CST 363: Week 4

 Briefly summarize 5 things what you have learned in the course so far.  

  1. SQL utilizes various constraint keywords to ensure the values within a database are following rules that best suit the desired functionality and utility of the database. These constraints can dictate if a value is a reference to another value, whether or not NULL can be placed into a cell, and more. It's similar to how conditional statements can be implemented in Java to conduct user input validation. 
  2. Database tables can be structured for maintaining data integrity and reducing redundancy through normalization. Through this process, a table may go through one or more stages called normal forms that establish rules on the table requiring rows to be moved to other tables or removed all together. 
  3. SQL allows tables to be joined together using related columns. These related columns can be joined with the keyword 'using' if they have the same column name or the 'on' keyword if the columns have different names. There are various types of joins, like inner or outer, which indicate what rows will be featured in the newly established table and whether or not null values will be present and on which side of the table they can appear on.
  4. SQL allows the creation of custom tables intended to simplify the process of inquiring. One type of custom table is called a Common Table Expression, or CTE, where a table is created based on the expression and is followed by a single inquiry. Another type is called a view, which stores a query in the database and allows the result of that query to be used in other queries. 
  5. Databases can have different orientations that dictate how data is stored, read, and modified. Row-oriented storage systems tend to perform adequately for query performance and maximum storage usage when rows are small relative to block size. Column-oriented storage systems tend to perform best for data compression algorithms and faster data access.

List at least 3 questions you still have about databases.

  1. How is data managed when being accessed and modified by multiple users simultaneously?
  2. How do database designers assist in implementing security measures for their database?
  3. Are there ways to save states or snapshots of a database, if so how is this done?

Comments

Popular posts from this blog

Week 2 Learning Journal Post

Week 1: Learning about CSUMB and the CS Major.

Week 3 Learning Journal Post