{"id":1334,"date":"2025-01-13T21:40:39","date_gmt":"2025-01-14T02:40:39","guid":{"rendered":"https:\/\/pressbooks.bccampus.ca\/nelson\/chapter\/glossary\/"},"modified":"2025-01-16T07:06:37","modified_gmt":"2025-01-16T12:06:37","slug":"glossary","status":"publish","type":"chapter","link":"https:\/\/pressbooks.bccampus.ca\/nelson\/chapter\/glossary\/","title":{"raw":"Glossary","rendered":"Glossary"},"content":{"raw":"<div class=\"glossary\">\r\n<p class=\"import-Normal\">The first section is in appearance order by chapter, then by alphabetical order. The second section is in alphabetical order. Some key terms were repeated. In the fourth edition, this will be reviewed.<\/p>\r\n\r\n<h2>Appearance Order by Chapter<\/h2>\r\n<table style=\"width: 503.55pt\">\r\n<tbody>\r\n<tr class=\"TableNormal-R\" style=\"height: 18pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\" style=\"text-align: center\"><strong>Key Term<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\" style=\"text-align: center\"><strong>Definition<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\" style=\"text-align: center\"><strong>First Appearance<\/strong><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>concurrency<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The ability of the database to allow multiple users access to the same record without adversely affecting transaction processing.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 1<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data element<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A single fact or piece of information<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 1<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data inconsistency<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A situation where various copies of the same data are conflicting.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 1<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data isolation<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A property that determines when and how changes made by one operation become visible to other concurrent\u00a0users and systems.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 1<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data redundancy<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A situation that occurs when the same data appears in two or more locations.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 1<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>database approach<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Allows the\u00a0management of large amounts of organizational information.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 1<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>database management software<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A powerful software tool that allows you to store, manipulate and retrieve data in a variety of ways.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 1<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>file-based system<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">An application program designed to manipulate data files.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 1<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data or data elements<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Facts that represent something in the real-world.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 2<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data mining<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Looking for patterns.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 2<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>database<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A shared collection of related data that is used to support the activities of a particular organization.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 2<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>database management system (DBMS)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A collection of programs that enables users to create and to maintain databases plus provide the ability to control who and how the access is done.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 2<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>information<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Insights gained from pieces of data.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 2<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>metadata<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Data about the database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 2<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>multi-tier system<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">An arrangement that uses several servers. It divides the workload.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 2<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>table<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A combination of fields<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 2<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>access<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This pertains to what can be viewed by a user.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>concurrency control strategies<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Strategies that ensure the data access is always correct and that data integrity is maintained.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data independence<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The insulation between the programs and data is also called program-data independence.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data integrity<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The assurance that an organization\u2019s data is accurate, complete, and consistent at any point in its lifecycle.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data redundancy<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the situation where a piece of data is stored in two or more places.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>database constraint or integrity constraints<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Steps that ensure that the actions of insertion, of updating, of deleting, and of other actions are done in a way that the actual data is not impacted incorrectly.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>domain constraint<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This defines the legal values for a column.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>entity integrity constraint<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This pertains to the primary key. Entity integrity constraints prevent a null or empty value from being used.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>foreign key<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a primary key appearing in another table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>key constraint<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This pertains to the primary key. The primary key must be unique.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>metadata<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Defines and describes the data and relationships between the tables in the database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>normalization<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Relational databases use a set of rules for eliminating data redundancy.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>null<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the absence of a user-defined value. This is not the same thing as zero.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>permission<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This pertains to what a person or a group or a role can do.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>primary key<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a unique value for locating a row of data in a database table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>program-data independence<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">See data independence.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>read and write privileges<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the ability to both read and modify a file.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>read-only permission<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the ability to read a file but not make changes.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>referential integrity constraint<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This refers to the linkage between two tables. If a table uses a foreign key (a primary key appearing in another table) to reference another table, then that key value must be present in that table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>self-describing<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A database is self-describing because it not only contains the database itself, but also metadata that defines and describes the data and relationships between the tables in the database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>system catalogue (system catalog)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the database approach, the data structure, the databases tables, the database views, and other vital pieces of information are stored.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A subset of the database that is defined and dedicated for a particular set of users.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>write permission<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the ability to make changes to a file or to a resource.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data type<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is how data is defined. It could be an integer, a string, a date, or something else. There are differences from DBMS to DBMS.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data models<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Tools for going from a concept to a fully working database management system.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>entities<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The objects or the nouns that make up a database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Entity-Relationship Diagram (ERD)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is used in relational DBMS work for modeling data.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>framework<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a more structured approach for solving a problem. The framework may have a set of guidelines or rules for completing a task.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>integer<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A whole number.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>model<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a simplified representation of a system or of a process. It is a tool for breaking the complex into smaller and more manageable parts.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>foreign key<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a primary key appearing in another table. (This was covered in Chapter 3.)<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>null<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the absence of a user-defined value. This is not the same thing as zero. (This was covered in Chapter 3.)<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>primary key<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a unique value for locating a row of data in a database table. (This was covered in Chapter 3.)<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>alternate key (or secondary key)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are the unselected candidate keys.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>atomic values<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This means that the value cannot be broken down into small pieces.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>attributes<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is information about an entity or about a relationship.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>cast function<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a way of converting a value to another data type.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>candidate key<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a way of converting a value to another data type.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>column<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an attribute.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>composite attribute<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an attribute that is composed of two or more pieces.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>composite key<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This uses more than one attribute to locate a record.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>degree<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the number of columns in a table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>degree of a relationship set<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the number of different entity sets participating in a relationship set.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>derived attribute<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is derived from other attributes.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>domain<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the set of allowable values for a column.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>entity or entities<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the words of Peter Chen, these are things that \u201cexists in our minds.\u201d An entity is an object in the real world with an independent existence that\u00a0can be differentiated from other objects.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Entity-Relationship Diagram<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Peter Chen developed this tool in support of the entity-relationship model.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Entity-Relationship Model<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Peter Chen developed this model in 1976. It draws upon the network model, the relational model, and entity set model. It is a more natural view of the real world. It is based on sets theory and relational theory.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>entity set<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a collection of entities. In the words of Peter Chen, an entity \u201chas the properties common to the other entities in the entity set\u2026.\u201d<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>existence dependency<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">An entity that dependents upon the existence of another entity. This is a weak relationship. If the linked entity is removed, then these dependent entities would go away.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>field<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">See column above.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>file<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">See relation below.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Foreign key<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is used to link from one table to another table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>key attribute<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an attribute that uniquely identifies an entity.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>multivalued attribute<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an attribute that could contain more than one entity.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>non-tangible type<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an entity that is not physical and cannot be touched.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>primary key<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is selected from the set of candidate keys. Recall from Chapter 3 that this was defined as a unique value for locating a row of data in a database table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>relation<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Formally, this is a subset of the Cartesian product of a list of domains characterized by a name. Informally, this is a relation between two entities.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>relationship type<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This represents the associations between entity types.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>relationships<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the words of Peter Chen, this an \u201cassociation among entities.\u201d<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>record<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">See row below.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>recursive relationship<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">See unary relationship.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>row<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This represents a group of related data.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>staging table<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a table that is receiving data from different sources.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>super key<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a set of one or more attributes (columns), which can uniquely identify a row in a table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>table<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">See relation above.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>tangible type<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an entity that is physical or could be touched.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>ternary<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is when more than two entity sets participate in a relation.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>tuple<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">See row above.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>unary<\/strong><strong> relationship<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is one in which a relationship exists between occurrences of the same entity set.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>camel case<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This runs the words together. The first word has a lower-case letter and the other words start with an upper case letter. This is the formal definition. However, there are authorities that use \u201ccamel case\u201d when the intent is Pascal case.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>cardinality<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This describes the relationship between two data tables by expressing the minimum and maximum number of entity occurrences associated with one occurrence of a related entity.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>cardinality with optionality<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This describes the relationship between two data tables by expressing the minimum and maximum number of entity occurrences associated with one occurrence of a related entity. One entity could have 0, 1, or many connections in another table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>domain integrity (or domain constraints)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These restrict the entities in a column to a certain set of values and data types.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>integrity rules (or integrity constraints or relational integrity constraints)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are conditions that must be present for a valid relation.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Entity integrity (or entity integrity constrains)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This means that each row in a table must have some unique data. This would be the primary key. The value for a primary key could not appear twice in the same table. The value for a primary key cannot be null.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>kebab case<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This separates each word with the dash or hyphen character<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>key constraints<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The value for a primary key cannot be used again in the same table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>mandatory relationship<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Where one entity occurrence requires a corresponding entity occurrence.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>naming convention<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">An organization\u2019s approach for naming tables and columns.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>optionality<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This states whether or not an entity must be joined to another entity.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Pascal case<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This runs the words together. All words start with an upper-case letter.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>referential integrity (or referential integrity constraint)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This means that if a table contains a column for foreign keys, then the linked table must have a matching value in the primary key column. That is, the value in the foreign key column must also be present in the primary key column of the linked table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>snake case<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a style where the words are separated by the underscore character.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>user-defined integrity (or business rules)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are unique to an organization.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>attribute closure<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a set of attributes that can be functionally determined from it.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Boyce Codd Normal Form (BCNF)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This requires that a database table is in 3NF and that every functional dependency X \u00e0 Y where X is the super key of the table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>complete<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This means that when using the primary rules of the Armstrong\u2019s Axioms repeatedly for inferring other dependencies that continue until we reach a stopping point, we will have a complete set of dependencies.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>deletion anomaly<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">When a database table is not well-designed, problems can arise when a row is deleted. The deleted row might contain data that does not appear elsewhere in the database table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>First Normal Form (1NF)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This requires that each cell contains only one value.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Fifth normal form (5NF)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This requires that the database table is in 4NF and that a relation does not contain any join dependency and no joining actions that would experience a loss.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Fourth normal form (4NF)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This requires that the database table is in BCNF and that there ae no non-trivial multivalued dependencies.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>functional dependency (FD)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a relationship between attributes such as between the PK and the non-key attributes. Something determines the other attributes. An FD is a database constraint that determines the relationship of one attribute to another attribute. FDs help to maintain the quality of data in a database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>functional dependency set (FD set)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the set of all FDs in a relation.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>insertion anomaly<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">When a database table is not well-designed, problems can arise when a new row is added. The new row might contain revised data that needs to be applied to other rows.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>normalization<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a step-by-step process for minimizing redundancy in a database. There are five normal forms.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Project-Join Normal Form (PJNF)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">See Fifth Normal Form.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>redundancy<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is when data appears in some fashion two more times in a table. This is undesirable, because it causes problems.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Second Normal Form (2NF)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This requires that a database table is in 1NF and that each non-key attribute must be functionally dependent on the primary key.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>sound<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This means that for a given set of FDs that are specified for a relation schema, a person should be able infer any dependency from the FDs by using the primary rules of Armstrong\u2019s Axioms and that these will hold in every relation state of the relational schema R that satisfies the dependencies in the FDs.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Update anomaly<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">When a database table is not well-designed, problems can arise when a row is updated. The updated row might contain revised data that needs to be applied to other rows. This is similar to the situation of adding a new row to a database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>ACID<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This stands for Atomicity, Consistency, Isolation, and Durability. These behaviors are highly desirable.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 8<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>NewSQL<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is different from the traditional relational DBMS. A NewSQL DBMS uses the NoSQL approach with the traditional relational DBMS. Queries are executed against the DBMS using the best approach.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 8<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>NoSQL<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is different from the traditional relational DBMS. Queries are executed against the DBMS using a different approach.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 8<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Real-time DBMS<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a database that stores data in JSON files. All clients are synchronized in real-time with a connection to the database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 8<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Sharding<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a technique that involves splitting a large database into smaller, more manageable pieces. These pieces are known as a shard. Each shard contains a subset of the data and operates independently. This allows for horizonal scaling and improved performance.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 8<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Spatial data<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This represents objects in a geometric space such as points or as polygons.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 8<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>American National Standards Institute (ANSI)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a private, non-profit organization in the United States that sets standards. It administers and coordinates the United States voluntary standards. It was founded in 1918.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Data Control Language (DCL)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is for handling rights, permissions and other controls for a DBMS.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Data Definition Language (DDL)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is for creating a database with tables. There are commands for changing tables. See the text for the actual words.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Data Manipulation Language (DML)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is for working with the actual data in a table. See the text for the actual words.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Data Query Language (DQL)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is for querying and analyzing data in a database. Some authorities will group these SQL commands under DML. See the text for the actual words.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Graphic interface (GUI)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a means for interacting with a computer. This could involve using a mouse for clicking on menus. The opposite is a command prompt interface.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>International Organization for Standardization (ISO)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is similar to the ANSI. It was founded in 1946.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>key words<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are reserved words that cannot be used as variables in a SQL command.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Online Transaction Processing (LTP)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a type of data processing that consists of executing a number of transactions that are occurring at the same time.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>SQL-92<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the foundation that many relational DBMSs use. SQL-92 is taught in many schools and is covered in many textbooks. However, since SQL-92 has 579 pages, the coverage is not complete.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>SQL Server Management Studio (SSMS)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Microsoft will frequently refer to their SQL Server Management Studio as \u201cSSMS.\u201d I prefer to use the long form in order to avoid abbreviation overload. \u201cSSMS\u201d will appear in the text when I am quoting information.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Structured Query Language (SQL)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a fourth-generation programming language that is designed for working with databases and with the data in a database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Transact Structured Query Language or Transact-SQL (T-SQL)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is Microsoft\u2019s version of SQL with enhancements.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Transaction Control Language (TCL)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">For grouping a series of SQL commands in a package. If any of the tasks fail, then the whole group fails. There are only two results: success or failure.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>wildcard<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a space holder for one or more characters. The asterisk is a very common wildcard.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>anti join<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This will return the rows that semi join had rejected.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>atom<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a building block for more complex formulae in domain relational calculus.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>binary<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The operation involves two database tables.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Cartesian product<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an operation from set theory. This is also known as \u201ccross product.\u201d If we drop the requirement that a relation must be union compatible, then you could have an output that is larger than either relation. The result is a new element by combining every member tuple from one relation set with every member tuple from the other relation set.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>commutative<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The sequence of actions could be changed and the answer would still be the same.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>division<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This operation is defined to be a relation over the attributes that consists of the set of tuples from R that match the combination of every tuple in S.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>equijoin<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is like a theta join in that the equijoin operation pulls from two tables based on a condition represented by the Greek letter theta (\u03b8). But \u03b8 is the equal symbol (=).<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>existential <\/strong><strong>quantifier <\/strong><strong>\u2203<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This means \u201cthere exists\u201d at least one instance or tuple that is true for the statement.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>intersection \u2229<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a set operation that does not have a counterpart in regular algebra. It extracts what is common to two database tables based on a conditional.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>join <\/strong><strong>\u22c8<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an operation from set theory. A way of pulling from two tables. This was added to the set operators.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>natural join<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is like a theta join that pulls from two tables, but the extra column is not included in the output and the ON key word is not used.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>operands<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In regular algebra, these are variables or values used in an expression. In relational algebra, these are relations or variables that represent relations.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>operators<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In regular algebra, these are symbols that denote what will be done to the regular algebra operands. In relational algebra, these are the common actions that we need to do with relations in a database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>outer join<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This will return rows from two tables even if there are no matches in one of the tables. An outer join can be divided into three sub types<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>predicate<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an expression of one or more variables for a certain domain. A predicate must have at least one object that is associated with the predicate.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>projection \u03c0<\/strong><strong> (The lower case Greek letter pi)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This selects a subset of the available columns. This was added to the set operators.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>relational algebra<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This collects instances of relations as input and gives occurrences of relations as outputs. The expressions explain how to execute a query. The expressions are independent of any SQL system.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>relational calculus<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This specifies what is to be retrieved whereas relational algebra states how to obtain the results. In relational calculus, we work with tuple relational calculus and with domain relational calculus.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>renaming \u03f8<\/strong><strong> (The lower case Greek letter rho)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This renames the output columns. This was added to the set operators.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>safe<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The expression draws upon members of a defined domain.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>self join<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is when one table is treated as two tables.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>selection \u03c3<\/strong><strong> (The lower case Greek letter sigma)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A way of selecting tuples that satisfies a selection condition. This was added to the set operators. Do not confuse this word with the SQL key word \u201cSELECT,\u201d which lists out the desired columns in the output.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>selectivity of the condition<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The fraction of tuples selected by a selection condition.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>semijoin<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In a left outer join, you would have the desired columns from both tables. Nulls would appear in the right-hand table for missing values. A semijoin would drop the right-hand table\u2019s columns. The result would be the tuples that have a match in the second table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>set difference<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is from set theory. These are the tuples that are present in one relation, but not present in a second relation. We write this as R \u2013 S, which states that this includes all tuples that are in R, but are not in S. The two relations must be union compatibility or type compatibility.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>set operations<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are operations drawn from mathematical set theory. These are union, intersection, set difference, and Cartesian product.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>theta <\/strong><strong>join \u03b8<\/strong><strong> (The lower case Greek letter theta)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This pulls from two tables based on a condition represented by the Greek letter theta (\u03b8). \u03b8 could be any one of the comparison operators.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>type compatibility<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This states that the two database tables must have the same degree and the same domain. This is the same concept as is \u201cunion compatibility.\u201d<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>unary<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This means we are working with one relation or with one database table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>union <\/strong><strong>\u222a<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This produces the tuples that are in either Result1 or Result2 or both while removing any duplicates. In the relational database world, the two sets of tuples must be of the same type (union compatibility or type compatibility).<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>union compatibility<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This states that the two database tables must have the same degree and the same domain. This is the same concept as is \u201ctype compatibility.\u201d<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>universal <\/strong><strong>quantifier <\/strong><strong>\u2200<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This means \u201cfor all.\u201d All tuples must be true for the statement.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>unsafe<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The expression draws upon members outside of a defined domain.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Left outer <\/strong><strong>join (<\/strong><strong>R <\/strong><strong>\u27d5<\/strong><strong> S)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Everything from left plus any matching rows on the left with the right table plus nulls for any missing rows.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Right outer <\/strong><strong>join (<\/strong><strong>R <\/strong><strong>\u27d6<\/strong><strong> S)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Everything from right plus any matching rows on the right with the left table plus nulls for any missing rows<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Full outer <\/strong><strong>join (<\/strong><strong>R <\/strong><strong>\u27d7<\/strong><strong> S)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Everything from both tables plus nulls for any missing fields.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Tuple relational calculus<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This seeks to obtain those tuples that are true for a certain predicate. The variables come from the tuples of the relations.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Domain relational calculus<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This uses variables come from the domains of the attributes.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>access control<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a method for restricting access to certain resources by certain individuals.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>ACID<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This stands for Atomicity, Consistency, Isolation, and Durability. [This was repeated from Chapter 8.]<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Atomicity<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A transaction is a single unit. It completes fully (Commit) or it fails (Abort).<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>authentication<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a way to verify the identity of a person.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>authorization<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This a way of determining whether or not that a person should be allowed to access the data or to make a change.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Consistency<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The integrity constraints must be maintained so that the database is consistent before and after a transaction. We are ensuring that the data is correct.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Durability<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The changes must persist. These changes need to be written to the storage medium. So if the power is lost, the changes are present and are not lost.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>encryption<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This makes a text unreadable and thus limits the loss of data should a hacker is able to penetrate the previous layers.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Extent<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a Microsoft approach to data pages. A data page is 8 KB in size. Eight data pages form one Extent.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>firewall<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a separator or a restrictor of network traffic.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Identity-Based Access Control (IBAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This grants access based on the identity of the user and on the granted credentials.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Isolation<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Transactions do not interfere with other transactions.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>logical access controls<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These limit connections to computer networks, system files, and data. These are provided via software and these support letting certain individuals or groups to gain access to sensitive information<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>pages<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an approach for storing data in memory or on a hard drive.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>permission<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is an access that is granted on a securable for a specific principal.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>physical access controls<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are physical means such as fences, locked doors, and guards.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>principal<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is an entity that can be authenticated.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Principle of Least Privilege (PLP)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This directs that users can only see what they need for their job.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>securable<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is a SQL Server resource that can be accessed by a principal.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>SQL Server Application Database Roles<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are used by an application instead of by individuals. This adds another layer of security.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>SQL Server Application Roles<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are used by an application instead of by individuals. The intent is to keep regular users and application users separate and safe.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Tabular Data Stream (TDS) protocol<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a protocol for transferring data between the client machine and the server machine.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the context of Microsoft usage, this limits what a person can see and can do.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>access control<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a method for restricting access to certain resources by certain individuals.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Attribute-Based Access Control (ABAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This combines features of the user\u2019s attributes such as the department or job title (RBAC like), the resource\u2019s status such as confidentiality level (MAC like) and ownership (DAC like), and the current environment such as time of access or location.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Break-Glass Access Control (BGAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This permits users to bypass a regularly used access control system during an urgent situation. The name comes from the old fire alarm boxes.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Clark-Wilson Model<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This strives to ensure the integrity and confidentiality of data. This is different from the various access control models, which addressed only permission to access a resource.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Context-Based Access Control (CTAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This makes access decisions based on the context of the request such as location, device used, or the user\u2019s behavior patterns.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Discretionary Access Control (DAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This uses the concept of resource owners. The owner created the resource. The owner decides who will have access to a resource. In addition, the owner determines what the person can do with the resource, such as read, write, or execute. With numerous owners of the numerous resources, there is no centralized office.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>encryption<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This makes a text unreadable and thus limits the loss of data should a hacker is able to penetrate the previous layers.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>firewall<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a separator or a restrictor of network traffic.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Fixed SQL Server Database Roles<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are predefined roles. These cannot be changed nor deleted. These roles were created during the creation of a database<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Fixed SQL Server Roles<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are predefined roles. These cannot be changed nor deleted. These roles were created during the installation of the SQL Server.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>History-Based Access Control (HBAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This looks at the history of the person.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>functions<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are pieces of code that can restrict what is accessed<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Identity-Based Access Control (IBAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This grants access based on the identity of the user and on the granted credentials.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>logical access controls<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These limit connections to computer networks, system files, and data. These are provided via software and these support letting certain individuals or groups to gain access to sensitive information<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Mandatory Access Control (MAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This uses the concept of security labels. The owner creates the resource, but the owner does not decide who will have access to a resource. A hierarchical approach is used.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Organization-Based Access Control (<\/strong><strong>OrBCA<\/strong><strong>)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This separates the security policy from the activities that must implement a security policy.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>permission<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is an access that is granted on a securable for a specific principal.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>physical access controls<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are physical means such as fences, locked doors, and guards.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Policy-Based access Control (PBAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This evaluates access rights and entitlements based on new organizational policies.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>principal<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is an entity that can be authenticated.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Principle of Least Privilege (PLP)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This directs that users can only see what they need for their job.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Risk-Adaptive Access Control (RAdAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This adjusts the access in real time based on the current risk level, users\u2019 behaviors, the network conditions, and the potential threats.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Role-Based Access Control (RBAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This uses the concept of roles for determining access.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Rule-Based Access Control (RAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is based on a set of predefined rules. This is similar to PBAC, except there is no governance committee creating the rules.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>securable<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is a SQL Server resource that can be accessed by a principal.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>SQL Server Application Database Roles<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are used by an application instead of by individuals. This adds another layer of security.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>SQL Server Application Roles<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are used by an application instead of by individuals. The intent is to keep regular users and application users separate and safe.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Time-Based Access Control (TBAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This grants access to users based on specific timeframes.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>User-Defined SQL Server Database Roles<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are created to support the needs of the organization. These provide more granular control over what users may access.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>User-Defined SQL Server Roles<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are created to support the needs of the organization.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the context of Microsoft usage, this limits what a person can see and can do.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Application Programming Interface (API)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A programming language will have objects and classes. Programmers will use these instead of creating their own block of code for a task. An example would be the SqlConnection object.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>concatenated<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In programming, pieces are combined or added to form a string.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>connection string<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a series of value pairs that is needed by a program in order to access a database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>console project<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This will return the rows that semi join had rejected.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>deprecated<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This means that the software feature is usable, but is obsolete. The practice is to state in a revision that a certain method or class or function will be removed in a future version. The word \u201cdeprecated\u201d is used in the warning.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>functions<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are built-in blocks of SQL lines for performing tasks such as obtaining the average of values in a column, counting the number of items in a column, and so on.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>graphic user interface (GUI)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The eye-pleasing front end to a program.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>instance<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a running example or session.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>OUT parameter<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is used within the SQL Server environment for returning a value other than a result set. If this is being sent to the calling program, then that program would need to have an out variable declared.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>prepared statement<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a programming approach whereby values are collected and added to a specially created statement for routing to a database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>regular expression<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This does a pattern match against permitted or not permitted characters.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>result set<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">What comes back from a SQL query.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>SQL injection attack<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a technique whereby a hacker can craft a SQL query that can obtain more data than wanted by the database managers.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Stored procedures<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These work with the actual SQL command inside the database environment.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>triggers<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are SQL lines that are invoked when an action takes place.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a virtual table that is the result of a query.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Bootstrap<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a framework for building responsive, mobile-first websites. Version 5 uses HTML 5, CSS, and JavaScript.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>carousel<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a slideshow that cycles through a series of content. In the instructions on how to use this feature is a note that carousels tend to be non-compliant with accessibility standards.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Cascading Style Sheets (CSS)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This describes how HTML elements are to be displayed on a screen.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>container classes<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These provide a means for arranging information on a web page. There are two types: fixed width container and container-fluid class. The proper way of addressing a Bootstrap class is with a leading period.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Hyper Text Markup Language (HTML)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the standard way for creating web pages. SHA384 hash function is used. This is beyond the scope of this textbook.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>integrity field<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a way of ensuring that the file has not been tampered with<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>JavaScript<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a scripting or programming language that supports complex features on web pages. JavaScript makes a web page dynamic.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Jumbotron<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a lightweight flexible content component that would appear at the top of a web page. This was introduced in Bootstrap 3, but dropped in Bootstrap 5.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>storyboard<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a simple representation of a design project. For a website, a storyboard would show how the website would appear and how it would behave.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>UTF-8<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This can encode all Unicode 1,112,064 character code points. It does this by using variable coding. A character could be coded between one to four bytes. This is the standard encoding for the web.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>viewport<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This tells the web page to scale based on the size of the viewing screen.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>W3.CSS<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a competing framework. It does not have as widespread usage as Bootstrap.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>wireframing<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Adding details to a storyboard.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>ASP.NET Core<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an open source and cloud-optimized web framework. This is used for developing modern web applications that can run on Windows, on Linux, and on Mac.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 15<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>controller<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is responsible for working with the model.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 15<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>CRUD<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an acronym that stands for Create, Read, Update, and Delete.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 15<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Entity Framework Core<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This contains an Object-Relational Mapping (ORM) tool that works with dates by using .NET objects.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 15<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>model<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This performs the user\u2019s requested action.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 15<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Model-View-Controller (MVC) framework<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is designed to separate the three parts of a program. This is known as the \u201cseparation of concerns.\u201d The user requests are routed to a controller that is responsible for working with the model. The model performs the user\u2019s requested action. This could be to retrieve the results from a query. The controller chooses the view for displaying the information back to the user. This approach means that the common actions can be used for routing to the user on a web page, to the user on a desktop application, or to the user on a kiosk in a shopping mall. One benefit is that developers can divide the project into different parts.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 15<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>reverse engineering<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the act of recovering design information from a source. I did not mention in the chapter that software reverse engineering is the process of recovering the design, the requirements specifications, and the functions of a product from analyzing a program\u2019s codes. There are courses and degree programs devoted to this area. A company may reverse engineer a product in order to determine how to build a better version.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 15<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the presentation to the user.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 15<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td><\/td>\r\n<td><\/td>\r\n<td><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p class=\"import-Normal\"><\/p>\r\n\r\n<h2>Alphabetical Order<\/h2>\r\n<table style=\"width: 503.3pt\">\r\n<tbody>\r\n<tr class=\"TableNormal-R\" style=\"height: 18pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\" style=\"text-align: center\"><strong>Key Term<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\" style=\"text-align: center\"><strong>Definition<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\" style=\"text-align: center\"><strong>First Appearance<\/strong><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>access<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This pertains to what can be viewed by a user.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>access control<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a method for restricting access to certain resources by certain individuals.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>access control<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a method for restricting access to certain resources by certain individuals.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>ACID<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This stands for Atomicity, Consistency, Isolation, and Durability. [This was repeated from Chapter 8.]<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>ACID<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This stands for Atomicity, Consistency, Isolation, and Durability. These behaviors are highly desirable.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 8<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>alternate key (or secondary key)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are the unselected candidate keys.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>American National Standards Institute (ANSI)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a private, non-profit organization in the United States that sets standards. It administers and coordinates the United States voluntary standards. It was founded in 1918.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>anti join<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This will return the rows that semi join had rejected.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Application Programming Interface (API)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A programming language will have objects and classes. Programmers will use these instead of creating their own block of code for a task. An example would be the SqlConnection object.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>ASP.NET Core<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an open source and cloud-optimized web framework. This is used for developing modern web applications that can run on Windows, on Linux, and on Mac.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 15<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>atom<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a building block for more complex formulae in domain relational calculus.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>atomic values<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This means that the value cannot be broken down into small pieces.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Atomicity<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A transaction is a single unit. It completes fully (Commit) or it fails (Abort).<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>attribute closure<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a set of attributes that can be functionally determined from it.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Attribute-Based Access Control (ABAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This combines features of the user\u2019s attributes such as the department or job title (RBAC like), the resource\u2019s status such as confidentiality level (MAC like) and ownership (DAC like), and the current environment such as time of access or location.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>attributes<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is information about an entity or about a relationship.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>authentication<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a way to verify the identity of a person.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>authorization<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This a way of determining whether or not that a person should be allowed to access the data or to make a change.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>binary<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The operation involves two database tables.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Bootstrap<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a framework for building responsive, mobile-first websites. Version 5 uses HTML 5, CSS, and JavaScript.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Boyce Codd Normal Form (BCNF)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This requires that a database table is in 3NF and that every functional dependency X \u00e0 Y where X is the super key of the table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Break-Glass Access Control (BGAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This permits users to bypass a regularly used access control system during an urgent situation. The name comes from the old fire alarm boxes.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>camel case<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This runs the words together. The first word has a lower-case letter and the other words start with an upper case letter. This is the formal definition. However, there are authorities that use \u201ccamel case\u201d when the intent is Pascal case.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>candidate key<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a way of converting a value to another data type.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>cardinality<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This describes the relationship between two data tables by expressing the minimum and maximum number of entity occurrences associated with one occurrence of a related entity.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>cardinality with optionality<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This describes the relationship between two data tables by expressing the minimum and maximum number of entity occurrences associated with one occurrence of a related entity. One entity could have 0, 1, or many connections in another table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>carousel<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a slideshow that cycles through a series of content. In the instructions on how to use this feature is a note that carousels tend to be non-compliant with accessibility standards.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Cartesian product<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an operation from set theory. This is also known as \u201ccross product.\u201d If we drop the requirement that a relation must be union compatible, then you could have an output that is larger than either relation. The result is a new element by combining every member tuple from one relation set with every member tuple from the other relation set.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Cascading Style Sheets (CSS)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This describes how HTML elements are to be displayed on a screen.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>cast function<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a way of converting a value to another data type.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Clark-Wilson Model<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This strives to ensure the integrity and confidentiality of data. This is different from the various access control models, which addressed only permission to access a resource.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>column<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an attribute.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>commutative<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The sequence of actions could be changed and the answer would still be the same.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>complete<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This means that when using the primary rules of the Armstrong\u2019s Axioms repeatedly for inferring other dependencies that continue until we reach a stopping point, we will have a complete set of dependencies.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>composite attribute<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an attribute that is composed of two or more pieces.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>composite key<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This uses more than one attribute to locate a record.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>concatenated<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In programming, pieces are combined or added to form a string.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>concurrency<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The ability of the database to allow multiple users access to the same record without adversely affecting transaction processing.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 1<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>concurrency control strategies<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Strategies that ensure the data access is always correct and that data integrity is maintained.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>connection string<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a series of value pairs that is needed by a program in order to access a database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Consistency<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The integrity constraints must be maintained so that the database is consistent before and after a transaction. We are ensuring that the data is correct.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>console project<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This will return the rows that semi join had rejected.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>container classes<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These provide a means for arranging information on a web page. There are two types: fixed width container and container-fluid class. The proper way of addressing a Bootstrap class is with a leading period.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Context-Based Access Control (CTAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This makes access decisions based on the context of the request such as location, device used, or the user\u2019s behavior patterns.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>controller<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is responsible for working with the model.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 15<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>CRUD<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an acronym that stands for Create, Read, Update, and Delete.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 15<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Data Control Language (DCL)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is for handling rights, permissions and other controls for a DBMS.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Data Definition Language (DDL)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is for creating a database with tables. There are commands for changing tables. See the text for the actual words.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data element<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A single fact or piece of information<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 1<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data inconsistency<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A situation where various copies of the same data are conflicting.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 1<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data independence<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The insulation between the programs and data is also called program-data independence.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data integrity<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The assurance that an organization\u2019s data is accurate, complete, and consistent at any point in its lifecycle.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data isolation<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A property that determines when and how changes made by one operation become visible to other concurrent\u00a0users and systems.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 1<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Data Manipulation Language (DML)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is for working with the actual data in a table. See the text for the actual words.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data mining<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Looking for patterns.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 2<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data models<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Tools for going from a concept to a fully working database management system.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data or data elements<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Facts that represent something in the real-world.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 2<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Data Query Language (DQL)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is for querying and analyzing data in a database. Some authorities will group these SQL commands under DML. See the text for the actual words.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data redundancy<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A situation that occurs when the same data appears in two or more locations.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 1<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data redundancy<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the situation where a piece of data is stored in two or more places.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>data type<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is how data is defined. It could be an integer, a string, a date, or something else. There are differences from DBMS to DBMS.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>database<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A shared collection of related data that is used to support the activities of a particular organization.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 2<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>database approach<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Allows the\u00a0management of large amounts of organizational information.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 1<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>database constraint or integrity constraints<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Steps that ensure that the actions of insertion, of updating, of deleting, and of other actions are done in a way that the actual data is not impacted incorrectly.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>database management software<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A powerful software tool that allows you to store, manipulate and retrieve data in a variety of ways.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 1<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>database management system (DBMS)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A collection of programs that enables users to create and to maintain databases plus provide the ability to control who and how the access is done.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 2<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>degree<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the number of columns in a table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>degree of a relationship set<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the number of different entity sets participating in a relationship set.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>deletion anomaly<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">When a database table is not well-designed, problems can arise when a row is deleted. The deleted row might contain data that does not appear elsewhere in the database table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>deprecated<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This means that the software feature is usable, but is obsolete. The practice is to state in a revision that a certain method or class or function will be removed in a future version. The word \u201cdeprecated\u201d is used in the warning.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>derived attribute<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is derived from other attributes.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Discretionary Access Control (DAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This uses the concept of resource owners. The owner created the resource. The owner decides who will have access to a resource. In addition, the owner determines what the person can do with the resource, such as read, write, or execute. With numerous owners of the numerous resources, there is no centralized office.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>division<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This operation is defined to be a relation over the attributes that consists of the set of tuples from R that match the combination of every tuple in S.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>domain<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the set of allowable values for a column.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>domain constraint<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This defines the legal values for a column.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>domain integrity (or domain constraints)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These restrict the entities in a column to a certain set of values and data types.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Domain relational calculus<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This uses variables come from the domains of the attributes.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Durability<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The changes must persist. These changes need to be written to the storage medium. So if the power is lost, the changes are present and are not lost.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>encryption<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This makes a text unreadable and thus limits the loss of data should a hacker is able to penetrate the previous layers.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>encryption<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This makes a text unreadable and thus limits the loss of data should a hacker is able to penetrate the previous layers.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>entities<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The objects or the nouns that make up a database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Entity Framework Core<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This contains an Object-Relational Mapping (ORM) tool that works with dates by using .NET objects.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 15<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Entity integrity (or entity integrity constrains)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This means that each row in a table must have some unique data. This would be the primary key. The value for a primary key could not appear twice in the same table. The value for a primary key cannot be null.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>entity integrity constraint<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This pertains to the primary key. Entity integrity constraints prevent a null or empty value from being used.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>entity or entities<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the words of Peter Chen, these are things that \u201cexists in our minds.\u201d An entity is an object in the real world with an independent existence that\u00a0can be differentiated from other objects.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>entity set<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a collection of entities. In the words of Peter Chen, an entity \u201chas the properties common to the other entities in the entity set\u2026.\u201d<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Entity-Relationship Diagram<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Peter Chen developed this tool in support of the entity-relationship model.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Entity-Relationship Diagram (ERD)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is used in relational DBMS work for modeling data.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Entity-Relationship Model<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Peter Chen developed this model in 1976. It draws upon the network model, the relational model, and entity set model. It is a more natural view of the real world. It is based on sets theory and relational theory.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>equijoin<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is like a theta join in that the equijoin operation pulls from two tables based on a condition represented by the Greek letter theta (\u03b8). But \u03b8 is the equal symbol (=).<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>existence dependency<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">An entity that dependents upon the existence of another entity. This is a weak relationship. If the linked entity is removed, then these dependent entities would go away.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>existential <\/strong><strong>quantifier <\/strong><strong>\u2203<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This means \u201cthere exists\u201d at least one instance or tuple that is true for the statement.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Extent<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a Microsoft approach to data pages. A data page is 8 KB in size. Eight data pages form one Extent.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>field<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">See column above.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Fifth normal form (5NF)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This requires that the database table is in 4NF and that a relation does not contain any join dependency and no joining actions that would experience a loss.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>file<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">See relation below.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>file-based system<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">An application program designed to manipulate data files.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 1<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>firewall<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a separator or a restrictor of network traffic.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>firewall<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a separator or a restrictor of network traffic.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>First Normal Form (1NF)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This requires that each cell contains only one value.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Fixed SQL Server Database Roles<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are predefined roles. These cannot be changed nor deleted. These roles were created during the creation of a database<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Fixed SQL Server Roles<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are predefined roles. These cannot be changed nor deleted. These roles were created during the installation of the SQL Server.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>foreign key<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a primary key appearing in another table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>foreign key<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a primary key appearing in another table. (This was covered in Chapter 3.)<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Foreign key<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is used to link from one table to another table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Fourth normal form (4NF)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This requires that the database table is in BCNF and that there ae no non-trivial multivalued dependencies.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>framework<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a more structured approach for solving a problem. The framework may have a set of guidelines or rules for completing a task.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Full outer <\/strong><strong>join (<\/strong><strong>R <\/strong><strong>\u27d7<\/strong><strong> S)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Everything from both tables plus nulls for any missing fields.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>functional dependency (FD)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a relationship between attributes such as between the PK and the non-key attributes. Something determines the other attributes. An FD is a database constraint that determines the relationship of one attribute to another attribute. FDs help to maintain the quality of data in a database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>functional dependency set (FD set)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the set of all FDs in a relation.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>functions<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are pieces of code that can restrict what is accessed<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>functions<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are built-in blocks of SQL lines for performing tasks such as obtaining the average of values in a column, counting the number of items in a column, and so on.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Graphic interface (GUI)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a means for interacting with a computer. This could involve using a mouse for clicking on menus. The opposite is a command prompt interface.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>graphic user interface (GUI)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The eye-pleasing front end to a program.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>History-Based Access Control (HBAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This looks at the history of the person.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Hyper Text Markup Language (HTML)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the standard way for creating web pages. SHA384 hash function is used. This is beyond the scope of this textbook.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Identity-Based Access Control (IBAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This grants access based on the identity of the user and on the granted credentials.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Identity-Based Access Control (IBAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This grants access based on the identity of the user and on the granted credentials.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>information<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Insights gained from pieces of data.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 2<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>insertion anomaly<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">When a database table is not well-designed, problems can arise when a new row is added. The new row might contain revised data that needs to be applied to other rows.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>instance<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a running example or session.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>integer<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A whole number.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>integrity field<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a way of ensuring that the file has not been tampered with<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>integrity rules (or integrity constraints or relational integrity constraints)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are conditions that must be present for a valid relation.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>International Organization for Standardization (ISO)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is similar to the ANSI. It was founded in 1946.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>intersection \u2229<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a set operation that does not have a counterpart in regular algebra. It extracts what is common to two database tables based on a conditional.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Isolation<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Transactions do not interfere with other transactions.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>JavaScript<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a scripting or programming language that supports complex features on web pages. JavaScript makes a web page dynamic.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>join <\/strong><strong>\u22c8<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an operation from set theory. A way of pulling from two tables. This was added to the set operators.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Jumbotron<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a lightweight flexible content component that would appear at the top of a web page. This was introduced in Bootstrap 3, but dropped in Bootstrap 5.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>kebab case<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This separates each word with the dash or hyphen character<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>key attribute<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an attribute that uniquely identifies an entity.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>key constraint<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This pertains to the primary key. The primary key must be unique.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>key constraints<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The value for a primary key cannot be used again in the same table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>key words<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are reserved words that cannot be used as variables in a SQL command.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Left outer <\/strong><strong>join (<\/strong><strong>R <\/strong><strong>\u27d5<\/strong><strong> S)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Everything from left plus any matching rows on the left with the right table plus nulls for any missing rows.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>logical access controls<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These limit connections to computer networks, system files, and data. These are provided via software and these support letting certain individuals or groups to gain access to sensitive information<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>logical access controls<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These limit connections to computer networks, system files, and data. These are provided via software and these support letting certain individuals or groups to gain access to sensitive information<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Mandatory Access Control (MAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This uses the concept of security labels. The owner creates the resource, but the owner does not decide who will have access to a resource. A hierarchical approach is used.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>mandatory relationship<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Where one entity occurrence requires a corresponding entity occurrence.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>metadata<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Data about the database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 2<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>metadata<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Defines and describes the data and relationships between the tables in the database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>model<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This performs the user\u2019s requested action.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 15<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>model<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a simplified representation of a system or of a process. It is a tool for breaking the complex into smaller and more manageable parts.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Model-View-Controller (MVC) framework<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is designed to separate the three parts of a program. This is known as the \u201cseparation of concerns.\u201d The user requests are routed to a controller that is responsible for working with the model. The model performs the user\u2019s requested action. This could be to retrieve the results from a query. The controller chooses the view for displaying the information back to the user. This approach means that the common actions can be used for routing to the user on a web page, to the user on a desktop application, or to the user on a kiosk in a shopping mall. One benefit is that developers can divide the project into different parts.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 15<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>multi-tier system<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">An arrangement that uses several servers. It divides the workload.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 2<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>multivalued attribute<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an attribute that could contain more than one entity.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>naming convention<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">An organization\u2019s approach for naming tables and columns.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>natural join<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is like a theta join that pulls from two tables, but the extra column is not included in the output and the ON key word is not used.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>NewSQL<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is different from the traditional relational DBMS. A NewSQL DBMS uses the NoSQL approach with the traditional relational DBMS. Queries are executed against the DBMS using the best approach.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 8<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>non-tangible type<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an entity that is not physical and cannot be touched.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>normalization<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Relational databases use a set of rules for eliminating data redundancy.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>normalization<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a step-by-step process for minimizing redundancy in a database. There are five normal forms.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>NoSQL<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is different from the traditional relational DBMS. Queries are executed against the DBMS using a different approach.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 8<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>null<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the absence of a user-defined value. This is not the same thing as zero.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>null<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the absence of a user-defined value. This is not the same thing as zero. (This was covered in Chapter 3.)<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Online Transaction Processing (LTP)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a type of data processing that consists of executing a number of transactions that are occurring at the same time.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>operands<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In regular algebra, these are variables or values used in an expression. In relational algebra, these are relations or variables that represent relations.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>operators<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In regular algebra, these are symbols that denote what will be done to the regular algebra operands. In relational algebra, these are the common actions that we need to do with relations in a database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>optionality<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This states whether or not an entity must be joined to another entity.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Organization-Based Access Control (<\/strong><strong>OrBCA<\/strong><strong>)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This separates the security policy from the activities that must implement a security policy.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>OUT parameter<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is used within the SQL Server environment for returning a value other than a result set. If this is being sent to the calling program, then that program would need to have an out variable declared.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>outer join<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This will return rows from two tables even if there are no matches in one of the tables. An outer join can be divided into three sub types<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>pages<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an approach for storing data in memory or on a hard drive.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Pascal case<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This runs the words together. All words start with an upper-case letter.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>permission<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is an access that is granted on a securable for a specific principal.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>permission<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is an access that is granted on a securable for a specific principal.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>permission<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This pertains to what a person or a group or a role can do.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>physical access controls<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are physical means such as fences, locked doors, and guards.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>physical access controls<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are physical means such as fences, locked doors, and guards.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Policy-Based access Control (PBAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This evaluates access rights and entitlements based on new organizational policies.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>predicate<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an expression of one or more variables for a certain domain. A predicate must have at least one object that is associated with the predicate.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>prepared statement<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a programming approach whereby values are collected and added to a specially created statement for routing to a database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>primary key<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a unique value for locating a row of data in a database table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>primary key<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a unique value for locating a row of data in a database table. (This was covered in Chapter 3.)<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 4<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>primary key<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is selected from the set of candidate keys. Recall from Chapter 3 that this was defined as a unique value for locating a row of data in a database table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>principal<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is an entity that can be authenticated.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>principal<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is an entity that can be authenticated.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Principle of Least Privilege (PLP)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This directs that users can only see what they need for their job.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Principle of Least Privilege (PLP)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This directs that users can only see what they need for their job.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>program-data independence<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">See data independence.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>projection \u03c0<\/strong><strong> (The lower case Greek letter pi)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This selects a subset of the available columns. This was added to the set operators.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Project-Join Normal Form (PJNF)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">See Fifth Normal Form.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>read and write privileges<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the ability to both read and modify a file.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>read-only permission<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the ability to read a file but not make changes.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Real-time DBMS<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a database that stores data in JSON files. All clients are synchronized in real-time with a connection to the database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 8<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>record<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">See row below.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>recursive relationship<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">See unary relationship.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>redundancy<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is when data appears in some fashion two more times in a table. This is undesirable, because it causes problems.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>referential integrity (or referential integrity constraint)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This means that if a table contains a column for foreign keys, then the linked table must have a matching value in the primary key column. That is, the value in the foreign key column must also be present in the primary key column of the linked table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>referential integrity constraint<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This refers to the linkage between two tables. If a table uses a foreign key (a primary key appearing in another table) to reference another table, then that key value must be present in that table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>regular expression<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This does a pattern match against permitted or not permitted characters.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>relation<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Formally, this is a subset of the Cartesian product of a list of domains characterized by a name. Informally, this is a relation between two entities.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>relational algebra<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This collects instances of relations as input and gives occurrences of relations as outputs. The expressions explain how to execute a query. The expressions are independent of any SQL system.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>relational calculus<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This specifies what is to be retrieved whereas relational algebra states how to obtain the results. In relational calculus, we work with tuple relational calculus and with domain relational calculus.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>relationship type<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This represents the associations between entity types.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>relationships<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the words of Peter Chen, this an \u201cassociation among entities.\u201d<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>renaming \u03f8<\/strong><strong> (The lower case Greek letter rho)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This renames the output columns. This was added to the set operators.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>result set<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">What comes back from a SQL query.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>reverse engineering<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the act of recovering design information from a source. I did not mention in the chapter that software reverse engineering is the process of recovering the design, the requirements specifications, and the functions of a product from analyzing a program\u2019s codes. There are courses and degree programs devoted to this area. A company may reverse engineer a product in order to determine how to build a better version.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 15<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Right outer <\/strong><strong>join (<\/strong><strong>R <\/strong><strong>\u27d6<\/strong><strong> S)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Everything from right plus any matching rows on the right with the left table plus nulls for any missing rows<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Risk-Adaptive Access Control (RAdAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This adjusts the access in real time based on the current risk level, users\u2019 behaviors, the network conditions, and the potential threats.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Role-Based Access Control (RBAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This uses the concept of roles for determining access.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>row<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This represents a group of related data.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Rule-Based Access Control (RAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is based on a set of predefined rules. This is similar to PBAC, except there is no governance committee creating the rules.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>safe<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The expression draws upon members of a defined domain.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Second Normal Form (2NF)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This requires that a database table is in 1NF and that each non-key attribute must be functionally dependent on the primary key.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>securable<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is a SQL Server resource that can be accessed by a principal.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>securable<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is a SQL Server resource that can be accessed by a principal.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>selection \u03c3<\/strong><strong> (The lower case Greek letter sigma)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A way of selecting tuples that satisfies a selection condition. This was added to the set operators. Do not confuse this word with the SQL key word \u201cSELECT,\u201d which lists out the desired columns in the output.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>selectivity of the condition<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The fraction of tuples selected by a selection condition.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>self join<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is when one table is treated as two tables.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>self-describing<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A database is self-describing because it not only contains the database itself, but also metadata that defines and describes the data and relationships between the tables in the database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>semijoin<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In a left outer join, you would have the desired columns from both tables. Nulls would appear in the right-hand table for missing values. A semijoin would drop the right-hand table\u2019s columns. The result would be the tuples that have a match in the second table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>set difference<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is from set theory. These are the tuples that are present in one relation, but not present in a second relation. We write this as R \u2013 S, which states that this includes all tuples that are in R, but are not in S. The two relations must be union compatibility or type compatibility.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>set operations<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are operations drawn from mathematical set theory. These are union, intersection, set difference, and Cartesian product.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Sharding<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a technique that involves splitting a large database into smaller, more manageable pieces. These pieces are known as a shard. Each shard contains a subset of the data and operates independently. This allows for horizonal scaling and improved performance.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 8<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>snake case<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a style where the words are separated by the underscore character.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>sound<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This means that for a given set of FDs that are specified for a relation schema, a person should be able infer any dependency from the FDs by using the primary rules of Armstrong\u2019s Axioms and that these will hold in every relation state of the relational schema R that satisfies the dependencies in the FDs.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Spatial data<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This represents objects in a geometric space such as points or as polygons.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 8<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>SQL injection attack<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a technique whereby a hacker can craft a SQL query that can obtain more data than wanted by the database managers.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>SQL Server Application Database Roles<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are used by an application instead of by individuals. This adds another layer of security.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>SQL Server Application Database Roles<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are used by an application instead of by individuals. This adds another layer of security.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>SQL Server Application Roles<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are used by an application instead of by individuals. The intent is to keep regular users and application users separate and safe.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>SQL Server Application Roles<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are used by an application instead of by individuals. The intent is to keep regular users and application users separate and safe.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>SQL Server Management Studio (SSMS)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Microsoft will frequently refer to their SQL Server Management Studio as \u201cSSMS.\u201d I prefer to use the long form in order to avoid abbreviation overload. \u201cSSMS\u201d will appear in the text when I am quoting information.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>SQL-92<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the foundation that many relational DBMSs use. SQL-92 is taught in many schools and is covered in many textbooks. However, since SQL-92 has 579 pages, the coverage is not complete.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>staging table<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a table that is receiving data from different sources.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Stored procedures<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These work with the actual SQL command inside the database environment.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>storyboard<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a simple representation of a design project. For a website, a storyboard would show how the website would appear and how it would behave.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Structured Query Language (SQL)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a fourth-generation programming language that is designed for working with databases and with the data in a database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>super key<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a set of one or more attributes (columns), which can uniquely identify a row in a table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>system catalogue (system catalog)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the database approach, the data structure, the databases tables, the database views, and other vital pieces of information are stored.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>table<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A combination of fields<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 2<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>table<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">See relation above.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Tabular Data Stream (TDS) protocol<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a protocol for transferring data between the client machine and the server machine.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>tangible type<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is an entity that is physical or could be touched.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>ternary<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is when more than two entity sets participate in a relation.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>theta <\/strong><strong>join \u03b8<\/strong><strong> (The lower case Greek letter theta)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This pulls from two tables based on a condition represented by the Greek letter theta (\u03b8). \u03b8 could be any one of the comparison operators.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Time-Based Access Control (TBAC)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This grants access to users based on specific timeframes.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Transact Structured Query Language or Transact-SQL (T-SQL)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is Microsoft\u2019s version of SQL with enhancements.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Transaction Control Language (TCL)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">For grouping a series of SQL commands in a package. If any of the tasks fail, then the whole group fails. There are only two results: success or failure.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>triggers<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are SQL lines that are invoked when an action takes place.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>tuple<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">See row above.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Tuple relational calculus<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This seeks to obtain those tuples that are true for a certain predicate. The variables come from the tuples of the relations.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>type compatibility<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This states that the two database tables must have the same degree and the same domain. This is the same concept as is \u201cunion compatibility.\u201d<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>unary<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This means we are working with one relation or with one database table.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>unary<\/strong><strong> relationship<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is one in which a relationship exists between occurrences of the same entity set.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 5<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>union <\/strong><strong>\u222a<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This produces the tuples that are in either Result1 or Result2 or both while removing any duplicates. In the relational database world, the two sets of tuples must be of the same type (union compatibility or type compatibility).<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>union compatibility<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This states that the two database tables must have the same degree and the same domain. This is the same concept as is \u201ctype compatibility.\u201d<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>universal <\/strong><strong>quantifier <\/strong><strong>\u2200<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This means \u201cfor all.\u201d All tuples must be true for the statement.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>unsafe<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">The expression draws upon members outside of a defined domain.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 10<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>Update anomaly<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">When a database table is not well-designed, problems can arise when a row is updated. The updated row might contain revised data that needs to be applied to other rows. This is similar to the situation of adding a new row to a database.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 7<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>user-defined integrity (or business rules)<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are unique to an organization.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 6<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>User-Defined SQL Server Database Roles<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are created to support the needs of the organization. These provide more granular control over what users may access.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>User-Defined SQL Server Roles<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">These are created to support the needs of the organization.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>UTF-8<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This can encode all Unicode 1,112,064 character code points. It does this by using variable coding. A character could be coded between one to four bytes. This is the standard encoding for the web.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the context of Microsoft usage, this limits what a person can see and can do.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 11<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">In the context of Microsoft usage, this limits what a person can see and can do.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 12<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a virtual table that is the result of a query.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 13<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the presentation to the user.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 15<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">A subset of the database that is defined and dedicated for a particular set of users.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>viewport<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This tells the web page to scale based on the size of the viewing screen.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>W3.CSS<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a competing framework. It does not have as widespread usage as Bootstrap.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>wildcard<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is a space holder for one or more characters. The asterisk is a very common wildcard.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 9<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>wireframing<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Adding details to a storyboard.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 14<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\"><strong>write permission<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">This is the ability to make changes to a file or to a resource.<\/p>\r\n<\/td>\r\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\r\n<p class=\"import-Normal\">Chapter 3<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td><\/td>\r\n<td><\/td>\r\n<td><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p class=\"import-Normal\"><\/p>\r\n\r\n<\/div>","rendered":"<div class=\"glossary\">\n<p class=\"import-Normal\">The first section is in appearance order by chapter, then by alphabetical order. The second section is in alphabetical order. Some key terms were repeated. In the fourth edition, this will be reviewed.<\/p>\n<h2>Appearance Order by Chapter<\/h2>\n<table style=\"width: 503.55pt\">\n<tbody>\n<tr class=\"TableNormal-R\" style=\"height: 18pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\" style=\"text-align: center\"><strong>Key Term<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\" style=\"text-align: center\"><strong>Definition<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\" style=\"text-align: center\"><strong>First Appearance<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>concurrency<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The ability of the database to allow multiple users access to the same record without adversely affecting transaction processing.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 1<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data element<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A single fact or piece of information<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 1<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data inconsistency<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A situation where various copies of the same data are conflicting.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 1<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data isolation<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A property that determines when and how changes made by one operation become visible to other concurrent\u00a0users and systems.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 1<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data redundancy<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A situation that occurs when the same data appears in two or more locations.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 1<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>database approach<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Allows the\u00a0management of large amounts of organizational information.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 1<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>database management software<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A powerful software tool that allows you to store, manipulate and retrieve data in a variety of ways.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 1<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>file-based system<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">An application program designed to manipulate data files.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 1<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data or data elements<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Facts that represent something in the real-world.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 2<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data mining<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Looking for patterns.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 2<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>database<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A shared collection of related data that is used to support the activities of a particular organization.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 2<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>database management system (DBMS)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A collection of programs that enables users to create and to maintain databases plus provide the ability to control who and how the access is done.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 2<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>information<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Insights gained from pieces of data.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 2<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>metadata<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Data about the database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 2<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>multi-tier system<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">An arrangement that uses several servers. It divides the workload.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 2<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>table<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A combination of fields<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 2<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>access<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This pertains to what can be viewed by a user.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>concurrency control strategies<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Strategies that ensure the data access is always correct and that data integrity is maintained.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data independence<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The insulation between the programs and data is also called program-data independence.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data integrity<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The assurance that an organization\u2019s data is accurate, complete, and consistent at any point in its lifecycle.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data redundancy<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the situation where a piece of data is stored in two or more places.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>database constraint or integrity constraints<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Steps that ensure that the actions of insertion, of updating, of deleting, and of other actions are done in a way that the actual data is not impacted incorrectly.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>domain constraint<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This defines the legal values for a column.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>entity integrity constraint<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This pertains to the primary key. Entity integrity constraints prevent a null or empty value from being used.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>foreign key<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a primary key appearing in another table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>key constraint<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This pertains to the primary key. The primary key must be unique.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>metadata<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Defines and describes the data and relationships between the tables in the database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>normalization<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Relational databases use a set of rules for eliminating data redundancy.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>null<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the absence of a user-defined value. This is not the same thing as zero.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>permission<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This pertains to what a person or a group or a role can do.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>primary key<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a unique value for locating a row of data in a database table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>program-data independence<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">See data independence.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>read and write privileges<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the ability to both read and modify a file.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>read-only permission<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the ability to read a file but not make changes.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>referential integrity constraint<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This refers to the linkage between two tables. If a table uses a foreign key (a primary key appearing in another table) to reference another table, then that key value must be present in that table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>self-describing<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A database is self-describing because it not only contains the database itself, but also metadata that defines and describes the data and relationships between the tables in the database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>system catalogue (system catalog)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the database approach, the data structure, the databases tables, the database views, and other vital pieces of information are stored.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A subset of the database that is defined and dedicated for a particular set of users.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>write permission<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the ability to make changes to a file or to a resource.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data type<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is how data is defined. It could be an integer, a string, a date, or something else. There are differences from DBMS to DBMS.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data models<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Tools for going from a concept to a fully working database management system.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>entities<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The objects or the nouns that make up a database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Entity-Relationship Diagram (ERD)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is used in relational DBMS work for modeling data.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>framework<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a more structured approach for solving a problem. The framework may have a set of guidelines or rules for completing a task.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>integer<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A whole number.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>model<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a simplified representation of a system or of a process. It is a tool for breaking the complex into smaller and more manageable parts.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>foreign key<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a primary key appearing in another table. (This was covered in Chapter 3.)<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>null<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the absence of a user-defined value. This is not the same thing as zero. (This was covered in Chapter 3.)<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>primary key<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a unique value for locating a row of data in a database table. (This was covered in Chapter 3.)<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>alternate key (or secondary key)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are the unselected candidate keys.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>atomic values<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This means that the value cannot be broken down into small pieces.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>attributes<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is information about an entity or about a relationship.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>cast function<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a way of converting a value to another data type.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>candidate key<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a way of converting a value to another data type.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>column<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an attribute.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>composite attribute<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an attribute that is composed of two or more pieces.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>composite key<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This uses more than one attribute to locate a record.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>degree<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the number of columns in a table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>degree of a relationship set<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the number of different entity sets participating in a relationship set.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>derived attribute<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is derived from other attributes.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>domain<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the set of allowable values for a column.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>entity or entities<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the words of Peter Chen, these are things that \u201cexists in our minds.\u201d An entity is an object in the real world with an independent existence that\u00a0can be differentiated from other objects.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Entity-Relationship Diagram<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Peter Chen developed this tool in support of the entity-relationship model.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Entity-Relationship Model<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Peter Chen developed this model in 1976. It draws upon the network model, the relational model, and entity set model. It is a more natural view of the real world. It is based on sets theory and relational theory.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>entity set<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a collection of entities. In the words of Peter Chen, an entity \u201chas the properties common to the other entities in the entity set\u2026.\u201d<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>existence dependency<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">An entity that dependents upon the existence of another entity. This is a weak relationship. If the linked entity is removed, then these dependent entities would go away.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>field<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">See column above.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>file<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">See relation below.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Foreign key<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is used to link from one table to another table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>key attribute<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an attribute that uniquely identifies an entity.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>multivalued attribute<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an attribute that could contain more than one entity.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>non-tangible type<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an entity that is not physical and cannot be touched.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>primary key<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is selected from the set of candidate keys. Recall from Chapter 3 that this was defined as a unique value for locating a row of data in a database table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>relation<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Formally, this is a subset of the Cartesian product of a list of domains characterized by a name. Informally, this is a relation between two entities.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>relationship type<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This represents the associations between entity types.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>relationships<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the words of Peter Chen, this an \u201cassociation among entities.\u201d<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>record<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">See row below.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>recursive relationship<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">See unary relationship.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>row<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This represents a group of related data.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>staging table<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a table that is receiving data from different sources.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>super key<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a set of one or more attributes (columns), which can uniquely identify a row in a table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>table<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">See relation above.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>tangible type<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an entity that is physical or could be touched.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>ternary<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is when more than two entity sets participate in a relation.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>tuple<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">See row above.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>unary<\/strong><strong> relationship<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is one in which a relationship exists between occurrences of the same entity set.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>camel case<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This runs the words together. The first word has a lower-case letter and the other words start with an upper case letter. This is the formal definition. However, there are authorities that use \u201ccamel case\u201d when the intent is Pascal case.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>cardinality<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This describes the relationship between two data tables by expressing the minimum and maximum number of entity occurrences associated with one occurrence of a related entity.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>cardinality with optionality<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This describes the relationship between two data tables by expressing the minimum and maximum number of entity occurrences associated with one occurrence of a related entity. One entity could have 0, 1, or many connections in another table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>domain integrity (or domain constraints)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These restrict the entities in a column to a certain set of values and data types.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>integrity rules (or integrity constraints or relational integrity constraints)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are conditions that must be present for a valid relation.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Entity integrity (or entity integrity constrains)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This means that each row in a table must have some unique data. This would be the primary key. The value for a primary key could not appear twice in the same table. The value for a primary key cannot be null.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>kebab case<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This separates each word with the dash or hyphen character<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>key constraints<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The value for a primary key cannot be used again in the same table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>mandatory relationship<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Where one entity occurrence requires a corresponding entity occurrence.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>naming convention<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">An organization\u2019s approach for naming tables and columns.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>optionality<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This states whether or not an entity must be joined to another entity.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Pascal case<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This runs the words together. All words start with an upper-case letter.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>referential integrity (or referential integrity constraint)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This means that if a table contains a column for foreign keys, then the linked table must have a matching value in the primary key column. That is, the value in the foreign key column must also be present in the primary key column of the linked table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>snake case<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a style where the words are separated by the underscore character.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>user-defined integrity (or business rules)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are unique to an organization.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>attribute closure<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a set of attributes that can be functionally determined from it.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Boyce Codd Normal Form (BCNF)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This requires that a database table is in 3NF and that every functional dependency X \u00e0 Y where X is the super key of the table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>complete<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This means that when using the primary rules of the Armstrong\u2019s Axioms repeatedly for inferring other dependencies that continue until we reach a stopping point, we will have a complete set of dependencies.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>deletion anomaly<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">When a database table is not well-designed, problems can arise when a row is deleted. The deleted row might contain data that does not appear elsewhere in the database table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>First Normal Form (1NF)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This requires that each cell contains only one value.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Fifth normal form (5NF)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This requires that the database table is in 4NF and that a relation does not contain any join dependency and no joining actions that would experience a loss.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Fourth normal form (4NF)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This requires that the database table is in BCNF and that there ae no non-trivial multivalued dependencies.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>functional dependency (FD)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a relationship between attributes such as between the PK and the non-key attributes. Something determines the other attributes. An FD is a database constraint that determines the relationship of one attribute to another attribute. FDs help to maintain the quality of data in a database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>functional dependency set (FD set)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the set of all FDs in a relation.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>insertion anomaly<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">When a database table is not well-designed, problems can arise when a new row is added. The new row might contain revised data that needs to be applied to other rows.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>normalization<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a step-by-step process for minimizing redundancy in a database. There are five normal forms.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Project-Join Normal Form (PJNF)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">See Fifth Normal Form.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>redundancy<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is when data appears in some fashion two more times in a table. This is undesirable, because it causes problems.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Second Normal Form (2NF)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This requires that a database table is in 1NF and that each non-key attribute must be functionally dependent on the primary key.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>sound<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This means that for a given set of FDs that are specified for a relation schema, a person should be able infer any dependency from the FDs by using the primary rules of Armstrong\u2019s Axioms and that these will hold in every relation state of the relational schema R that satisfies the dependencies in the FDs.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Update anomaly<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">When a database table is not well-designed, problems can arise when a row is updated. The updated row might contain revised data that needs to be applied to other rows. This is similar to the situation of adding a new row to a database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>ACID<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This stands for Atomicity, Consistency, Isolation, and Durability. These behaviors are highly desirable.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 8<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>NewSQL<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is different from the traditional relational DBMS. A NewSQL DBMS uses the NoSQL approach with the traditional relational DBMS. Queries are executed against the DBMS using the best approach.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 8<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>NoSQL<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is different from the traditional relational DBMS. Queries are executed against the DBMS using a different approach.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 8<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Real-time DBMS<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a database that stores data in JSON files. All clients are synchronized in real-time with a connection to the database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 8<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Sharding<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a technique that involves splitting a large database into smaller, more manageable pieces. These pieces are known as a shard. Each shard contains a subset of the data and operates independently. This allows for horizonal scaling and improved performance.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 8<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Spatial data<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This represents objects in a geometric space such as points or as polygons.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 8<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>American National Standards Institute (ANSI)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a private, non-profit organization in the United States that sets standards. It administers and coordinates the United States voluntary standards. It was founded in 1918.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Data Control Language (DCL)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is for handling rights, permissions and other controls for a DBMS.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Data Definition Language (DDL)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is for creating a database with tables. There are commands for changing tables. See the text for the actual words.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Data Manipulation Language (DML)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is for working with the actual data in a table. See the text for the actual words.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Data Query Language (DQL)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is for querying and analyzing data in a database. Some authorities will group these SQL commands under DML. See the text for the actual words.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Graphic interface (GUI)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a means for interacting with a computer. This could involve using a mouse for clicking on menus. The opposite is a command prompt interface.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>International Organization for Standardization (ISO)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is similar to the ANSI. It was founded in 1946.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>key words<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are reserved words that cannot be used as variables in a SQL command.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Online Transaction Processing (LTP)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a type of data processing that consists of executing a number of transactions that are occurring at the same time.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>SQL-92<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the foundation that many relational DBMSs use. SQL-92 is taught in many schools and is covered in many textbooks. However, since SQL-92 has 579 pages, the coverage is not complete.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>SQL Server Management Studio (SSMS)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Microsoft will frequently refer to their SQL Server Management Studio as \u201cSSMS.\u201d I prefer to use the long form in order to avoid abbreviation overload. \u201cSSMS\u201d will appear in the text when I am quoting information.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Structured Query Language (SQL)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a fourth-generation programming language that is designed for working with databases and with the data in a database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Transact Structured Query Language or Transact-SQL (T-SQL)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is Microsoft\u2019s version of SQL with enhancements.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Transaction Control Language (TCL)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">For grouping a series of SQL commands in a package. If any of the tasks fail, then the whole group fails. There are only two results: success or failure.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>wildcard<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a space holder for one or more characters. The asterisk is a very common wildcard.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>anti join<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This will return the rows that semi join had rejected.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>atom<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a building block for more complex formulae in domain relational calculus.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>binary<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The operation involves two database tables.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Cartesian product<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an operation from set theory. This is also known as \u201ccross product.\u201d If we drop the requirement that a relation must be union compatible, then you could have an output that is larger than either relation. The result is a new element by combining every member tuple from one relation set with every member tuple from the other relation set.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>commutative<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The sequence of actions could be changed and the answer would still be the same.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>division<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This operation is defined to be a relation over the attributes that consists of the set of tuples from R that match the combination of every tuple in S.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>equijoin<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is like a theta join in that the equijoin operation pulls from two tables based on a condition represented by the Greek letter theta (\u03b8). But \u03b8 is the equal symbol (=).<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>existential <\/strong><strong>quantifier <\/strong><strong>\u2203<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This means \u201cthere exists\u201d at least one instance or tuple that is true for the statement.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>intersection \u2229<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a set operation that does not have a counterpart in regular algebra. It extracts what is common to two database tables based on a conditional.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>join <\/strong><strong>\u22c8<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an operation from set theory. A way of pulling from two tables. This was added to the set operators.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>natural join<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is like a theta join that pulls from two tables, but the extra column is not included in the output and the ON key word is not used.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>operands<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In regular algebra, these are variables or values used in an expression. In relational algebra, these are relations or variables that represent relations.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>operators<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In regular algebra, these are symbols that denote what will be done to the regular algebra operands. In relational algebra, these are the common actions that we need to do with relations in a database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>outer join<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This will return rows from two tables even if there are no matches in one of the tables. An outer join can be divided into three sub types<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>predicate<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an expression of one or more variables for a certain domain. A predicate must have at least one object that is associated with the predicate.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>projection \u03c0<\/strong><strong> (The lower case Greek letter pi)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This selects a subset of the available columns. This was added to the set operators.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>relational algebra<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This collects instances of relations as input and gives occurrences of relations as outputs. The expressions explain how to execute a query. The expressions are independent of any SQL system.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>relational calculus<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This specifies what is to be retrieved whereas relational algebra states how to obtain the results. In relational calculus, we work with tuple relational calculus and with domain relational calculus.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>renaming \u03f8<\/strong><strong> (The lower case Greek letter rho)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This renames the output columns. This was added to the set operators.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>safe<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The expression draws upon members of a defined domain.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>self join<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is when one table is treated as two tables.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>selection \u03c3<\/strong><strong> (The lower case Greek letter sigma)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A way of selecting tuples that satisfies a selection condition. This was added to the set operators. Do not confuse this word with the SQL key word \u201cSELECT,\u201d which lists out the desired columns in the output.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>selectivity of the condition<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The fraction of tuples selected by a selection condition.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>semijoin<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In a left outer join, you would have the desired columns from both tables. Nulls would appear in the right-hand table for missing values. A semijoin would drop the right-hand table\u2019s columns. The result would be the tuples that have a match in the second table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>set difference<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is from set theory. These are the tuples that are present in one relation, but not present in a second relation. We write this as R \u2013 S, which states that this includes all tuples that are in R, but are not in S. The two relations must be union compatibility or type compatibility.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>set operations<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are operations drawn from mathematical set theory. These are union, intersection, set difference, and Cartesian product.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>theta <\/strong><strong>join \u03b8<\/strong><strong> (The lower case Greek letter theta)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This pulls from two tables based on a condition represented by the Greek letter theta (\u03b8). \u03b8 could be any one of the comparison operators.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>type compatibility<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This states that the two database tables must have the same degree and the same domain. This is the same concept as is \u201cunion compatibility.\u201d<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>unary<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This means we are working with one relation or with one database table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>union <\/strong><strong>\u222a<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This produces the tuples that are in either Result1 or Result2 or both while removing any duplicates. In the relational database world, the two sets of tuples must be of the same type (union compatibility or type compatibility).<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>union compatibility<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This states that the two database tables must have the same degree and the same domain. This is the same concept as is \u201ctype compatibility.\u201d<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>universal <\/strong><strong>quantifier <\/strong><strong>\u2200<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This means \u201cfor all.\u201d All tuples must be true for the statement.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>unsafe<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The expression draws upon members outside of a defined domain.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Left outer <\/strong><strong>join (<\/strong><strong>R <\/strong><strong>\u27d5<\/strong><strong> S)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Everything from left plus any matching rows on the left with the right table plus nulls for any missing rows.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Right outer <\/strong><strong>join (<\/strong><strong>R <\/strong><strong>\u27d6<\/strong><strong> S)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Everything from right plus any matching rows on the right with the left table plus nulls for any missing rows<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Full outer <\/strong><strong>join (<\/strong><strong>R <\/strong><strong>\u27d7<\/strong><strong> S)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Everything from both tables plus nulls for any missing fields.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Tuple relational calculus<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This seeks to obtain those tuples that are true for a certain predicate. The variables come from the tuples of the relations.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Domain relational calculus<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This uses variables come from the domains of the attributes.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>access control<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a method for restricting access to certain resources by certain individuals.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>ACID<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This stands for Atomicity, Consistency, Isolation, and Durability. [This was repeated from Chapter 8.]<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Atomicity<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A transaction is a single unit. It completes fully (Commit) or it fails (Abort).<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>authentication<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a way to verify the identity of a person.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>authorization<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This a way of determining whether or not that a person should be allowed to access the data or to make a change.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Consistency<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The integrity constraints must be maintained so that the database is consistent before and after a transaction. We are ensuring that the data is correct.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Durability<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The changes must persist. These changes need to be written to the storage medium. So if the power is lost, the changes are present and are not lost.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>encryption<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This makes a text unreadable and thus limits the loss of data should a hacker is able to penetrate the previous layers.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Extent<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a Microsoft approach to data pages. A data page is 8 KB in size. Eight data pages form one Extent.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>firewall<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a separator or a restrictor of network traffic.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Identity-Based Access Control (IBAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This grants access based on the identity of the user and on the granted credentials.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Isolation<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Transactions do not interfere with other transactions.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>logical access controls<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These limit connections to computer networks, system files, and data. These are provided via software and these support letting certain individuals or groups to gain access to sensitive information<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>pages<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an approach for storing data in memory or on a hard drive.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>permission<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is an access that is granted on a securable for a specific principal.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>physical access controls<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are physical means such as fences, locked doors, and guards.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>principal<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is an entity that can be authenticated.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Principle of Least Privilege (PLP)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This directs that users can only see what they need for their job.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>securable<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is a SQL Server resource that can be accessed by a principal.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>SQL Server Application Database Roles<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are used by an application instead of by individuals. This adds another layer of security.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>SQL Server Application Roles<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are used by an application instead of by individuals. The intent is to keep regular users and application users separate and safe.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Tabular Data Stream (TDS) protocol<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a protocol for transferring data between the client machine and the server machine.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the context of Microsoft usage, this limits what a person can see and can do.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>access control<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a method for restricting access to certain resources by certain individuals.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Attribute-Based Access Control (ABAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This combines features of the user\u2019s attributes such as the department or job title (RBAC like), the resource\u2019s status such as confidentiality level (MAC like) and ownership (DAC like), and the current environment such as time of access or location.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Break-Glass Access Control (BGAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This permits users to bypass a regularly used access control system during an urgent situation. The name comes from the old fire alarm boxes.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Clark-Wilson Model<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This strives to ensure the integrity and confidentiality of data. This is different from the various access control models, which addressed only permission to access a resource.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Context-Based Access Control (CTAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This makes access decisions based on the context of the request such as location, device used, or the user\u2019s behavior patterns.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Discretionary Access Control (DAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This uses the concept of resource owners. The owner created the resource. The owner decides who will have access to a resource. In addition, the owner determines what the person can do with the resource, such as read, write, or execute. With numerous owners of the numerous resources, there is no centralized office.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>encryption<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This makes a text unreadable and thus limits the loss of data should a hacker is able to penetrate the previous layers.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>firewall<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a separator or a restrictor of network traffic.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Fixed SQL Server Database Roles<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are predefined roles. These cannot be changed nor deleted. These roles were created during the creation of a database<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Fixed SQL Server Roles<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are predefined roles. These cannot be changed nor deleted. These roles were created during the installation of the SQL Server.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>History-Based Access Control (HBAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This looks at the history of the person.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>functions<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are pieces of code that can restrict what is accessed<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Identity-Based Access Control (IBAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This grants access based on the identity of the user and on the granted credentials.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>logical access controls<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These limit connections to computer networks, system files, and data. These are provided via software and these support letting certain individuals or groups to gain access to sensitive information<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Mandatory Access Control (MAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This uses the concept of security labels. The owner creates the resource, but the owner does not decide who will have access to a resource. A hierarchical approach is used.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Organization-Based Access Control (<\/strong><strong>OrBCA<\/strong><strong>)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This separates the security policy from the activities that must implement a security policy.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>permission<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is an access that is granted on a securable for a specific principal.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>physical access controls<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are physical means such as fences, locked doors, and guards.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Policy-Based access Control (PBAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This evaluates access rights and entitlements based on new organizational policies.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>principal<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is an entity that can be authenticated.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Principle of Least Privilege (PLP)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This directs that users can only see what they need for their job.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Risk-Adaptive Access Control (RAdAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This adjusts the access in real time based on the current risk level, users\u2019 behaviors, the network conditions, and the potential threats.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Role-Based Access Control (RBAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This uses the concept of roles for determining access.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Rule-Based Access Control (RAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is based on a set of predefined rules. This is similar to PBAC, except there is no governance committee creating the rules.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>securable<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is a SQL Server resource that can be accessed by a principal.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>SQL Server Application Database Roles<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are used by an application instead of by individuals. This adds another layer of security.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>SQL Server Application Roles<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are used by an application instead of by individuals. The intent is to keep regular users and application users separate and safe.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Time-Based Access Control (TBAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This grants access to users based on specific timeframes.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>User-Defined SQL Server Database Roles<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are created to support the needs of the organization. These provide more granular control over what users may access.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>User-Defined SQL Server Roles<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are created to support the needs of the organization.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the context of Microsoft usage, this limits what a person can see and can do.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Application Programming Interface (API)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A programming language will have objects and classes. Programmers will use these instead of creating their own block of code for a task. An example would be the SqlConnection object.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>concatenated<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In programming, pieces are combined or added to form a string.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>connection string<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a series of value pairs that is needed by a program in order to access a database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>console project<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This will return the rows that semi join had rejected.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>deprecated<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This means that the software feature is usable, but is obsolete. The practice is to state in a revision that a certain method or class or function will be removed in a future version. The word \u201cdeprecated\u201d is used in the warning.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>functions<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are built-in blocks of SQL lines for performing tasks such as obtaining the average of values in a column, counting the number of items in a column, and so on.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>graphic user interface (GUI)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The eye-pleasing front end to a program.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>instance<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a running example or session.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>OUT parameter<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is used within the SQL Server environment for returning a value other than a result set. If this is being sent to the calling program, then that program would need to have an out variable declared.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>prepared statement<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a programming approach whereby values are collected and added to a specially created statement for routing to a database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>regular expression<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This does a pattern match against permitted or not permitted characters.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>result set<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">What comes back from a SQL query.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>SQL injection attack<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a technique whereby a hacker can craft a SQL query that can obtain more data than wanted by the database managers.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Stored procedures<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These work with the actual SQL command inside the database environment.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>triggers<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are SQL lines that are invoked when an action takes place.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a virtual table that is the result of a query.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Bootstrap<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a framework for building responsive, mobile-first websites. Version 5 uses HTML 5, CSS, and JavaScript.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>carousel<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a slideshow that cycles through a series of content. In the instructions on how to use this feature is a note that carousels tend to be non-compliant with accessibility standards.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Cascading Style Sheets (CSS)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This describes how HTML elements are to be displayed on a screen.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>container classes<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These provide a means for arranging information on a web page. There are two types: fixed width container and container-fluid class. The proper way of addressing a Bootstrap class is with a leading period.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Hyper Text Markup Language (HTML)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the standard way for creating web pages. SHA384 hash function is used. This is beyond the scope of this textbook.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>integrity field<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a way of ensuring that the file has not been tampered with<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>JavaScript<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a scripting or programming language that supports complex features on web pages. JavaScript makes a web page dynamic.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Jumbotron<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a lightweight flexible content component that would appear at the top of a web page. This was introduced in Bootstrap 3, but dropped in Bootstrap 5.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>storyboard<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a simple representation of a design project. For a website, a storyboard would show how the website would appear and how it would behave.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>UTF-8<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This can encode all Unicode 1,112,064 character code points. It does this by using variable coding. A character could be coded between one to four bytes. This is the standard encoding for the web.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>viewport<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This tells the web page to scale based on the size of the viewing screen.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>W3.CSS<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a competing framework. It does not have as widespread usage as Bootstrap.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>wireframing<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Adding details to a storyboard.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>ASP.NET Core<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an open source and cloud-optimized web framework. This is used for developing modern web applications that can run on Windows, on Linux, and on Mac.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 15<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>controller<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is responsible for working with the model.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 15<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>CRUD<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an acronym that stands for Create, Read, Update, and Delete.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 15<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Entity Framework Core<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This contains an Object-Relational Mapping (ORM) tool that works with dates by using .NET objects.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 15<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>model<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This performs the user\u2019s requested action.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 15<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Model-View-Controller (MVC) framework<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is designed to separate the three parts of a program. This is known as the \u201cseparation of concerns.\u201d The user requests are routed to a controller that is responsible for working with the model. The model performs the user\u2019s requested action. This could be to retrieve the results from a query. The controller chooses the view for displaying the information back to the user. This approach means that the common actions can be used for routing to the user on a web page, to the user on a desktop application, or to the user on a kiosk in a shopping mall. One benefit is that developers can divide the project into different parts.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 15<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>reverse engineering<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the act of recovering design information from a source. I did not mention in the chapter that software reverse engineering is the process of recovering the design, the requirements specifications, and the functions of a product from analyzing a program\u2019s codes. There are courses and degree programs devoted to this area. A company may reverse engineer a product in order to determine how to build a better version.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 15<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the presentation to the user.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 15<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"import-Normal\">\n<h2>Alphabetical Order<\/h2>\n<table style=\"width: 503.3pt\">\n<tbody>\n<tr class=\"TableNormal-R\" style=\"height: 18pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\" style=\"text-align: center\"><strong>Key Term<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\" style=\"text-align: center\"><strong>Definition<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\" style=\"text-align: center\"><strong>First Appearance<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>access<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This pertains to what can be viewed by a user.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>access control<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a method for restricting access to certain resources by certain individuals.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>access control<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a method for restricting access to certain resources by certain individuals.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>ACID<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This stands for Atomicity, Consistency, Isolation, and Durability. [This was repeated from Chapter 8.]<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>ACID<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This stands for Atomicity, Consistency, Isolation, and Durability. These behaviors are highly desirable.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 8<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>alternate key (or secondary key)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are the unselected candidate keys.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>American National Standards Institute (ANSI)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a private, non-profit organization in the United States that sets standards. It administers and coordinates the United States voluntary standards. It was founded in 1918.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>anti join<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This will return the rows that semi join had rejected.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Application Programming Interface (API)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A programming language will have objects and classes. Programmers will use these instead of creating their own block of code for a task. An example would be the SqlConnection object.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>ASP.NET Core<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an open source and cloud-optimized web framework. This is used for developing modern web applications that can run on Windows, on Linux, and on Mac.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 15<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>atom<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a building block for more complex formulae in domain relational calculus.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>atomic values<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This means that the value cannot be broken down into small pieces.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Atomicity<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A transaction is a single unit. It completes fully (Commit) or it fails (Abort).<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>attribute closure<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a set of attributes that can be functionally determined from it.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Attribute-Based Access Control (ABAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This combines features of the user\u2019s attributes such as the department or job title (RBAC like), the resource\u2019s status such as confidentiality level (MAC like) and ownership (DAC like), and the current environment such as time of access or location.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>attributes<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is information about an entity or about a relationship.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>authentication<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a way to verify the identity of a person.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>authorization<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This a way of determining whether or not that a person should be allowed to access the data or to make a change.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>binary<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The operation involves two database tables.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Bootstrap<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a framework for building responsive, mobile-first websites. Version 5 uses HTML 5, CSS, and JavaScript.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Boyce Codd Normal Form (BCNF)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This requires that a database table is in 3NF and that every functional dependency X \u00e0 Y where X is the super key of the table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Break-Glass Access Control (BGAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This permits users to bypass a regularly used access control system during an urgent situation. The name comes from the old fire alarm boxes.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>camel case<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This runs the words together. The first word has a lower-case letter and the other words start with an upper case letter. This is the formal definition. However, there are authorities that use \u201ccamel case\u201d when the intent is Pascal case.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>candidate key<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a way of converting a value to another data type.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>cardinality<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This describes the relationship between two data tables by expressing the minimum and maximum number of entity occurrences associated with one occurrence of a related entity.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>cardinality with optionality<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This describes the relationship between two data tables by expressing the minimum and maximum number of entity occurrences associated with one occurrence of a related entity. One entity could have 0, 1, or many connections in another table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>carousel<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a slideshow that cycles through a series of content. In the instructions on how to use this feature is a note that carousels tend to be non-compliant with accessibility standards.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Cartesian product<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an operation from set theory. This is also known as \u201ccross product.\u201d If we drop the requirement that a relation must be union compatible, then you could have an output that is larger than either relation. The result is a new element by combining every member tuple from one relation set with every member tuple from the other relation set.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Cascading Style Sheets (CSS)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This describes how HTML elements are to be displayed on a screen.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>cast function<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a way of converting a value to another data type.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Clark-Wilson Model<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This strives to ensure the integrity and confidentiality of data. This is different from the various access control models, which addressed only permission to access a resource.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>column<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an attribute.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>commutative<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The sequence of actions could be changed and the answer would still be the same.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>complete<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This means that when using the primary rules of the Armstrong\u2019s Axioms repeatedly for inferring other dependencies that continue until we reach a stopping point, we will have a complete set of dependencies.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>composite attribute<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an attribute that is composed of two or more pieces.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>composite key<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This uses more than one attribute to locate a record.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>concatenated<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In programming, pieces are combined or added to form a string.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>concurrency<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The ability of the database to allow multiple users access to the same record without adversely affecting transaction processing.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 1<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>concurrency control strategies<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Strategies that ensure the data access is always correct and that data integrity is maintained.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>connection string<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a series of value pairs that is needed by a program in order to access a database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Consistency<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The integrity constraints must be maintained so that the database is consistent before and after a transaction. We are ensuring that the data is correct.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>console project<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This will return the rows that semi join had rejected.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>container classes<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These provide a means for arranging information on a web page. There are two types: fixed width container and container-fluid class. The proper way of addressing a Bootstrap class is with a leading period.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Context-Based Access Control (CTAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This makes access decisions based on the context of the request such as location, device used, or the user\u2019s behavior patterns.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>controller<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is responsible for working with the model.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 15<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>CRUD<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an acronym that stands for Create, Read, Update, and Delete.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 15<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Data Control Language (DCL)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is for handling rights, permissions and other controls for a DBMS.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Data Definition Language (DDL)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is for creating a database with tables. There are commands for changing tables. See the text for the actual words.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data element<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A single fact or piece of information<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 1<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data inconsistency<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A situation where various copies of the same data are conflicting.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 1<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data independence<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The insulation between the programs and data is also called program-data independence.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data integrity<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The assurance that an organization\u2019s data is accurate, complete, and consistent at any point in its lifecycle.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data isolation<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A property that determines when and how changes made by one operation become visible to other concurrent\u00a0users and systems.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 1<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Data Manipulation Language (DML)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is for working with the actual data in a table. See the text for the actual words.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data mining<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Looking for patterns.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 2<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data models<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Tools for going from a concept to a fully working database management system.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data or data elements<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Facts that represent something in the real-world.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 2<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Data Query Language (DQL)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is for querying and analyzing data in a database. Some authorities will group these SQL commands under DML. See the text for the actual words.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data redundancy<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A situation that occurs when the same data appears in two or more locations.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 1<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data redundancy<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the situation where a piece of data is stored in two or more places.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>data type<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is how data is defined. It could be an integer, a string, a date, or something else. There are differences from DBMS to DBMS.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>database<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A shared collection of related data that is used to support the activities of a particular organization.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 2<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>database approach<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Allows the\u00a0management of large amounts of organizational information.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 1<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>database constraint or integrity constraints<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Steps that ensure that the actions of insertion, of updating, of deleting, and of other actions are done in a way that the actual data is not impacted incorrectly.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>database management software<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A powerful software tool that allows you to store, manipulate and retrieve data in a variety of ways.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 1<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>database management system (DBMS)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A collection of programs that enables users to create and to maintain databases plus provide the ability to control who and how the access is done.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 2<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>degree<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the number of columns in a table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>degree of a relationship set<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the number of different entity sets participating in a relationship set.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>deletion anomaly<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">When a database table is not well-designed, problems can arise when a row is deleted. The deleted row might contain data that does not appear elsewhere in the database table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>deprecated<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This means that the software feature is usable, but is obsolete. The practice is to state in a revision that a certain method or class or function will be removed in a future version. The word \u201cdeprecated\u201d is used in the warning.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>derived attribute<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is derived from other attributes.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Discretionary Access Control (DAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This uses the concept of resource owners. The owner created the resource. The owner decides who will have access to a resource. In addition, the owner determines what the person can do with the resource, such as read, write, or execute. With numerous owners of the numerous resources, there is no centralized office.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>division<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This operation is defined to be a relation over the attributes that consists of the set of tuples from R that match the combination of every tuple in S.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>domain<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the set of allowable values for a column.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>domain constraint<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This defines the legal values for a column.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>domain integrity (or domain constraints)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These restrict the entities in a column to a certain set of values and data types.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Domain relational calculus<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This uses variables come from the domains of the attributes.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Durability<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The changes must persist. These changes need to be written to the storage medium. So if the power is lost, the changes are present and are not lost.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>encryption<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This makes a text unreadable and thus limits the loss of data should a hacker is able to penetrate the previous layers.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>encryption<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This makes a text unreadable and thus limits the loss of data should a hacker is able to penetrate the previous layers.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>entities<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The objects or the nouns that make up a database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Entity Framework Core<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This contains an Object-Relational Mapping (ORM) tool that works with dates by using .NET objects.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 15<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Entity integrity (or entity integrity constrains)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This means that each row in a table must have some unique data. This would be the primary key. The value for a primary key could not appear twice in the same table. The value for a primary key cannot be null.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>entity integrity constraint<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This pertains to the primary key. Entity integrity constraints prevent a null or empty value from being used.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>entity or entities<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the words of Peter Chen, these are things that \u201cexists in our minds.\u201d An entity is an object in the real world with an independent existence that\u00a0can be differentiated from other objects.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>entity set<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a collection of entities. In the words of Peter Chen, an entity \u201chas the properties common to the other entities in the entity set\u2026.\u201d<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Entity-Relationship Diagram<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Peter Chen developed this tool in support of the entity-relationship model.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Entity-Relationship Diagram (ERD)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is used in relational DBMS work for modeling data.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Entity-Relationship Model<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Peter Chen developed this model in 1976. It draws upon the network model, the relational model, and entity set model. It is a more natural view of the real world. It is based on sets theory and relational theory.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>equijoin<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is like a theta join in that the equijoin operation pulls from two tables based on a condition represented by the Greek letter theta (\u03b8). But \u03b8 is the equal symbol (=).<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>existence dependency<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">An entity that dependents upon the existence of another entity. This is a weak relationship. If the linked entity is removed, then these dependent entities would go away.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>existential <\/strong><strong>quantifier <\/strong><strong>\u2203<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This means \u201cthere exists\u201d at least one instance or tuple that is true for the statement.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Extent<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a Microsoft approach to data pages. A data page is 8 KB in size. Eight data pages form one Extent.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>field<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">See column above.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Fifth normal form (5NF)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This requires that the database table is in 4NF and that a relation does not contain any join dependency and no joining actions that would experience a loss.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>file<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">See relation below.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>file-based system<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">An application program designed to manipulate data files.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 1<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>firewall<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a separator or a restrictor of network traffic.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>firewall<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a separator or a restrictor of network traffic.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>First Normal Form (1NF)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This requires that each cell contains only one value.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Fixed SQL Server Database Roles<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are predefined roles. These cannot be changed nor deleted. These roles were created during the creation of a database<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Fixed SQL Server Roles<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are predefined roles. These cannot be changed nor deleted. These roles were created during the installation of the SQL Server.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>foreign key<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a primary key appearing in another table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>foreign key<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a primary key appearing in another table. (This was covered in Chapter 3.)<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Foreign key<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is used to link from one table to another table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Fourth normal form (4NF)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This requires that the database table is in BCNF and that there ae no non-trivial multivalued dependencies.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>framework<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a more structured approach for solving a problem. The framework may have a set of guidelines or rules for completing a task.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Full outer <\/strong><strong>join (<\/strong><strong>R <\/strong><strong>\u27d7<\/strong><strong> S)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Everything from both tables plus nulls for any missing fields.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>functional dependency (FD)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a relationship between attributes such as between the PK and the non-key attributes. Something determines the other attributes. An FD is a database constraint that determines the relationship of one attribute to another attribute. FDs help to maintain the quality of data in a database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>functional dependency set (FD set)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the set of all FDs in a relation.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>functions<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are pieces of code that can restrict what is accessed<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>functions<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are built-in blocks of SQL lines for performing tasks such as obtaining the average of values in a column, counting the number of items in a column, and so on.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Graphic interface (GUI)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a means for interacting with a computer. This could involve using a mouse for clicking on menus. The opposite is a command prompt interface.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>graphic user interface (GUI)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The eye-pleasing front end to a program.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>History-Based Access Control (HBAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This looks at the history of the person.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Hyper Text Markup Language (HTML)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the standard way for creating web pages. SHA384 hash function is used. This is beyond the scope of this textbook.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Identity-Based Access Control (IBAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This grants access based on the identity of the user and on the granted credentials.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Identity-Based Access Control (IBAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This grants access based on the identity of the user and on the granted credentials.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>information<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Insights gained from pieces of data.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 2<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>insertion anomaly<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">When a database table is not well-designed, problems can arise when a new row is added. The new row might contain revised data that needs to be applied to other rows.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>instance<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a running example or session.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>integer<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A whole number.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>integrity field<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a way of ensuring that the file has not been tampered with<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>integrity rules (or integrity constraints or relational integrity constraints)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are conditions that must be present for a valid relation.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>International Organization for Standardization (ISO)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is similar to the ANSI. It was founded in 1946.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>intersection \u2229<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a set operation that does not have a counterpart in regular algebra. It extracts what is common to two database tables based on a conditional.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Isolation<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Transactions do not interfere with other transactions.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>JavaScript<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a scripting or programming language that supports complex features on web pages. JavaScript makes a web page dynamic.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>join <\/strong><strong>\u22c8<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an operation from set theory. A way of pulling from two tables. This was added to the set operators.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Jumbotron<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a lightweight flexible content component that would appear at the top of a web page. This was introduced in Bootstrap 3, but dropped in Bootstrap 5.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>kebab case<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This separates each word with the dash or hyphen character<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>key attribute<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an attribute that uniquely identifies an entity.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>key constraint<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This pertains to the primary key. The primary key must be unique.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>key constraints<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The value for a primary key cannot be used again in the same table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>key words<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are reserved words that cannot be used as variables in a SQL command.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Left outer <\/strong><strong>join (<\/strong><strong>R <\/strong><strong>\u27d5<\/strong><strong> S)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Everything from left plus any matching rows on the left with the right table plus nulls for any missing rows.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>logical access controls<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These limit connections to computer networks, system files, and data. These are provided via software and these support letting certain individuals or groups to gain access to sensitive information<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>logical access controls<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These limit connections to computer networks, system files, and data. These are provided via software and these support letting certain individuals or groups to gain access to sensitive information<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Mandatory Access Control (MAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This uses the concept of security labels. The owner creates the resource, but the owner does not decide who will have access to a resource. A hierarchical approach is used.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>mandatory relationship<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Where one entity occurrence requires a corresponding entity occurrence.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>metadata<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Data about the database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 2<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>metadata<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Defines and describes the data and relationships between the tables in the database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>model<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This performs the user\u2019s requested action.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 15<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>model<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a simplified representation of a system or of a process. It is a tool for breaking the complex into smaller and more manageable parts.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Model-View-Controller (MVC) framework<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is designed to separate the three parts of a program. This is known as the \u201cseparation of concerns.\u201d The user requests are routed to a controller that is responsible for working with the model. The model performs the user\u2019s requested action. This could be to retrieve the results from a query. The controller chooses the view for displaying the information back to the user. This approach means that the common actions can be used for routing to the user on a web page, to the user on a desktop application, or to the user on a kiosk in a shopping mall. One benefit is that developers can divide the project into different parts.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 15<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>multi-tier system<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">An arrangement that uses several servers. It divides the workload.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 2<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>multivalued attribute<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an attribute that could contain more than one entity.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>naming convention<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">An organization\u2019s approach for naming tables and columns.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>natural join<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is like a theta join that pulls from two tables, but the extra column is not included in the output and the ON key word is not used.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>NewSQL<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is different from the traditional relational DBMS. A NewSQL DBMS uses the NoSQL approach with the traditional relational DBMS. Queries are executed against the DBMS using the best approach.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 8<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>non-tangible type<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an entity that is not physical and cannot be touched.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>normalization<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Relational databases use a set of rules for eliminating data redundancy.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>normalization<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a step-by-step process for minimizing redundancy in a database. There are five normal forms.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>NoSQL<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is different from the traditional relational DBMS. Queries are executed against the DBMS using a different approach.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 8<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>null<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the absence of a user-defined value. This is not the same thing as zero.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>null<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the absence of a user-defined value. This is not the same thing as zero. (This was covered in Chapter 3.)<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Online Transaction Processing (LTP)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a type of data processing that consists of executing a number of transactions that are occurring at the same time.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>operands<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In regular algebra, these are variables or values used in an expression. In relational algebra, these are relations or variables that represent relations.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>operators<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In regular algebra, these are symbols that denote what will be done to the regular algebra operands. In relational algebra, these are the common actions that we need to do with relations in a database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>optionality<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This states whether or not an entity must be joined to another entity.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Organization-Based Access Control (<\/strong><strong>OrBCA<\/strong><strong>)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This separates the security policy from the activities that must implement a security policy.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>OUT parameter<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is used within the SQL Server environment for returning a value other than a result set. If this is being sent to the calling program, then that program would need to have an out variable declared.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>outer join<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This will return rows from two tables even if there are no matches in one of the tables. An outer join can be divided into three sub types<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>pages<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an approach for storing data in memory or on a hard drive.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Pascal case<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This runs the words together. All words start with an upper-case letter.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>permission<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is an access that is granted on a securable for a specific principal.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>permission<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is an access that is granted on a securable for a specific principal.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>permission<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This pertains to what a person or a group or a role can do.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>physical access controls<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are physical means such as fences, locked doors, and guards.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>physical access controls<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are physical means such as fences, locked doors, and guards.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Policy-Based access Control (PBAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This evaluates access rights and entitlements based on new organizational policies.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>predicate<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an expression of one or more variables for a certain domain. A predicate must have at least one object that is associated with the predicate.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>prepared statement<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a programming approach whereby values are collected and added to a specially created statement for routing to a database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>primary key<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a unique value for locating a row of data in a database table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>primary key<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a unique value for locating a row of data in a database table. (This was covered in Chapter 3.)<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 4<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>primary key<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is selected from the set of candidate keys. Recall from Chapter 3 that this was defined as a unique value for locating a row of data in a database table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>principal<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is an entity that can be authenticated.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>principal<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is an entity that can be authenticated.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Principle of Least Privilege (PLP)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This directs that users can only see what they need for their job.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Principle of Least Privilege (PLP)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This directs that users can only see what they need for their job.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>program-data independence<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">See data independence.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>projection \u03c0<\/strong><strong> (The lower case Greek letter pi)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This selects a subset of the available columns. This was added to the set operators.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Project-Join Normal Form (PJNF)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">See Fifth Normal Form.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>read and write privileges<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the ability to both read and modify a file.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>read-only permission<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the ability to read a file but not make changes.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Real-time DBMS<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a database that stores data in JSON files. All clients are synchronized in real-time with a connection to the database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 8<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>record<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">See row below.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>recursive relationship<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">See unary relationship.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>redundancy<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is when data appears in some fashion two more times in a table. This is undesirable, because it causes problems.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>referential integrity (or referential integrity constraint)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This means that if a table contains a column for foreign keys, then the linked table must have a matching value in the primary key column. That is, the value in the foreign key column must also be present in the primary key column of the linked table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>referential integrity constraint<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This refers to the linkage between two tables. If a table uses a foreign key (a primary key appearing in another table) to reference another table, then that key value must be present in that table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>regular expression<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This does a pattern match against permitted or not permitted characters.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>relation<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Formally, this is a subset of the Cartesian product of a list of domains characterized by a name. Informally, this is a relation between two entities.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>relational algebra<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This collects instances of relations as input and gives occurrences of relations as outputs. The expressions explain how to execute a query. The expressions are independent of any SQL system.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>relational calculus<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This specifies what is to be retrieved whereas relational algebra states how to obtain the results. In relational calculus, we work with tuple relational calculus and with domain relational calculus.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>relationship type<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This represents the associations between entity types.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>relationships<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the words of Peter Chen, this an \u201cassociation among entities.\u201d<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>renaming \u03f8<\/strong><strong> (The lower case Greek letter rho)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This renames the output columns. This was added to the set operators.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>result set<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">What comes back from a SQL query.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>reverse engineering<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the act of recovering design information from a source. I did not mention in the chapter that software reverse engineering is the process of recovering the design, the requirements specifications, and the functions of a product from analyzing a program\u2019s codes. There are courses and degree programs devoted to this area. A company may reverse engineer a product in order to determine how to build a better version.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 15<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Right outer <\/strong><strong>join (<\/strong><strong>R <\/strong><strong>\u27d6<\/strong><strong> S)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Everything from right plus any matching rows on the right with the left table plus nulls for any missing rows<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Risk-Adaptive Access Control (RAdAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This adjusts the access in real time based on the current risk level, users\u2019 behaviors, the network conditions, and the potential threats.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Role-Based Access Control (RBAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This uses the concept of roles for determining access.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>row<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This represents a group of related data.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Rule-Based Access Control (RAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is based on a set of predefined rules. This is similar to PBAC, except there is no governance committee creating the rules.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>safe<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The expression draws upon members of a defined domain.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Second Normal Form (2NF)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This requires that a database table is in 1NF and that each non-key attribute must be functionally dependent on the primary key.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>securable<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is a SQL Server resource that can be accessed by a principal.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>securable<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the context of Microsoft usage of RBAC, this is a SQL Server resource that can be accessed by a principal.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>selection \u03c3<\/strong><strong> (The lower case Greek letter sigma)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A way of selecting tuples that satisfies a selection condition. This was added to the set operators. Do not confuse this word with the SQL key word \u201cSELECT,\u201d which lists out the desired columns in the output.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>selectivity of the condition<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The fraction of tuples selected by a selection condition.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>self join<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is when one table is treated as two tables.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>self-describing<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A database is self-describing because it not only contains the database itself, but also metadata that defines and describes the data and relationships between the tables in the database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>semijoin<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In a left outer join, you would have the desired columns from both tables. Nulls would appear in the right-hand table for missing values. A semijoin would drop the right-hand table\u2019s columns. The result would be the tuples that have a match in the second table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>set difference<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is from set theory. These are the tuples that are present in one relation, but not present in a second relation. We write this as R \u2013 S, which states that this includes all tuples that are in R, but are not in S. The two relations must be union compatibility or type compatibility.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>set operations<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are operations drawn from mathematical set theory. These are union, intersection, set difference, and Cartesian product.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Sharding<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a technique that involves splitting a large database into smaller, more manageable pieces. These pieces are known as a shard. Each shard contains a subset of the data and operates independently. This allows for horizonal scaling and improved performance.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 8<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>snake case<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a style where the words are separated by the underscore character.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>sound<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This means that for a given set of FDs that are specified for a relation schema, a person should be able infer any dependency from the FDs by using the primary rules of Armstrong\u2019s Axioms and that these will hold in every relation state of the relational schema R that satisfies the dependencies in the FDs.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Spatial data<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This represents objects in a geometric space such as points or as polygons.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 8<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>SQL injection attack<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a technique whereby a hacker can craft a SQL query that can obtain more data than wanted by the database managers.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>SQL Server Application Database Roles<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are used by an application instead of by individuals. This adds another layer of security.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>SQL Server Application Database Roles<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are used by an application instead of by individuals. This adds another layer of security.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>SQL Server Application Roles<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are used by an application instead of by individuals. The intent is to keep regular users and application users separate and safe.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>SQL Server Application Roles<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are used by an application instead of by individuals. The intent is to keep regular users and application users separate and safe.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>SQL Server Management Studio (SSMS)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Microsoft will frequently refer to their SQL Server Management Studio as \u201cSSMS.\u201d I prefer to use the long form in order to avoid abbreviation overload. \u201cSSMS\u201d will appear in the text when I am quoting information.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>SQL-92<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the foundation that many relational DBMSs use. SQL-92 is taught in many schools and is covered in many textbooks. However, since SQL-92 has 579 pages, the coverage is not complete.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>staging table<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a table that is receiving data from different sources.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Stored procedures<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These work with the actual SQL command inside the database environment.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>storyboard<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a simple representation of a design project. For a website, a storyboard would show how the website would appear and how it would behave.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Structured Query Language (SQL)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a fourth-generation programming language that is designed for working with databases and with the data in a database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>super key<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a set of one or more attributes (columns), which can uniquely identify a row in a table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>system catalogue (system catalog)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the database approach, the data structure, the databases tables, the database views, and other vital pieces of information are stored.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>table<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A combination of fields<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 2<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>table<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">See relation above.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Tabular Data Stream (TDS) protocol<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a protocol for transferring data between the client machine and the server machine.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>tangible type<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is an entity that is physical or could be touched.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>ternary<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is when more than two entity sets participate in a relation.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>theta <\/strong><strong>join \u03b8<\/strong><strong> (The lower case Greek letter theta)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This pulls from two tables based on a condition represented by the Greek letter theta (\u03b8). \u03b8 could be any one of the comparison operators.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Time-Based Access Control (TBAC)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This grants access to users based on specific timeframes.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Transact Structured Query Language or Transact-SQL (T-SQL)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is Microsoft\u2019s version of SQL with enhancements.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Transaction Control Language (TCL)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">For grouping a series of SQL commands in a package. If any of the tasks fail, then the whole group fails. There are only two results: success or failure.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>triggers<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are SQL lines that are invoked when an action takes place.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>tuple<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">See row above.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Tuple relational calculus<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This seeks to obtain those tuples that are true for a certain predicate. The variables come from the tuples of the relations.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>type compatibility<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This states that the two database tables must have the same degree and the same domain. This is the same concept as is \u201cunion compatibility.\u201d<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>unary<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This means we are working with one relation or with one database table.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>unary<\/strong><strong> relationship<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is one in which a relationship exists between occurrences of the same entity set.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 5<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>union <\/strong><strong>\u222a<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This produces the tuples that are in either Result1 or Result2 or both while removing any duplicates. In the relational database world, the two sets of tuples must be of the same type (union compatibility or type compatibility).<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>union compatibility<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This states that the two database tables must have the same degree and the same domain. This is the same concept as is \u201ctype compatibility.\u201d<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 14.4pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>universal <\/strong><strong>quantifier <\/strong><strong>\u2200<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This means \u201cfor all.\u201d All tuples must be true for the statement.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>unsafe<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">The expression draws upon members outside of a defined domain.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 10<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>Update anomaly<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">When a database table is not well-designed, problems can arise when a row is updated. The updated row might contain revised data that needs to be applied to other rows. This is similar to the situation of adding a new row to a database.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 7<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>user-defined integrity (or business rules)<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are unique to an organization.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 6<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>User-Defined SQL Server Database Roles<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are created to support the needs of the organization. These provide more granular control over what users may access.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>User-Defined SQL Server Roles<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">These are created to support the needs of the organization.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>UTF-8<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This can encode all Unicode 1,112,064 character code points. It does this by using variable coding. A character could be coded between one to four bytes. This is the standard encoding for the web.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the context of Microsoft usage, this limits what a person can see and can do.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 11<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">In the context of Microsoft usage, this limits what a person can see and can do.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 12<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a virtual table that is the result of a query.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 13<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the presentation to the user.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 15<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>view<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">A subset of the database that is defined and dedicated for a particular set of users.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>viewport<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This tells the web page to scale based on the size of the viewing screen.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>W3.CSS<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a competing framework. It does not have as widespread usage as Bootstrap.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>wildcard<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is a space holder for one or more characters. The asterisk is a very common wildcard.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 9<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>wireframing<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Adding details to a storyboard.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 14<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableNormal-R\" style=\"height: 15.6pt\">\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\"><strong>write permission<\/strong><\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">This is the ability to make changes to a file or to a resource.<\/p>\n<\/td>\n<td class=\"TableNormal-C\" style=\"background-color: transparent;padding: 0pt 5.4pt 0pt 5.4pt;border: solid windowtext 0.5pt\">\n<p class=\"import-Normal\">Chapter 3<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"import-Normal\">\n<\/div>\n","protected":false},"author":2276,"menu_order":16,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":["fredstrickland"],"pb_section_license":""},"chapter-type":[],"contributor":[66],"license":[],"class_list":["post-1334","chapter","type-chapter","status-publish","hentry","contributor-fredstrickland"],"part":3,"_links":{"self":[{"href":"https:\/\/pressbooks.bccampus.ca\/nelson\/wp-json\/pressbooks\/v2\/chapters\/1334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.bccampus.ca\/nelson\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.bccampus.ca\/nelson\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/nelson\/wp-json\/wp\/v2\/users\/2276"}],"version-history":[{"count":1,"href":"https:\/\/pressbooks.bccampus.ca\/nelson\/wp-json\/pressbooks\/v2\/chapters\/1334\/revisions"}],"predecessor-version":[{"id":1607,"href":"https:\/\/pressbooks.bccampus.ca\/nelson\/wp-json\/pressbooks\/v2\/chapters\/1334\/revisions\/1607"}],"part":[{"href":"https:\/\/pressbooks.bccampus.ca\/nelson\/wp-json\/pressbooks\/v2\/parts\/3"}],"metadata":[{"href":"https:\/\/pressbooks.bccampus.ca\/nelson\/wp-json\/pressbooks\/v2\/chapters\/1334\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.bccampus.ca\/nelson\/wp-json\/wp\/v2\/media?parent=1334"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/nelson\/wp-json\/pressbooks\/v2\/chapter-type?post=1334"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/nelson\/wp-json\/wp\/v2\/contributor?post=1334"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/nelson\/wp-json\/wp\/v2\/license?post=1334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}