Solutions 2025 Update
Database Links - Answer-701- data stored in a different database but accessible to the
database currently being accessed
Snapshot (Database Objects) - Answer-701- state of a system at a particular point in
time, can be a backup copy
Procedure (Database Objects) - Answer-701- subroutine available to applications that
access a relational database system (data validation, access control mechanisms)
Trigger (Database Objects) - Answer-701- procedural code automatically executed in
response to certain events on a particular table or view in a database
Functions and Subroutines - Answer-701- sequence of program instructions that
perform a specific task
The difference between a function and a subroutine is that a function can return data,
whereas a sub can't.
Package (Database Objects) - Answer-701- built from source with one of the available
package management systems
Non-schema Objects - Answer-701- users, roles, contexts, directory objects
Database Design - Answer-702- process of determining fields, tables and relationships
needed to satisfy the data and processing requirements, a detailed model of the
database
Database Design Process - Answer-702- (pre-created list on quizlet)
System Analysis
Conceptual Design
Physical Design
Implementation & Conversion
Operation & Maintenance
Conceptual Schema (Database Design Process) - Answer-702- Step 1 of Database
Design Process
,Determine where relationships and dependency is within the data
Logical Data Model (Database Design Process) - Answer-702- Step 2 of Database
Design Process
Arrange data in a logical structure that can be mapped into the storage objects
supported by the database management system
Physical Model (Database Design Process) - Answer-702- Step 3 of Database Design
Process
-physical configuration of the database on the storage media
-detailed specification of data elements, data types, indexing options, and other
parameters residing in the DBMS data dictionary
-models, hardware, software
Database Field Type - Answer-702-
short integer- between -32768 and 32768
long integer- between -2,147,483,648 and 2,147,483,648
float- single-precision floating-point numbers
double- double-precision floating-point numbers
text- free-text, could be a coded value-assign to and integer through a domain
dates- a calendar date and/or time
BLOB- (Binary Large Object) data stored as a long sequence of binary numbers -
ArcGIS stores annotation and dimensions as BLOB - images, multimedia, bits of code
Object Identifiers- Unique IDs and FIDs
Global Identifiers- Global ID and GUID - data types store registry sing style strings
consisting of 36 characters enclosed in curly brackets
Raster field types- raster can be stored within the geodatabase
geometry -point, line, polygon, multipoint, multipatch
Database Administration Basic Tasks - Answer-703-
Backup and recovery
Database Security
Storage and capacity planning
Performance monitoring and tuning
Troubleshooting
other- high availability and ETL
Database Administration Archiving - Answer-703- captures, manages, and analyzes
data changes
(most often done with geodatabases)
Database Administration Retrieval - Answer-703- extracting data from a backup due to
data loss or data corruption
Data Owner - Answer-704- Individuals, normally managers or directors, who have
responsibility for the integrity, accurate reporting and use of computerized data.
, -user who creates tables, feature classes
User Access - Answer-704- Refers to what permissions each user should be granted in
a particular database, and which database objects they will be able to see and use.
-Administrator- full control of the database; can read, create, update, delete (features
and data sets)
-Editor- can read, update, create, and delete features
-Creator- can create additional feature classes, tables, and can read update, create,
and delete
-Reader- can only view data
Authentication (Data Security) - Answer-704- database checks the list of users to make
sure a user is allowed to make a connection
-Operating System (OS) authentication
-Database Authentication
Groups (Data Security) - Answer-704- grant users based on their common functions
Public Role (Data Security) - Answer-704- right granted to anyone connected to
database
File Based Transfer - Answer-801- data is in a structured file format
Application Programming Interface (API) - Answer-801- A set of software routines that
allows one software system to work with another.
Web Services - Answer-801- Small pieces of code that are accessed via the application
server which permit inter-operable machine-to-machine interaction over a network.
SSL (Secure Sockets Layer) - Answer-801- a protocol that provides security when
communicating on the Internet (encryption)
TLS (Transport Layer Security) - Answer-801- used to encrypt traffic on the wire. TLS is
the replacement for SSL and like SSL, it uses certificates issued by CAs.
NTP (Network Transport Protocol) - Answer-801- communication packet is constructed
at different intervals, transferred form host to receiver
-Transmission Control Protocol (TCP)- header package for the data at the transport
layer
-Internet Protocol (IP)- header is added to internet layer
-Media Access Control (MAC) address- added at the physical network layer
NFS (Network File System) - Answer-801- A client/server application that enables users
to access shared files stored on different types of computers and work with those files
as if they were stored locally on their own computers.