT) is frequently considered a vast grid of data collection devices, requiring distributed database functionality to manage.
38. DLL Dynamic Link Library. A library of related functions that are not loaded into memory until they are called by the application program. All RDM APIs are contained in DLLs on those operating systems that support them (e.g., MS-Windows). These are sometimes called shared libraries on some systems.
39. DML Database Manipulation Language. In SQL, such statements as UPDATE, INSERT and DELETE are considered DML.
40. Documentation All product-related materials, specifications, technical manuals, user manuals, flow diagrams, file descriptions, or other written information either included with products or otherwise. Raima's documentation is online.
41. Domain An alternate name for a base data type that is defined using the RDM SQL create domain statement.
42. Durability The property of a transaction in which the DBMS guarantees that all committed transactions will survive any kind of system failure.
43. Dynamic DDL The ability to change the definition of a database (its schema) after data has been stored in the database without having to take the database off-line or restructure its files.
44. Edge Computing Edge computing refers to the computing infrastructure at the edge of the network, close to the sources of data. Edge computing reduces the communications bandwidth needed between sensors and the datacenter. Databases with tiny footprints e.g RDM are optimized for edge computing.
45. Embedded Database An embedded database is the combination of a database and the database software which typically resides within an application. The database holds information and the software control the database to access or store information. The application software, or the user-interface, then accesses the database and presents that information in a way which is easy for the user to interpret and understand.
46. Encryption The encoding of data so that it cannot be understood by a human reader. This usually requires the use of an encryption key. A common encryption algorithm is called AES, which uses encryption keys of 128, 192 or 256 bits.
47. End-User An entity that licenses an Application for its own use from Licensee or its Additional Reseller.
48. Fog Computing An architecture that distributes computing, storage, and networking closer to users, and anywhere along the Cloud-to-Thing continuum. Fog computing is necessary to run IoT, IIoT, 5G and AI applications.
49. Foreign Key One or more columns in a table intended to contain only values that match the related primary/unique key column(s) in the referenced table. Foreign and primary keys explicitly define the direct relationships between tables. Referential Integrity is maintained when every foreign key refers to one and only one existing primary key.
50. Geospatial datatypes Data types which are specifically optimized for storage of geographic coordinate based data.
51. Grouped Lock Request A single operation that requests locks on more than one table or rows at a time. Either all or none of the requested locks will be granted. Issuing a grouped lock request at the beginning of a transaction that includes all of the tables/rows that can potentially be accessed by the transaction guarantees that a deadlock will not occur.
52. GUI A GUI (graphical user interface) is a system of interactive visual components for computer software. A GUI displays objects that convey information, and represent actions that can be taken by the user. The objects change color, size, or visibility when the user interacts with them.
53. Handle A software identification variable that is used to identify and manage the context associated with a particular computing process or thread. For example, SQL uses handles for each user connection (connection handle) and SQL statement (statement handle) among other things.
54. Hash An indexing method that provides for a fast retrieval (usually in only one additional disk access) of the row that has a matching column value.
55. Hierarchical Model A special case of a network model database in which each record type can participate only as the member of one set.
56. Hot Spot In a database, a hot spot is a single shared row of a table that is used and updated so often that it creates a performance bottleneck on the system.
57. I/O Input/output. For a DBMS, this is normally a disk drive, used to create database durability.
58. IEC International Electrotechnical Commission. Along with the ISO, the IEC controls the SQL standard (ISO/IEC 9075) and many others as well.
59. IIOT The industrial internet of things refers to interconnected sensors, instruments, and other devices networked together with computers' industrial applications, including manufacturing and energy management.
60. Implicit Locking Done by SQL to automatically apply the locks needed to safely execute an SQL statement in a multiuser (i.e., shared database) operational environment.
61. IMDB An in-memory database is a database management system that primarily relies on main memory for computer data storage. It is contrasted with database management systems that employ a disk storage mechanism.
62. Index A separate structure that allows fast access to a table's rows based on the data values of the columns used in the index. RDM supports two indexing types: hash and b-tree. A SQL key (not foreign key) is implemented using an index.
63. In-Memory (Inmemory) A feature in which the DBMS keeps the entire contents of a database or table available in computer memory at all times while the database is opened. Frequently, in-memory databases are volatile, meaning that they have little or no durability if the computer malfunctions. Durability issues are frequently prioritized below performance, which increases substantially with memory as the storage media.
64. In-process When referring to a DBMS, it is in-process when the DBMS code resides in the process space of the application program that is using it. If the process is single threaded, then this is a single-user usage of the database(s). A process may have multiple threads with individual connections to a shared database, making it a multi-user database. In-process uses Local Procedure Calls (LPC) vs Remote Procedure Calls (RPC) to a database server in a separate process.
65. Inner Join A join between two tables where only the rows with matching foreign and primary key values are returned.
66. Internet of Things A recently coined phrase describing the extended reach of connected devices. In particular, devices that use computing power to control or sense their environment and use wifi or wires to connect to the internet.
67. IoT The Internet of things describes the network of physical objects—a.k.a. 'things'—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the Internet.
68. IP Address A numerical identification tag assigned to a computing device in a network. Originally, internet IP addresses consisted of 32 bits of data, displayed as a set of four 3-digit numbers separated by periods (e.g., 113.12.214.2). The number of available IP addresses is running out and a new standard, called IPv6, with 128 bits, will expand the address space for the foreseeable future.
69. ISO International Organization for Standardization. Along with the IEC, the ISO controls the SQL standard (ISO/IEC 9075) and many others as well.
70. Isolation The property of a transaction that guarantees that the changes made by a transaction are isolated from the rest of the system until after the transaction has committed.
71. Java A multi-platform, object-oriented programming language, similar to C++, which is freely available to any and all software developers. It is particularly important in the development of internet/web and mobile applications.
72. JDBC Java Database Connectivity API. JDBC provides a standard database access and manipulations API for Java programs. RDM supports JDBC.
73. Join An operation in which the rows of one table are related to the rows of another through common column values.
74. JSON A data representation offered as a more compact but still humanly readable alternative to XML. JSON is the acronym for JavaScript Object Notation, and is frequently utilized in web/cloud-based applications.
75. Key A column or columns on which an index is constructed to allow rapid and/or sorted access to a table's row.
76. LAN A Local Area Network is used to interconnect the computers in a single geographic location. Contrasted to Wide Area Networks (WAN). Bandwidth (speed) is a primary difference between local and wide-area networking.
77. Library The container for a set of common software API functions. Frequently, a library is contained in a DLL or Shared Library.
78. Licensee A licensee is any business, organization, or individual that has been granted legal permission by another entity to engage in an activity. The permission, or license, can be given on an express or implied basis.
79. Little-Endian The little-endian convention is a type of addressing that refers to the order of data stored in memory. In this convention, the least significant bit (or 'littlest' end) is first stored at address 0, and subsequent bits are stored incrementally. Little-endian is the opposite of big-endian, which stores the most significant bit first. Because they are opposites, it is difficult to integrate two systems that use different endian conventions.
80. Local Procedure Call A software function call to a library function that exists in-process (same computer, same process space). This is in contrast to Remote Procedure Calls (RPC) which are to functions that reside a different process, whether they are the same computer (using interprocess communication) or a remote computer (using networking). Local procedure calls are significantly faster than remote procedure calls, but require computing resources on the local (client) computer.
81. Locking A method for safely protecting objects from being changed by two or more users (processes/threads) at the same time. A write (exclusive) lock allows access from only one user (process/thread) at a time. A read (shared) lock allows read-only access from multiple users (processes/threads).
82. Maintenance and Support The maintenance and support services for a Product under an Agreement (Maintenance and Support Addendum).
83. Marks Trademarks, trade names, service marks or logos identified on a company's website and/or printed material.
84. Memory Database A DBMS that keeps the entire contents of a database or table available in computer memory at all times while the database is opened. Frequently, in-memory databases are volatile, meaning that they have little or no durability if the computer malfunctions. Durability issues are frequently prioritized below performance, which increases substantially with memory as the storage media.
85. Meta-data 'Data about data.' In a DBMS context, data stored in columns of a table have certain attributes, such as the type, length, description or other characteristics that allow the DBMS to process the data meaningfully, or allow the users to understand it better.
86. Mirroring The ability to copy the changes each transaction made to the database from the master database to one or more slave databases so that exact copies of the master database are always available on the slaves.
87. MMDB An acronym for Main Memory Database, also called In-memory Database
88. Modification Stored Procedure An SQL stored procedure that contains one or more INSERT, UPDATE, and/or DELETE statements.
89. Multi-platform The ability for a software system to run on different computer hardware and operating systems with little or no change.
90. Multi-version Concurrency Control (MVCC) MVCC is a concurrency control method which allows for multiple types of database access to occur simultaneously. RDM implements this through the use of database snapshots.
91. Natural Join A join formed between two tables where the values of identically named and defined columns are equal.
92. Network Model A database in which inter-record type relationships are organized using one-to-many sets. This differs from a Hierarchical Model in that it allows a record type to be a member of more than one set. Individual rows can be retrieved using API functions that allow an application to navigate through individual set instances.
93. Network An inter-connection of computers and computing devices, all of which can send and receive messages from one another. The world's largest network is the internet, in which billions of computers are connected.
94. NoSQL A classification of data storage systems that are not primarily designed to be relationally accessed through the common SQL language. NoSQL systems are characterized by dynamic creation and deletion of key/value pairs and are structured to be highly scalable to multiple computers.
95. Object-oriented A computing programming paradigm that defines the computing problem to be solved as a set of objects that are members of various object classes each with its own set of data manipulation methods. Individual objects which have been instantiated (created) can be manipulated only using those prescribed methods.
96. Open Source Software (OSS) Software that is released under a Software License that (1) permits each recipient of the software to copy and modify the software; (2) permits each recipient to distribute the software in modified or unmodified form; and (3) does not require recipients to pay a fee or royalty for the permission to copy, modify, or distribute the software.
97. Optimizer A component of the SQL system that estimates the optimum (i.e., fastest) method to access the database data requested is by particular SQL SELECT, UPDATE, or DELETE statement.
98. Outer Join A join formed between two tables that in addition to including the rows from the two tables with matching join column values will also include the values from one table that do not have matching rows in the other.
99. Page Size The size in bytes of a database page.
100. Page The basic unit of database file input/output. Database files may be organized into a set of fixed-sized pages containing data associated with one or more record occurrences (table rows).
101. Party A party to an Agreement (between Raima and Customer)
102. PLC A programmable logic controller or programmable controller is an industrial computer that has been ruggedized and adapted for the control of manufacturing processes, such as assembly lines, machines, robotic devices, or any activity that requires high reliability, ease of programming, and process fault diagnosis.
103. Port A network portal through which two computing processes can communicate. Where one IP Address typically identifies a device, a Port on that device identifies one of multiple potential communication channels.
104. Portable Software that has been developed to be able to run on many different computer hardware and operating systems with little or no change.
105. Positioned Update/Delete An SQL UPDATE or DELETE statement that modifies the current row of a cursor.
106. Primary Key A column or group of columns in a given table that uniquely identifies each row of the table. The primary key is used in conjunction with a foreign key in another (or even the same) table to relate the two tables together. For example, the primary key in an author table would match the foreign key in a book table in order to relate a particular author to that author's books.
107. Process An instance of the execution of a program on a single computer. A process can consist of one or more threads executing, more or less, concurrently. The private memory used by a process cannot be accessed by any other process.
108. Product The Raima software product(s) licensed to Licensee under an Agreement, including all bug fixes, upgrades, updates, and releases. Product(s) does not include any Third Party Software or any OSS that may be included and distributed with the Product(s).
109. Protocol A specific method in which messages are formulated, formatted, and passed between computers in a network. Internet messages are passed between computers using the TCP/IP protocol.
110. Query A complete SELECT statement that specifies 1) the columns and tables from which data is to be retrieved; 2) optionally, conditions that the data must satisfy; 3) optionally, computations that are to be performed on the retrieved column values; and 4) optionally, a desired ordering of the result set.
111. RDM Raima Database Manager (or RDM) is an ACID-compliant embedded database management system designed for use in embedded systems applications. RDM has been designed to utilize multi-core computers, networking (local or wide area), and on-disk or in-memory storage management.
112. RDM Server Raima's client/server DBMS originally released in 1993, named RDS (Raima Database Server), Velocis, and finally RDM Server. Still supported for existing customers.
113. Read-only Transaction A Multi-Version Concurrency Control (MVCC) feature that allows database data to be read by one process without blocking another process's modification of that same data. Frequently referred to as a 'snapshot.'
114. Real-time A real-time environment is one in which specific tasks must be guaranteed to execute within a specified time interval. For a DBMS to be considered truly real-time, it must be able to perform specific database-related tasks in a time that can be deterministically demonstrated—i.e., the worst case execution time can be demonstrated. Because a general-purpose DBMS deals with dynamic data in which the sizes of tables vary over time, and since DBMS response times depend on the amount of data to be processed they cannot be considered real-time. This is true also for RDM. It is real-time friendly, because it is fast, has a small footprint and has features (such as virtual tables and in-memory storage) that allow it to be used in beneficial ways in a real-time application.
115. Record Instance/Occurrence One set of related data field values associated with a specific record type—equivalent to an SQL row.
116. Record Type A collection of closely related data fields—equivalent to an SQL table. Similar to a C struct, a record type is defined by a set of closely related data fields.
117. Redundancy Storing data twice in more than one tables, redundantly to make the system faster.
118. Referential Integrity A condition in which the foreign key column values in all of the rows in one table have matching rows in the referenced primary key table. Referential integrity is maintained by SQL during the processing of an INSERT and DELETE statement and any UPDATE statement that modifies a foreign or primary key value.
119. Relational Model A database in which inter-table relationships are organized primarily through common data columns, which define a one-to-many relationship between a row of the primary key table and one or more rows of the matching foreign key table. Equi-joins relate tables that have matching primary/foreign key values, but other comparisons (relationships) may be defined. In addition to describing how the database tables are related, the relational model also defines how the related data can be accessed and manipulated. SQL is the most commonly used relational model database language.
120. Relationships A relational database contains tables that relate to another table by using a relationship. The tables are connected by a common field. The relationships are defined as:
One to Many: this is the most common type of a table relationship. For every record in Table A, there are multiple records in Table B.
Many to Many: For every record in Table A, there are multiple records in Table B, and vice versa. In this case, a third table called a Join Table is created to which will contain only unique values
One to One – the rarest type of a table relationship. It is used for security and organization to avoid empty fields that only apply to some records in a table.
121. Remote Procedure Call A method of interprocess communication where a function residing within another process is called as though it is a local (in-process) function. The method is implemented through a local proxy function and a remote stub function. Parameter values are marshalled into a block of data that can be transmitted from the proxy to the stub for demarshalling and calling the actual function. Return values are processed in the same way as input values.
122. Replication A process where selected modifications in a master database is replicated (re-played) into another database.
123. Restriction Factor Each relational expression specified in the WHERE clause of a query has an associated restriction factor that is estimated by the SQL optimizer, which specifies the fraction (or percentage) of the table for which the expression will be true. For example, in the query select * from book where bookid = 'austen013px' the relational expression bookid = 'austen013px' has a restriction factor equal to .003 (only one out of 3213px rows will satisfy this expression).
124. Result Set The complete set of rows that is returned by a particular SELECT statement.
125. Rollback An operation, usually performed by the SQL ROLLBACK statement, that discards all of the changes made by all INSERT, UPDATE and DELETE statements that have been executed since the most recently started transaction (e.g., START TRANSACTION statement).
126. Row One set of related values for all of the columns declared in a given table. Also known as a record occurrence.
127. Royalty A License fee set forth in an Agreement (Product and Pricing Addendum).
128. RTOS A common abbreviation for real-time operating system. Raima Database Manager runs on most RTOS, like VxWorks, Integrity, Embedded Linux and QNX.
129. R-Tree (Spatial Indexing) R-trees are tree data structures used for spatial access methods, i.e., for indexing multi-dimensional information such as geographical coordinates, rectangles or polygons. The R-tree was proposed by Antonin Guttman in 1984 and has found significant use in both theoretical and applied contexts. A common real-world usage for an R-tree might be to store spatial objects such as restaurant locations or the polygons that typical maps are made of streets, buildings, outlines of lakes, coastlines, etc. and then find answers quickly to queries such as "Find all museums within 2 km of my current location", "retrieve all road segments within 2 km of my location" (to display them in a navigation system) or "find the nearest gas station" (although not taking roads into account).
130. Runtime A portion of a DBMS that is included within the process space of an application program.
131. Scalability A software system is scalable when its performance and overall system throughput continues to improve as more computing resources are made available for its use. This usually comes in the form of the number of CPUs and cores available in the computer on which the software system is run.
132. Scalar Function Either a built-in SQL function or a user-defined function that returns a single value computed only from the values of any required arguments at the time the function is called.
133. Schema A representation of the structure of a database. It may be graphical or textual. Graphical representations typically involve the use of boxes that represent database tables and arrows that represent inter-table relationships. Textual schema representations utilize Database Definition Language (DDL) statements to describe a database design.
134. Searched Update/Delete An SQL update or delete statement in which the rows to be updated/deleted are those for which the conditional expression specified in the WHERE clause is true.
135. Seat A copy of a Product, or any of its components, installed on a single machine.
136. Semaphore A primitive computing operation that is used to synchronize shared access to data. Sometimes called a "mutex" meaning a "mutually exclusive section." Semaphores control concurrent access to data by restricting access to critical sections of code that manipulate that data.
137. Server (Software) A Seat that resides on a single Server machine and is capable of accepting connections from one or more Seats residing on Client machines.
138. Set A method used to implement the one-to-many relationship formed between two tables based on their foreign and primary key declarations. The term "set" comes from the CODASYL Network Model definition. A set may be employed in a relational database when an owner (primary key) table and a member (foreign key) table where all of the member table rows that are related to the same owner table row are connected together with a linked list.
139. Snapshot Isolation When a snapshot of the database is taken, an instance of the database is frozen and concurrent reads are allowed to occur on that snapshot. Database writes are allowed to continue while reads on the snapshot are happening.
140. Source Code (Raima) The English language source code version of a Product, and any accompanying comments or other programmer Documentation, provided by Raima to Licensee pursuant to the terms of an Agreement. The capitalized term Source Code as used in an Agreement does not include OSS.
141. SQL The standardized and commonly accepted language used for defining, querying and manipulating a relational database. The etymology of "SQL" is unclear, possibly a progression from "QueL" (Query Language) to "SeQueL" to "SQL." However, some experts dont like the expansion "Structured Query Language" because its structure is inconsistent and a historical patchwork.
142. SQL PL A SQL based programming language. This allows for a SQL programmer to use programming constructs like variables, conditionals and loops purely through the use of SQL statements.
143. Stack A stack is a conceptual structure consisting of a set of homogeneous elements and is based on the principle of last in first out (LIFO). It is a commonly used abstract data type with two major operations, namely push and pop. Push and pop are carried out on the topmost element, which is the item most recently added to the stack. The push operation adds an element to the stack while the pop operation removes an element from the top position. The stack concept is used in programming and memory organization in computers.
144. Stored Procedure A named and optionally parameterized compiled set of SQL database access statements that can be executed as a unit through a call to the stored procedure.
145. Synchronization The implementation method (frequently using semaphores) by which concurrently executing multiple computer threads or processes can safely access and update shared data.
146. System Catalog A system catalog is a group of tables and views that incorporate vital details regarding a database. Every database comprised of a system catalog and the information in the system catalog specifies the framework of the database.
147. Table A collection of closely related columns. A table consists of rows each of which shares the same columns but vary in the column values.
148. Third Party Software Software that is licensed separately by a third party with the Product(s) or Documentation.
149. Thread A single, sequential execution of a computer program or program segment. A program can consist of one or more concurrently executing threads. Where multiple threads access the same data, some kind of synchronization method needs to be employed to ensure that the data is accessed only by one thread at a time.
150. Timeout Occurs when a lock request has waited longer than the prescribed wait time for the request to be granted.
151. Transaction Log A sequential record of all of the database changes made by each transaction in the order they were issued. The transaction log is used to ensure that a database conforms to the ACID properties. Transaction logs are also used to mirror or replicate data to other databases.
152. Transaction A set of logically related database modifications that is written to the database as a unit. The database changes associated with a given transaction are guaranteed by the DBMS to be written completely to the database; in the event of a system failure, none are written. The state of the database both before and after a transaction will be consistent with its design.
153. Transactional File Server (TFS) An architectural piece of Raima's RDM system that may be linked in-process with application code or executed separately as a server process. Its responsibility is to perform all of the database file input and output, serving up database pages to the RDM Runtime library as requested, controlling read-only transactions, and committing all transaction change logs to the database.
154. Transactional Stored Procedure A modification stored procedure in which the database changes made by the procedure are encapsulated in its own transaction.
155. Update (of Product) A Product that has been modified in a minor way, including but not limited to bug fixes, and has been furnished to Licensee under this Agreement. An Update is represented by a Product version number that increments to the right of the decimal point.
156. Upgrade (of Product) A Product that has been modified in a major way, and is released as a new version of the Product. An Upgrade is represented by a Product version number that increments to the left of the decimal point.
157. Use Storing, loading, installing, and/or running a Product, or displaying screens generated by a Product.
158. User-defined Function An application-specific SQL callable scalar or aggregate function written in C.
159. User-defined Procedure An application-specific function written in C and invocable through use of the SQL call statement.
160. Vacuuming Databases that use MVCC to isolate transactions from each other need to periodically scan the tables to delete outdated copies of rows. In MVCC, when a row is updated or deleted, it cannot be immediately recycled because there might be active transactions that can still see the old version of the row. Instead of checking if that is the case, which could be quite costly, old rows are assumed to stay relevant. Database Vacuuming - The process of reclaiming the space is deferred until the table is vacuumed which, depending on the database, can be initiated automatically or explicitly.
161. Velocis Former name of a DBMS product, now called RDM Server.
162. Virtual Table An SQL table that is defined through a set of application-specific C functions that conform to a particular interface specification, allowing a non-database data source (e.g., a device, etc.) to be accessed as if it were a conventional SQL table.
163. WAN A Wide Area Network, as contrasted to Local Area Networks (LAN), Normally WAN refers to the internet. Bandwidth (speed) is a primary difference between local and wide-area networking.
164. Wi-Fi The common name for standardized local-area wireless technology.
165. XML Extensible Markup Language. XML documents are much used in the internet's World Wide Web but are also used in many computing contexts in which data needs to be shared.
166. XML database An XML database is a data persistence software system that allows data to be specified, and sometimes stored, in XML format. This data can be queried, transformed, exported and returned to a calling system. XML databases are a flavor of document-oriented databases which are in turn a category of NoSQL database.
S.No. Term Description

 

0 Comments
Leave a message

Search Current Affairs by date
Other Category List

Cookies Consent

We use cookies to enhance your browsing experience and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookies Policy