数据库信息管理系统简介外文翻译

合集下载

管理信息系统外文翻译 (2)

管理信息系统外文翻译 (2)

毕业设计(论文)外文文献翻译毕业设计(论文)题目翻译(1)题目管理信息系统翻译(2)题目数据库管理系统的介绍学院计算机学院专业姓名班级学号Management Information SystemIt is the MIS(Management Information System ) that we constantly say that the management information system , and is living to emphasize the administration , and emphasizes that it changes into more and more significantly and more and more is universalized in the contemporary community of message . MIS is a fresh branch of learning, and it leaped over several territories, and for instance administers scientific knowledge, system science, operational research, statistic along with calculating machine scientific knowledge. Is living on these the branches of learning base, and takes shape that the message is gathered and the process means, thereby take shape the system that the crossbar mingles.1. The Management Information System Summary20 centuries, in the wake of the flourishing development of whole world economy, numerous economists propose the fresh administration theory one by one. Xi Men propose the administration and was dependent on idea to message and decision of strategic importance in the 50’s 20 centuries. The dimension of simultaneous stage is admitted issuing cybernetics, and he thinks that the administration is a control procedure. In 1958, Ger. write the lid: “ the administration shall obtain without delay with the lower cost and exact message, completes the better control “. This particular period, the calculating machine starts being used accountancy work. The data handling term has risen.In 1970, Walter T.Kennevan give administration that has raised the only a short while ago information system term to get off a definition: “ either the cover of the book shape with the discount, is living appropriately time to director, staff member along with the outside world personnel staff supplies the past and now and message that internal forecasting the approaching relevant business reaches such environment, in order to assist they make a strategic de cision”. Is living in this definition to emphasize, yet does not emphasize using the pattern, and mention the calculating machine application in the way of the message support decision of strategic importance.In 1985, admonishing information system originator, title Buddhist nun Su Da university administration professor Gordon B.Davis give the management information system relatively integrated definition, in immediate future “ administer the information system is one use calculating machine software and hardware resources along with data bank man - the engine system.It be able to supply message support business either organization operation, administration or the decision making function. Comprehensive directions of this definition management information system target and meritorious service capacity and component, but also make known the management information system to be living the level that attains at that time.1.1 The Developing History of MISThe management information system is living the most primarily phase iscounting the system, the substance which researched is the regular pattern on face between the incremental data, it what may separate into the data being mutually related and more not being mutually related series, afterwards act as the data conversion to message.The second stage is the data are replaced the system, and it is that the SABRE that the American airline company put up to in the 50’s 20 centuries subscribes to book the bank note system that such type stands for. It possess 1008 bank note booking spots, and may access 600000 traveler keep the minutes and 27000 flight segments record. Its operation is comparatively more complex, and is living whatever one “spot ”wholly to check whether to be the free place up some one flight n umbers. Yet through approximately attending school up to say, it is only a data and replaces the system, for instance it can not let know you with the bank note the selling velocity now when the bank note shall be sell through, thereby takes remedying the step. As a result it also is administer information system rudimentary phase.The third phase is the status reports system, and it may separate into manufacture state speech and service state and make known and research the systems such as status reports and so on. Its type stands for the production control system that is the IBM corporation to the for instance manufacture state speech system. As is known to all, the calculating machine corporation that the IBM corporation is the largest on the world, in 1964 it given birth to middle-sized calculating machine IBM360 and causes the calculating machine level lift a step, yet form that the manufacture administration work. Yet enormously complicatedly dissolve moreover, the calculating machine overtakes 15000 difference components once more, in addition the plant of IBM extends all over the American various places to every one components once more like works an element, and the order of difference possess difference components and the difference element, and have to point out that what element what plant what installation gives birth to, hence not merely giving birth to complexly, fitting, installation and transportation wholly fully complex. Have to there be a manufacture status reports system that takes the calculating machine in order to guarantee being underway successfully of manufacture along with else segment as the base. Hence the same ages IBM establish the systematic AAS of well-developed administration it be able to carry on 450 professional work operations. In 1968, the corporation establishes the communal once more and manufactures informationsystem CMIS and runs and succeeds very much, the past needs 15 weeks work, that system merely may be completed in the way of 3 weeks.It is the data handling system that the status reports system still possess one kind of shape , and that it is used for handles the everyday professional work to make known with manufacture , and stress rests with by the handwork task automation , and lifts the effectiveness with saves the labor power . The data handling system ordinarily can not supply decision of strategic importance message.Last phase is the support systems make a strategic decision, and it is the information system being used for supplementary making a strategic decision. That system may program and the analysis scheme, and goes over key and the error solve a problem. Its proper better person-machine dialogue means, may with not particularlythe personnel staff who have an intimate knowledge of the calculating machine hold conversation. It ordinarily consists of some pattern so as to come into being decision of strategic importance message, yet emphasize comprehensive administration meritorious service capacity.1.2 The Application of Management Information SystemThe management information system is used to the most base work, like dump report form, calculation pay and occurrences in human tubes and so on, and then developing up business financial affairs administrations and inventory control and so on individual event operational control , this pertains to the electron data handling ( EDP Data Processing ) system . When establish the business data bank, thereby possess the calculating machine electric network to attain data sharing queen , the slave system concept is start off , when the implementation the situation as a whole is made program and the design information system ,attained the administration information system phase . In the wake of calculating machine technique progress and the demand adjust the system of people lift further, people emphasize more furthermore administer the information system phase. Progress and people in the wake of the calculating machine technique lift at the demand adjust the system further, people emphasize more furthermore to administer the information system whether back business higher level to lead makes a strategic decision this meritorious service capacity, still more lay special emphasis on the gathering to the external message of business and integrated data storehouse, model library , means storehouse and else artificial intelligence means whether directly to decision of strategic importance person , this is the support system ( DDS ) mission making a strategic decision.There is the part application that few business start MIS inner place the limit of the world at the early days of being living in the 70’s 20 centuries. Up at the moment, MIS is living, and there be the appropriatePopularization rate in every state nation in world, and nearly covered that every profession reaches every department.1.3 The Direction of MIS DevelopmentClose 20 curtains; external grand duke takes charge of having arisen3 kinds of alternations:A. Paying special attention to the administration being emphasized toestablishing MIS’s s ystem, and causing the administration technique headfor the ageing.B. The message is the decision of strategic importance foundation, and MISsupplies the message service in the interest of director at all times.C. Director causes such management program getting in touch with togetherwith the concrete professional work maneuver by means of MIS. not merelybig-and-middle-sized business universally establish MIS some small-sizebusiness also not exceptions of self, universally establish the communaldata network, like the electronic mail and electron data exchange and so on,MIS supplied the well support environment to the application of Intranet’stechnique to speedily developing of INTERNET especially in the past fewyears in the interest of the business.Through international technique development tendency is see, in the 90’s 20 centuries had arisen some kinds of brand-new administration technique.1. Business Processes Rebuild (BPR)A business should value correctly time and produce quality, manufacturing cost and technical service and so on several section administrations, grip at the moment organization and the process compose once more,andcompletes that meritorious service capacity integrationist, operation processization and organization form fluctuation. Shall act as the service veer of middle layer management personnel staff the decision of strategic importance of the director service?2. Intelligentization Decision Support System (IDSS)The intelligentization decision of strategic importance support system was sufficiently consider demand and the work distinguishing feature of business higher level personnel staff.3. Lean Production (LP)Application give birth to on time, comprehensive quality control and parallel project that picked amount is given birth to and so on the technique, the utmost product design cutting down and production cycle, raise produce quality and cuts down the reproduced goods to reserve, and is living in the manufacture promote corps essence, in order to meet the demand that client continuously changes.4. Agile Manufacture (AM)One kind of business administration pattern that possess the vision, such distinguishing feature is workers and staff members’ quality is high, and the organization simplifies and the multi-purpose group effectiveness GAO message loading is agile and answers client requires swiftly.2. The Effect To The Business Administration of MIS DevelopmentThe effect to the business administration of the management information system development is administered the change to business and business administration of information system development and come into being and is coming into being the far-reaching effect with.Decision of strategic importance, particularly strategic decision-making may be assisted by the administration information system, and its good or bad directly affects living and the development up the business. The MIS is impeding the orientation development that the administration means one another unites through quality and ration. This express to utilize the administration in the calculation with the different mathematical model the problem in the quantitative analysis business.The past administer that the problem is difficult to test, but MIS may unite the administration necessaries, and supply the sufficient data, and simulates to produce the term in the interest of the administration.In the wake of the development of MIS, much business sit up the decentralizedmessage concentration to establish the information system ministry of directly under director, and the chief of information system ministry is ordinarily in the interest of assistant manager’s grade. After the authority of business is centralized up high-quality administration personnel staff’s hand, as if causing much sections office work decrease, hence someone prophesy, middle layer management shall vanish. In reality, the reappearance phase employed layer management among the information system queen not merely not to decrease, on the contrary there being the increase a bit.This is for, although the middle layer management personnel staff getting off exonerate out through loaded down with trivial details daily routine, yet needs them to analyses researching work in the way of even more energy, lift further admonishing the decision of strategic importance level. In the wake of the development of MIS, the business continuously adds to the demand of high technique a talented person, but the scarce thing of capability shall be washed out gradually. This compels people by means of study and cultivating, and continuously lifts individual’s quality. In The wake of the news dispatch and electric network and file transmission system development, business staff member is on duty in many being living incomparably either the home. Having caused that corporation save the expenses enormously, the work efficiency obviously moves upward American Rank Zeros corporation the office system on the net, in the interest of the creativity of raise office personnel staff was produced the advantageous term.At the moment many countries are fermenting one kind of more well-developed manufacturing industry strategy, and become quickly manufacturing the business. It completely on the basis of the user requirement organization design together with manufacture, may carry on the large-scale cooperation in the interest of identical produce by means of the business that the flow was shifted the distinct districts, and by means of the once more programming to the machinery with to the resources and the reorganization of personnel staff , constituted a fresh affrication system, and causes that manufacturing cost together with lot nearly have nothing to do with. Quickly manufacturing the business establishes a whole completely new strategy dependence relation against consumer, and is able to arouse the structure of production once more revolution.The management information system is towards the self-adoption and Self-learning orientation development, the decision procedure of imitation man who is be able to be better. Some entrepreneurs of the west vainly hope that consummate MIS is encircles the magic drug to govern the business all kinds of diseases; Yet also someone says, and what it is too many is dependent on the defeat that MIS be able to cause on the administration. It is adaptable each other to comprehend the effect to the business of MIS, and is favor of us to be living in development and the research work, and causes the business organization and administer the better development against MIS of system and administration means , and establish more valid MIS.The Source Of Article: Russ Basiura, Mike Batongbacal管理信息系统管理信息系统就是我们常说的MIS(Management Information System), 在强调管理,强调信息的现代社会中它变得越来越重要、越来越普及。

计算机专业外文翻译+原文-数据库管理系统介绍知识讲解

计算机专业外文翻译+原文-数据库管理系统介绍知识讲解

计算机专业外文翻译+原文-数据库管理系统介绍外文资料Database Management SystemsA database (sometimes spelled data base) is also called an electronic database , referring to any collection of data, or information, that is specially organized for rapid search and retrieval by a computer. Databases are structured to facilitate the storage, retrieval , modification, and deletion of data in conjunction with various data-processing operations .Databases can be stored on magnetic disk or tape, optical disk, or some other secondary storage device.A database consists of a file or a set of files. The information in these files may be broken down into records, each of which consists of one or more fields. Fields are the basic units of data storage , and each field typically contains information pertaining to one aspect or attribute of the entity described by the database . Using keywords and various sorting commands, users can rapidly search , rearrange, group, and select the fields in many records to retrieve or create reports on particular aggregate of data.Complex data relationships and linkages may be found in all but the simplest databases .The system software package that handles the difficult tasks associated with creating ,accessing, and maintaining database records is called a database management system(DBMS).The programs in a DBMS package establish an interface between the database itself and the users of the database.. (These users may be applications programmers, managers and others with information needs, and various OS programs.)A DBMS can organize, process, and present selected data elements form the database. This capability enables decision makers to search, probe, and query database contents in order to extract answers to nonrecurring and unplanned questions that aren’t available in regular reports. These questions might initially be vague and/or poorly defined ,but people can “browse” through the database until they have the needed information. In short, the DBMS will “manage” the stored data items and assemble the needed items from the common database in response to the queries of those who aren’t programmers.A database management system (DBMS) is composed of three major parts:(1)a storage subsystem that stores and retrieves data in files;(2) a modeling and manipulation subsystem that provides the means with which to organize the data and to add , delete, maintain, and update the data;(3)and an interface between the DBMS and its users. Severalmajor trends are emerging that enhance the value and usefulness of database management systems;Managers: who require more up-to-data information to make effective decisionCustomers: who demand increasingly sophisticated information services and more current information about the status of their orders, invoices, and accounts.Users: who find that they can develop custom applications with database systems in a fraction of the time it takes to use traditional programming languages.Organizations : that discover information has a strategic value; they utilize theirdatabase systems to gain an edge over their competitors.The Database ModelA data model describes a way to structure and manipulate the data in a database. The structural part of the model specifies how data should be represented(such as tree, tables, and so on ).The manipulative part of the model specifies the operation with which to add, delete, display, maintain, print, search, select, sort and update the data.Hierarchical ModelThe first database management systems used a hierarchical model-that is-they arranged records into a tree structure. Some records are root records and all others have unique parent records. The structure of the tree is designed to reflect the order in which the data will be used that is ,the record at the root of a tree will be accessed first, then records one level below the root ,and so on.The hierarchical model was developed because hierarchical relationships are commonly found in business applications. As you have known, an organization char often describes a hierarchical relationship: top management is at the highest level, middle management at lower levels, and operational employees at the lowest levels. Note that within a strict hierarchy, each level of management may have many employees or levels of employees beneath it, but each employee has only one manager. Hierarchical data are characterized by this one-to-many relationship among data.In the hierarchical approach, each relationship must be explicitly defined when the database is created. Each record in a hierarchical database can contain only one key field and only one relationship is allowed between any two fields. This can create a problem because data do not always conform to such a strict hierarchy.Relational ModelA major breakthrough in database research occurred in 1970 when E. F. Codd proposed a fundamentally different approach to database management called relational model ,which uses a table as its data structure.The relational database is the most widely used database structure. Data is organized into related tables. Each table is made up of rows called and columns called fields. Each record contains fields of data about some specific item. For example, in a table containing information on employees, a record would contain fields of data such as a person’s last name ,first name ,and street address.Structured query language(SQL)is a query language for manipulating data in a relational database .It is nonprocedural or declarative, in which the user need only specify an English-like description that specifies the operation and the described record or combination of records. A query optimizer translates the description into a procedure to perform the database manipulation.Network ModelThe network model creates relationships among data through a linked-list structure in which subordinate records can be linked to more than one parent record. This approach combines records with links, which are called pointers. The pointers are addresses that indicate the location of a record. With the network approach, a subordinate record can be linked to a key record and at the same time itself be a key record linked to other sets of subordinate records. The network mode historically has had a performance advantage over other database models. Today , such performance characteristics are only important in high-volume ,high-speed transaction processing such as automatic teller machine networks or airline reservation system.Both hierarchical and network databases are application specific. If a new application is developed ,maintaining the consistency of databases in different applications can be very difficult. For example, suppose a new pension application is developed .The data are the same, but a new database must be created.Object ModelThe newest approach to database management uses an object model , in which records are represented by entities called objects that can both store data and provide methods or procedures to perform specific tasks.The query language used for the object model is the same object-oriented programming language used to develop the database application .This can create problems because there is no simple , uniform query language such as SQL . The object model isrelatively new, and only a few examples of object-oriented database exist. It has attracted attention because developers who choose an object-oriented programming language want a database based on an object-oriented model.Distributed DatabaseSimilarly , a distributed database is one in which different parts of the database reside on physically separated computers . One goal of distributed databases is the access of information without regard to where the data might be stored. Keeping in mind that once the users and their data are separated , the communication and networking concepts come into play .Distributed databases require software that resides partially in the larger computer. This software bridges the gap between personal and large computers and resolves the problems of incompatible data formats. Ideally, it would make the mainframe databases appear to be large libraries of information, with most of the processing accomplished on the personal computer.A drawback to some distributed systems is that they are often based on what is called a mainframe-entire model , in which the larger host computer is seen as the master and the terminal or personal computer is seen as a slave. There are some advantages to this approach . With databases under centralized control , many of the problems of data integrity that we mentioned earlier are solved . But today’s personal computers, departmental computers, and distributed processing require computers and their applications to communicate with each other on a more equal or peer-to-peer basis. In a database, the client/server model provides the framework for distributing databases.One way to take advantage of many connected computers running database applications is to distribute the application into cooperating parts that are independent of one anther. A client is an end user or computer program that requests resources across a network. A server is a computer running software that fulfills those requests across a network . When the resources are data in a database ,the client/server model provides the framework for distributing database.A file serve is software that provides access to files across a network. A dedicated file server is a single computer dedicated to being a file server. This is useful ,for example ,if the files are large and require fast access .In such cases, a minicomputer or mainframe would be used as a file server. A distributed file server spreads the files around on individual computers instead of placing them on one dedicated computer.Advantages of the latter server include the ability to store and retrieve files on other computers and the elimination of duplicate files on each computer. A major disadvantage , however, is that individual read/write requests are being moved across the network and problems can arise when updating files. Suppose a user requests a record from a file and changes it while another user requests the same record and changes it too. The solution to this problems called record locking, which means that the first request makes others requests wait until the first request is satisfied . Other users may be able to read the record, but they will not be able to change it .A database server is software that services requests to a database across a network. For example, suppose a user types in a query for data on his or her personal computer . If the application is designed with the client/server model in mind ,the query language part on the personal computer simple sends the query across the network to the database server and requests to be notified when the data are found.Examples of distributed database systems can be found in the engineering world. Sun’s Network Filing System(NFS),for example, is used in computer-aided engineering applications to distribute data among the hard disks in a network of Sun workstation.Distributing databases is an evolutionary step because it is logical that data should exist at the location where they are being used . Departmental computers within a large corporation ,for example, should have data reside locally , yet those data should be accessible by authorized corporate management when they want to consolidate departmental data . DBMS software will protect the security and integrity of the database , and the distributed database will appear to its users as no different from the non-distributed database .In this information age, the data server has become the heart of a company. This one piece of software controls the rhythm of most organizations and is used to pump information lifeblood through the arteries of the network. Because of the critical nature of this application, the data server is also the one of the most popular targets for hackers. If a hacker owns this application, he can cause the company's "heart" to suffer a fatal arrest.Ironically, although most users are now aware of hackers, they still do not realize how susceptible their database servers are to hack attacks. Thus, this article presents a description of the primary methods of attacking database servers (also known as SQL servers) and shows you how to protect yourself from these attacks.You should note this information is not new. Many technical white papers go into great detail about how to perform SQL attacks, and numerous vulnerabilities have beenposted to security lists that describe exactly how certain database applications can be exploited. This article was written for the curious non-SQL experts who do not care to know the details, and as a review to those who do use SQL regularly.What Is a SQL Server?A database application is a program that provides clients with access to data. There are many variations of this type of application, ranging from the expensive enterprise-level Microsoft SQL Server to the free and open source mySQL. Regardless of the flavor, most database server applications have several things in common.First, database applications use the same general programming language known as SQL, or Structured Query Language. This language, also known as a fourth-level language due to its simplistic syntax, is at the core of how a client communicates its requests to the server. Using SQL in its simplest form, a programmer can select, add, update, and delete information in a database. However, SQL can also be used to create and design entire databases, perform various functions on the returned information, and even execute other programs.To illustrate how SQL can be used, the following is an example of a simple standard SQL query and a more powerful SQL query:Simple: "Select * from dbFurniture.tblChair"This returns all information in the table tblChair from the database dbFurniture.Complex: "EXEC master..xp_cmdshell 'dir c:\'"This short SQL command returns to the client the list of files and folders under the c:\ directory of the SQL server. Note that this example uses an extended stored procedure that is exclusive to MS SQL Server.The second function that database server applications share is that they all require some form of authenticated connection between client and host. Although the SQL language is fairly easy to use, at least in its basic form, any client that wants to perform queries must first provide some form of credentials that will authorize the client; the client also must define the format of the request and response.This connection is defined by several attributes, depending on the relative location of the client and what operating systems are in use. We could spend a whole article discussing various technologies such as DSN connections, DSN-less connections, RDO, ADO, and more, but these subjects are outside the scope of this article. If you want to learn more about them, a little Google'ing will provide you with more than enough information.However, the following is a list of the more common items included in a connection request.Database sourceRequest typeDatabaseUser IDPasswordBefore any connection can be made, the client must define what type of database server it is connecting to. This is handled by a software component that provides the client with the instructions needed to create the request in the correct format. In addition to the type of database, the request type can be used to further define how the client's request will be handled by the server. Next comes the database name and finally the authentication information.All the connection information is important, but by far the weakest link is the authentication information—or lack thereof. In a properly managed server, each database has its own users with specifically designated permissions that control what type of activity they can perform. For example, a user account would be set up as read only for applications that need to only access information. Another account should be used for inserts or updates, and maybe even a third account would be used for deletes. This type of account control ensures that any compromised account is limited in functionality. Unfortunately, many database programs are set up with null or easy passwords, which leads to successful hack attacks.译文数据库管理系统介绍数据库(database,有时拼作data base)又称为电子数据库,是专门组织起来的一组数据或信息,其目的是为了便于计算机快速查询及检索。

(完整word版)数据库管理系统介绍 外文翻译

(完整word版)数据库管理系统介绍 外文翻译

外文资料Database Management SystemsA database (sometimes spelled data base) is also called an electronic database , referring to any collection of data, or information, that is specially organized for rapid search and retrieval by a computer. Databases are structured to facilitate the storage, retrieval , modification, and deletion of data in conjunction with various data-processing operations .Databases can be stored on magnetic disk or tape, optical disk, or some other secondary storage device.A database consists of a file or a set of files. The information in these files may be broken down into records, each of which consists of one or more fields. Fields are the basic units of data storage , and each field typically contains information pertaining to one aspect or attribute of the entity described by the database . Using keywords and various sorting commands, users can rapidly search , rearrange, group, and select the fields in many records to retrieve or create reports on particular aggregate of data.Complex data relationships and linkages may be found in all but the simplest databases .The system software package that handles the difficult tasks associated with creating ,accessing, and maintaining database records is called a database management system(DBMS).The programs in a DBMS package establish an interface between the database itself and the users of the database.. (These users may be applications programmers, managers and others with information needs, and various OS programs.)A DBMS can organize, process, and present selected data elements form the database. This capability enables decision makers to search, probe, and query database contents in order to extract answers to nonrecurring and unplanned questions that aren’t available in regular reports. These questions might initially be vague and/or poorly defined ,but people can “browse” through the database until they have the needed information. In short, the DBMS will “manage” the stored data items and assemble the needed items from the common database in response to the queries of those who aren’t programmers.A database management system (DBMS) is composed of three major parts:(1)a storage subsystem that stores and retrieves data in files;(2) a modeling and manipulation subsystem that provides the means with which to organize the data and to add , delete, maintain, and update the data;(3)and an interface between the DBMS and its users. Several major trends are emerging that enhance the value and usefulness of database management systems;Managers: who require more up-to-data information to make effective decisionCustomers: who demand increasingly sophisticated information services and more current information about the status of their orders, invoices, and accounts.Users: who find that they can develop custom applications with database systems in a fraction of the time it takes to use traditional programming languages.Organizations : that discover information has a strategic value; they utilize their database systems to gain an edge over their competitors.The Database ModelA data model describes a way to structure and manipulate the data in a database. The structural part of the model specifies how data should be represented(such as tree, tables, and so on ).The manipulative part of the model specifies the operation with which to add, delete, display, maintain, print, search, select, sort and update the data.Hierarchical ModelThe first database management systems used a hierarchical model-that is-they arranged records into a tree structure. Some records are root records and all others have unique parent records. The structure of the tree is designed to reflect the order in which the data will be used that is ,the record at the root of a tree will be accessed first, then records one level below the root ,and so on.The hierarchical model was developed because hierarchical relationships are commonly found in business applications. As you have known, an organization char often describes a hierarchical relationship: top management is at the highest level, middle management at lower levels, and operational employees at the lowest levels. Note that within a strict hierarchy, each level of management may have many employees or levels of employees beneath it, but each employee has only one manager. Hierarchical data are characterized by this one-to-many relationship among data.In the hierarchical approach, each relationship must be explicitly defined when the database is created. Each record in a hierarchical database can contain only one key field and only one relationship is allowed between any two fields. This can create a problem because data do not always conform to such a strict hierarchy.Relational ModelA major breakthrough in database research occurred in 1970 when E. F. Codd proposed a fundamentally different approach to database management called relational model ,which uses a table as its data structure.The relational database is the most widely used database structure. Data is organized into related tables. Each table is made up of rows called and columns called fields. Each record contains fields of data about some specific item. For example, in a table containing information on employees, a recordwould contain fields of data such as a person’s last name ,first name ,and street address.Structured query language(SQL)is a query language for manipulating data in a relational database .It is nonprocedural or declarative, in which the user need only specify an English-like description that specifies the operation and the described record or combination of records. A query optimizer translates the description into a procedure to perform the database manipulation.Network ModelThe network model creates relationships among data through a linked-list structure in which subordinate records can be linked to more than one parent record. This approach combines records with links, which are called pointers. The pointers are addresses that indicate the location of a record. With the network approach, a subordinate record can be linked to a key record and at the same time itself be a key record linked to other sets of subordinate records. The network mode historically has had a performance advantage over other database models. Today , such performance characteristics are only important in high-volume ,high-speed transaction processing such as automatic teller machine networks or airline reservation system.Both hierarchical and network databases are application specific. If a new application is developed ,maintaining the consistency of databases in different applications can be very difficult. For example, suppose a new pension application is developed .The data are the same, but a new database must be created.Object ModelThe newest approach to database management uses an object model , in which records are represented by entities called objects that can both store data and provide methods or procedures to perform specific tasks.The query language used for the object model is the same object-oriented programming language used to develop the database application .This can create problems because there is no simple , uniform query language such as SQL . The object model is relatively new, and only a few examples of object-oriented database exist. It has attracted attention because developers who choose an object-oriented programming language want a database based on an object-oriented model. Distributed DatabaseSimilarly , a distributed database is one in which different parts of the database reside on physically separated computers . One goal of distributed databases is the access of information without regard to where the data might be stored. Keeping in mind that once the users and their data are separated , the communication and networking concepts come into play .Distributed databases require software that resides partially in the larger computer. This software bridges the gap between personal and large computers and resolves the problems of incompatible dataformats. Ideally, it would make the mainframe databases appear to be large libraries of information, with most of the processing accomplished on the personal computer.A drawback to some distributed systems is that they are often based on what is called a mainframe-entire model , in which the larger host computer is seen as the master and the terminal or personal computer is seen as a slave. There are some advantages to this approach . With databases under centralized control , many of the problems of data integrity that we mentioned earlier are solved . But today’s personal computers, departmental computers, and distributed processing require computers and their applications to communicate with each other on a more equal or peer-to-peer basis. In a database, the client/server model provides the framework for distributing databases.One way to take advantage of many connected computers running database applications is to distribute the application into cooperating parts that are independent of one anther. A client is an end user or computer program that requests resources across a network. A server is a computer running software that fulfills those requests across a network . When the resources are data in a database ,the client/server model provides the framework for distributing database.A file serve is software that provides access to files across a network. A dedicated file server is a single computer dedicated to being a file server. This is useful ,for example ,if the files are large and require fast access .In such cases, a minicomputer or mainframe would be used as a file server. A distributed file server spreads the files around on individual computers instead of placing them on one dedicated computer.Advantages of the latter server include the ability to store and retrieve files on other computers and the elimination of duplicate files on each computer. A major disadvantage , however, is that individual read/write requests are being moved across the network and problems can arise when updating files. Suppose a user requests a record from a file and changes it while another user requests the same record and changes it too. The solution to this problems called record locking, which means that the first request makes others requests wait until the first request is satisfied . Other users may be able to read the record, but they will not be able to change it .A database server is software that services requests to a database across a network. For example, suppose a user types in a query for data on his or her personal computer . If the application is designed with the client/server model in mind ,the query language part on the personal computer simple sends the query across the network to the database server and requests to be notified when the data are found.Examples of distributed database systems can be found in the engineering world. Sun’s Network Filing System(NFS),for example, is used in computer-aided engineering applications to distribute data among the hard disks in a network of Sun workstation.Distributing databases is an evolutionary step because it is logical that data should exist at thelocation where they are being used . Departmental computers within a large corporation ,for example, should have data reside locally , yet those data should be accessible by authorized corporate management when they want to consolidate departmental data . DBMS software will protect the security and integrity of the database , and the distributed database will appear to its users as no different from the non-distributed database .In this information age, the data server has become the heart of a company. This one piece of software controls the rhythm of most organizations and is used to pump information lifeblood through the arteries of the network. Because of the critical nature of this application, the data server is also the one of the most popular targets for hackers. If a hacker owns this application, he can cause the company's "heart" to suffer a fatal arrest.Ironically, although most users are now aware of hackers, they still do not realize how susceptible their database servers are to hack attacks. Thus, this article presents a description of the primary methods of attacking database servers (also known as SQL servers) and shows you how to protect yourself from these attacks.You should note this information is not new. Many technical white papers go into great detail about how to perform SQL attacks, and numerous vulnerabilities have been posted to security lists that describe exactly how certain database applications can be exploited. This article was written for the curious non-SQL experts who do not care to know the details, and as a review to those who do use SQL regularly.What Is a SQL Server?A database application is a program that provides clients with access to data. There are many variations of this type of application, ranging from the expensive enterprise-level Microsoft SQL Server to the free and open source mySQL. Regardless of the flavor, most database server applications have several things in common.First, database applications use the same general programming language known as SQL, or Structured Query Language. This language, also known as a fourth-level language due to its simplistic syntax, is at the core of how a client communicates its requests to the server. Using SQL in its simplest form, a programmer can select, add, update, and delete information in a database. However, SQL can also be used to create and design entire databases, perform various functions on the returned information, and even execute other programs.To illustrate how SQL can be used, the following is an example of a simple standard SQL query and a more powerful SQL query:Simple: "Select * from dbFurniture.tblChair"This returns all information in the table tblChair from the database dbFurniture.Complex: "EXEC master..xp_cmdshell 'dir c:\'"This short SQL command returns to the client the list of files and folders under the c:\ directory of the SQL server. Note that this example uses an extended stored procedure that is exclusive to MS SQL Server.The second function that database server applications share is that they all require some form of authenticated connection between client and host. Although the SQL language is fairly easy to use, at least in its basic form, any client that wants to perform queries must first provide some form of credentials that will authorize the client; the client also must define the format of the request and response.This connection is defined by several attributes, depending on the relative location of the client and what operating systems are in use. We could spend a whole article discussing various technologies such as DSN connections, DSN-less connections, RDO, ADO, and more, but these subjects are outside the scope of this article. If you want to learn more about them, a little Google'ing will provide you with more than enough information. However, the following is a list of the more common items included in a connection request.Database sourceRequest typeDatabaseUser IDPasswordBefore any connection can be made, the client must define what type of database server it is connecting to. This is handled by a software component that provides the client with the instructions needed to create the request in the correct format. In addition to the type of database, the request type can be used to further define how the client's request will be handled by the server. Next comes the database name and finally the authentication information.All the connection information is important, but by far the weakest link is the authentication information—or lack thereof. In a properly managed server, each database has its own users with specifically designated permissions that control what type of activity they can perform. For example, a user account would be set up as read only for applications that need to only access information. Another account should be used for inserts or updates, and maybe even a third account would be used for deletes. This type of account control ensures that any compromised account is limited in functionality. Unfortunately, many database programs are set up with null or easy passwords, which leads to successful hack attacks.译文数据库管理系统介绍数据库也可以称为电子数据库,是专门组织起来的一组数据或信息,其目的是为了便于计算机快速查询及检索。

信息管理系统中英文翻译

信息管理系统中英文翻译

外文资料:Information management systemWiliam K.Thomson U.S.AAbstract:An information storage, searching and retrieval system for large (gigabytes) domains of archived textual dam. The system includes multiple query generation processes, a search process, and a presentation of search results that is sorted by category or type and that may be customized based on the professional discipline(or analogous personal characteristic of the user), thereby reducing the amount of time and cost required to retrieve relevant results.Keyword:Information management Retrieval system Object-Oriented1.INTRUDUCTIONThis invention relates to an information storage, searching and retrieval system that incorporates a novel organization for presentation of search results from large (gigabytes) domains of archived textual data.2.BACKGROUDN OF THE INVENTIONOn-line information retrieval systems are utilized for searching and retrieving many kinds of information. Most systems used today work in essentially the same manner; that is, users log on (through a computer terminal or personal microcomputer, and typically from a remote location), select a source of information (i.e., a particular database) which is usually something less than the complete domain, formulate a query, launch the search, and then review the search results displayed on the terminal or microcomputer, typically with documents (or summaries of documents) displayed in reverse chronological order. This process must be repeated each time another source (database) or group of sources is selected (which is frequently necessary in order to insure all relevant documents have been found).Additionally, this process places on the user the burden of organizing and assimilating the multiple results generated from the launch of the same query in each of the multiple sources (databases) that the user needs(or wants) to search. Present systems that allow searching of large domains require persons seeking information in these domains to attempt to modify their queries to reduce the search results to a size that the user can assimilate by browsing through them (thus, potentially eliminating relevant results).In many cases end users have been forced to use an intermediary (i.e., a professional searcher) because the current collections of sources are both complex and extensive, and effective search strategies often vary significantly from one source to another. Even with such guidance, potential relevant answers are missed because all potentially relevant databases or information sources are not searched on every query. Much effort has been expended on refining and improving source selection by grouping sources or database files together. Significant effort has also been expended on query formulation through the use of knowledge bases and natural language processing. However, as the groupings of sources become larger, and the responses to more comprehensive search queries become more complete, the person seeking information is often faced with the daunting task of sifting through large unorganized answer sets in an attempt to find the most relevant documents or information.3.SUMMARY OF THE INVENTIONThe invention provides an information storage, searching and retrieval system for a large domain of archived data of various types, in which the results of a search are organized into discrete types of documents and groups of document types so that users may easily identify relevant information more efficiently and more conveniently than systems currently in use. The system of the invention includes means for storing a large domain of data contained in multiple source records, at least some of the source records being comprised of individual documents of multiple document types; means for searching substantially all of the domain with a single search query to identify documents responsive to the query; and means for categorizing documents responsive to the query based on document type, including means for generating a summary of the number of documents responsive to the query which fall within various predetermined categories of document types.The query generation process may contain a knowledge base including a thesaurus that has predetermined and embedded complex search queries, or use natural language processing, or fuzzy logic, or tree structures, or hierarchical relationship or a set of commands that allow persons seeking information to formulate their queries.The search process can utilize any index and search engine techniques including Boolean, vector, and probabilistic as long as a substantial portion of the entire domain of archived textual data is searched for each query and all documents found are returned to the organizing process.The sorting/categorization process prepares the search results for presentation by assembling the various document types retrieved by the search engine and then arranging these basic document types into sometimes broader categories that are readily understood by and relevant to the user.The search results are then presented to the user and arranged by category along with an indication as to the number of relevant documents found in each category. The user may then examine search results in multiple formats, allowing the user to view as much of the document as the user deems necessary.4.BRIEF DESCRIPTION OF THE DRAWINGSFIG. 1 is a block diagram illustrating an information retrieval system of the invention;FIG. 2 is a diagram illustrating a query formulation and search process utilizedin the invention;FIG. 3 is a diagram illustrating a sorting process for organizing and presentingsearch results.5.BEST MODE FOR CARRYING OUT THE INVENTIONAs is illustrated in the block diagram of FIG. 1 , the information retrieval system of the invention includes an input/output process ,a query generation process, a search process that involves a large domain of textual data (typically in the multiple gigabyte range), an organizing process, presentation of the information to the user, and a process to identify and characterize the types of documents contained in the large domain of data.Turning now to FIG. 2, the query generation process preferably includes a knowledge base containing a thesaurus and a note pad, and preferably utilizes embedded predefined complex Boolean strategies. Such a system allows the user to enter their description of the information needed using simple words/phrases made up of "natural" language and to rely on the system to assist in generating the full search query, which would include, e.g., synonyms and alternate phraseology. The user can then request, by a command such as "VI CO 1", to view the completedocument selected from the list, giving, in this case, complete information about the identity and credentials of the expert.FIG. 3 illustrates how five typical sources of information (i.e., source records) can be sorted into many document types and then subsequently into categories. For example, a typical trade magazine may contain several types of information such as editorials, regular columns, feature articles, news, product announcements, and a calendar of events. Thus, the trade magazine (i.e., the source record) may be sorted into these various document types, and these document types in turn may be categorized or grouped into categories contained in one or more sets of categories; each document type typically will be sorted into one category within a set of categories, but the individual categories within each set will vary from one set to another. For example, one set of categories may be established for a first characteristic type of user, and a different set of categories may be established for a second characteristic type of user. When a user corresponding to type #1 executes a search, the system automatically utilizes the categories of set #1, corresponding to that particular type of user, in organizing the results of the search for review by the user. When a user from type #2 executes a search, however, the system automatically utilizes the categories of set #2 in presenting the search results to the user.The information storage, searching and retrieval system of the invention resolves the common difficulties in typical on-line information retrieval systems that operate on large (e.g., 2 gigabytes or more) domains of textual data, query generation, source selection, and organizing search results. The information base with the thesaurus and embedded search strategies allows users to generate expert search queries in their own "natural" language. Source (i.e., database) selection is not an issue because the search engines are capable of searching substantially the entire domain on every query. Moreover, the unique presentation of search results by category set substantially reduces the time and cost of performing repetitive searches in multiple databases and therefore of efficiently retrieving relevant search results.While a preferred embodiment of the present invention has been described, it should be understood that various changes, adaptations and modifications may be made therein without departing from the spirit of the invention and the scope of the appended claims.中文译文:信息管理系统Wiliam K.Thomson U.S.A摘要:一个信息存储,查询和检索系统主要应用于大(千兆字节)的需要存档的文字领域。

计算机专业外文翻译+原文-数据库管理系统介绍

计算机专业外文翻译+原文-数据库管理系统介绍

外文资料Database Management SystemsA database (sometimes spelled data base) is also called an electronic database , referring to any collection of data, or information, that is specially organized for rapid search and retrieval by a computer. Databases are structured to facilitate the storage, retrieval , modification, and deletion of data in conjunction with various data-processing operations .Databases can be stored on magnetic disk or tape, optical disk, or some other secondary storage device.A database consists of a file or a set of files. The information in these files may be broken down into records, each of which consists of one or more fields. Fields are the basic units of data storage , and each field typically contains information pertaining to one aspect or attribute of the entity described by the database . Using keywords and various sorting commands, users can rapidly search , rearrange, group, and select the fields in many records to retrieve or create reports on particular aggregate of data.Complex data relationships and linkages may be found in all but the simplest databases .The system software package that handles the difficult tasks associated with creating ,accessing, and maintaining database records is called a database management system(DBMS).The programs in a DBMS package establish an interface between the database itself and the users of the database.. (These users may be applications programmers, managers and others with information needs, and various OS programs.)A DBMS can organize, process, and present selected data elements form the database. This capability enables decision makers to search, probe, and query database contents in order to extract answers to nonrecurring and unplanned questions that aren’t available in regular reports. These questions might initially be vague and/or poorly defined ,but people can “browse”through the database until they have the needed information. In short, the DBMS will “manage” the stored data items and assemble the needed itemsfrom the common database in response to the queries of those who aren’t programmers.A database management system (DBMS) is composed of three major parts:(1)a storage subsystem that stores and retrieves data in files;(2) a modeling and manipulation subsystem that provides the means with which to organize the data and to add , delete, maintain, and update the data;(3)and an interface between the DBMS and its users. Several major trends are emerging that enhance the value and usefulness of database management systems;Managers: who require more up-to-data information to make effective decisionCustomers: who demand increasingly sophisticated information services and more current information about the status of their orders, invoices, and accounts.Users: who find that they can develop custom applications with database systems in a fraction of the time it takes to use traditional programming languages.Organizations : that discover information has a strategic value; they utilize their database systems to gain an edge over their competitors.The Database ModelA data model describes a way to structure and manipulate the data in a database. The structural part of the model specifies how data should be represented(such as tree, tables, and so on ).The manipulative part of the model specifies the operation with which to add, delete, display, maintain, print, search, select, sort and update the data.Hierarchical ModelThe first database management systems used a hierarchical model-that is-they arranged records into a tree structure. Some records are root records and all others have unique parent records. The structure of the tree is designed to reflect the order in which the data will be used that is ,the record at the root of a tree will be accessed first, then records one level below the root ,and so on.The hierarchical model was developed because hierarchical relationships are commonly found in business applications. As you have known, an organization char often describes a hierarchical relationship: topmanagement is at the highest level, middle management at lower levels, and operational employees at the lowest levels. Note that within a strict hierarchy, each level of management may have many employees or levels of employees beneath it, but each employee has only one manager. Hierarchical data are characterized by this one-to-many relationship among data.In the hierarchical approach, each relationship must be explicitly defined when the database is created. Each record in a hierarchical database can contain only one key field and only one relationship is allowed between any two fields. This can create a problem because data do not always conform to such a strict hierarchy.Relational ModelA major breakthrough in database research occurred in 1970 when E.F. Codd proposed a fundamentally different approach to database management called relational model ,which uses a table as its data structure.The relational database is the most widely used database structure. Data is organized into related tables. Each table is made up of rows called and columns called fields. Each record contains fields of data about some specific item. For example, in a table containing information on employees, a record would contain fields of data such as a person’s last name ,first name ,and street address.Structured query language(SQL)is a query language for manipulating data in a relational database .It is nonprocedural or declarative, in which the user need only specify an English-like description that specifies the operation and the described record or combination of records. A query optimizer translates the description into a procedure to perform the database manipulation.Network ModelThe network model creates relationships among data through a linked-list structure in which subordinate records can be linked to more than one parent record. This approach combines records with links, which are called pointers. The pointers are addresses that indicate the location of a record. With the network approach, a subordinate record can be linked to a key record and at the same time itself be a key record linked to other sets of subordinate records. The network mode historically has had a performanceadvantage over other database models. Today , such performance characteristics are only important in high-volume ,high-speed transaction processing such as automatic teller machine networks or airline reservation system.Both hierarchical and network databases are application specific. If a new application is developed ,maintaining the consistency of databases in different applications can be very difficult. For example, suppose a new pension application is developed .The data are the same, but a new database must be created.Object ModelThe newest approach to database management uses an object model , in which records are represented by entities called objects that can both store data and provide methods or procedures to perform specific tasks.The query language used for the object model is the same object-oriented programming language used to develop the database application .This can create problems because there is no simple , uniform query language such as SQL . The object model is relatively new, and only a few examples of object-oriented database exist. It has attracted attention because developers who choose an object-oriented programming language want a database based on an object-oriented model.Distributed DatabaseSimilarly , a distributed database is one in which different parts of the database reside on physically separated computers . One goal of distributed databases is the access of information without regard to where the data might be stored. Keeping in mind that once the users and their data are separated , the communication and networking concepts come into play .Distributed databases require software that resides partially in the larger computer. This software bridges the gap between personal and large computers and resolves the problems of incompatible data formats. Ideally, it would make the mainframe databases appear to be large libraries of information, with most of the processing accomplished on the personal computer.A drawback to some distributed systems is that they are often based on what is called a mainframe-entire model , in which the larger host computeris seen as the master and the terminal or personal computer is seen as a slave. There are some advantages to this approach . With databases under centralized control , many of the problems of data integrity that we mentioned earlier are solved . But today’s personal computers, departmental computers, and distributed processing require computers and their applications to communicate with each other on a more equal or peer-to-peer basis. In a database, the client/server model provides the framework for distributing databases.One way to take advantage of many connected computers running database applications is to distribute the application into cooperating parts that are independent of one anther. A client is an end user or computer program that requests resources across a network. A server is a computer running software that fulfills those requests across a network . When the resources are data in a database ,the client/server model provides the framework for distributing database.A file serve is software that provides access to files across a network. A dedicated file server is a single computer dedicated to being a file server. This is useful ,for example ,if the files are large and require fast access .In such cases, a minicomputer or mainframe would be used as a file server. A distributed file server spreads the files around on individual computers instead of placing them on one dedicated computer.Advantages of the latter server include the ability to store and retrieve files on other computers and the elimination of duplicate files on each computer. A major disadvantage , however, is that individual read/write requests are being moved across the network and problems can arise when updating files. Suppose a user requests a record from a file and changes it while another user requests the same record and changes it too. The solution to this problems called record locking, which means that the first request makes others requests wait until the first request is satisfied . Other users may be able to read the record, but they will not be able to change it .A database server is software that services requests to a database across a network. For example, suppose a user types in a query for data on his or her personal computer . If the application is designed with the client/server model in mind ,the query language part on the personal computer simplesends the query across the network to the database server and requests to be notified when the data are found.Examples of distributed database systems can be found in the engineering world. Sun’s Network Filing System(NFS),for example, is used in computer-aided engineering applications to distribute data among the hard disks in a network of Sun workstation.Distributing databases is an evolutionary step because it is logical that data should exist at the location where they are being used . Departmental computers within a large corporation ,for example, should have data reside locally , yet those data should be accessible by authorized corporate management when they want to consolidate departmental data . DBMS software will protect the security and integrity of the database , and the distributed database will appear to its users as no different from the non-distributed database .In this information age, the data server has become the heart of a company. This one piece of software controls the rhythm of most organizations and is used to pump information lifeblood through the arteries of the network. Because of the critical nature of this application, the data server is also the one of the most popular targets for hackers. If a hacker owns this application, he can cause the company's "heart" to suffer a fatal arrest.Ironically, although most users are now aware of hackers, they still do not realize how susceptible their database servers are to hack attacks. Thus, this article presents a description of the primary methods of attacking database servers (also known as SQL servers) and shows you how to protect yourself from these attacks.You should note this information is not new. Many technical white papers go into great detail about how to perform SQL attacks, and numerous vulnerabilities have been posted to security lists that describe exactly how certain database applications can be exploited. This article was written for the curious non-SQL experts who do not care to know the details, and as a review to those who do use SQL regularly.What Is a SQL Server?A database application is a program that provides clients with access todata. There are many variations of this type of application, ranging from the expensive enterprise-level Microsoft SQL Server to the free and open source mySQL. Regardless of the flavor, most database server applications have several things in common.First, database applications use the same general programming language known as SQL, or Structured Query Language. This language, also known as a fourth-level language due to its simplistic syntax, is at the core of how a client communicates its requests to the server. Using SQL in its simplest form, a programmer can select, add, update, and delete information in a database. However, SQL can also be used to create and design entire databases, perform various functions on the returned information, and even execute other programs.To illustrate how SQL can be used, the following is an example of a simple standard SQL query and a more powerful SQL query:Simple: "Select * from dbFurniture.tblChair"This returns all information in the table tblChair from the database dbFurniture.Complex: "EXEC master..xp_cmdshell 'dir c:\'"This short SQL command returns to the client the list of files and folders under the c:\ directory of the SQL server. Note that this example uses an extended stored procedure that is exclusive to MS SQL Server.The second function that database server applications share is that they all require some form of authenticated connection between client and host. Although the SQL language is fairly easy to use, at least in its basic form, any client that wants to perform queries must first provide some form of credentials that will authorize the client; the client also must define the format of the request and response.This connection is defined by several attributes, depending on the relative location of the client and what operating systems are in use. We could spend a whole article discussing various technologies such as DSN connections, DSN-less connections, RDO, ADO, and more, but these subjects are outside the scope of this article. If you want to learn more about them, a little Google'ing will provide you with more than enough information. However, the following is a list of the more common itemsincluded in a connection request.Database sourceRequest typeDatabaseUser IDPasswordBefore any connection can be made, the client must define what type of database server it is connecting to. This is handled by a software component that provides the client with the instructions needed to create the request in the correct format. In addition to the type of database, the request type can be used to further define how the client's request will be handled by the server. Next comes the database name and finally the authentication information.All the connection information is important, but by far the weakest link is the authentication information—or lack thereof. In a properly managed server, each database has its own users with specifically designated permissions that control what type of activity they can perform. For example, a user account would be set up as read only for applications that need to only access information. Another account should be used for inserts or updates, and maybe even a third account would be used for deletes. This type of account control ensures that any compromised account is limited in functionality. Unfortunately, many database programs are set up with null or easy passwords, which leads to successful hack attacks.译文数据库管理系统介绍数据库(database,有时拼作data base)又称为电子数据库,是专门组织起来的一组数据或信息,其目的是为了便于计算机快速查询及检索。

信息系统和数据库开发中英文对照外文翻译文献

信息系统和数据库开发中英文对照外文翻译文献

中英文对照外文翻译文献(文档含英文原文和中文翻译)Information System Development and DatabaseDevelopmentIn many organizations, database development from the beginning of enterprise data modeling, data modeling enterprises determine the scope of the database and the general content. This step usually occurs in an organization's information system planning process, it aims to help organizations create an overall data description or explanation, and not the design of a specific database. A specific database for one or more information systems provide data and the corporate data model (which may involve a number of databases) described by the organization maintaining the scope of the data. Data modeling in the enterprise, you review of the current system, the need to support analysis of the nature of the business areas, the need for further description of the abstract data, and planning one or more database developmentproject. Figure 1 shows Pine Valley furniture company's enterprise data model of a part.1.1 Information System ArchitectureSenior data model is only general information system architecture (ISA) or a part of an organization's information system blueprint. In the information system planning, you can build an enterprise data model as a whole information system architecture part. According to Zachman (1987), Sowa and Zachman (1992) views of an information system architecture consists of the following six key components:DataManipulation of data processing (of a data flow diagram can be used, with the object model methods, or other symbols that).Networks, which organizations and in organizations with its main transmission of data between business partners (it can connect through the network topology map and to demonstrate).People who deal with the implementation of data and information and is the source and receiver (in the process model for the data shows that the sender and the receiver).Implementation of the events and time points (they can use state transition diagram and other means.)The reasons for the incident and data processing rules (often in the form of text display, but there are also a number of charts for the planning tools such as decision tables).1.2 Information EngineeringInformation systems planners in accordance with the specific information system planning methods developed information system architecture. Information engineering is a popular and formal methods. Information engineering is a data-oriented creation and maintenance of the information system. Information engineering is because the data-oriented, so when you begin to understand how the database is defined by the logo and when information engineering a concise explanation is very helpful. Information Engineering follow top-down planning approach, in which specific information systems from a wide range of informationneeds in the understanding derived from (for example, we need about customers, products, suppliers, sales and processing of the data center), rather than merging many detailed information requested ( orders such as a screen or in accordance with the importation of geographical sales summary report). Top-down planning will enable developers to plan more comprehensive information system, consider system components provide an integrated approach to enhance the information system and the relationship between the business objectives of the understanding, deepen their understanding of information systems throughout the organization in understanding the impact.Information Engineering includes four steps: planning, analysis, design and implementation. The planning stage of project information generated information system architecture, including enterprise data model.1.3 Information System PlanningInformation systems planning objective is to enable IT organizations and the business strategy closely integrated, such integration for the information systems and technology to make the most of the investment interest is very important. As the table as a description, information engineering approach the planning stage include three steps, we in the follow-up of three sections they discussed.1. Critical factors determining the planningPlanning is the key factor that organizational objectives, critical success factors and problem areas. These factors determine the purpose of the establishment of planning and environment planning and information systems linked to strategic business planning. Table 2 shows the Pine Valley furniture company's key planning a number of possible factors, these factors contribute to the information systems manager for the new information systems and databases clubs top priority to deal with the demand. For example, given the imprecise sales forecasts this problem areas, information systems managers in the organization may be stored in the database additional historical sales data, new market research data and new product test data.2. The planning organizations set targetsOrganizations planning targets defined scope of business, and business scope will limit the subsequent analysis and information systems may change places. Five key planning targets as follows:● organizational units in the various sectors.● organizations location of the place of business operations.● functions of the business support organizations handling mission of the relevant group. Unlike business organizations function modules, in fact a function can be assigned to various organizations modules (for example, product development function is the production and sale of the common responsibility of the Ministry).● types of entities managed by the organization on the people, places and things of the major types of data.● Information System data set processing software applications and support procedures.3. To set up a business modelA comprehensive business model including the functions of each enterprise functional decomposition model, the enterprise data model and the various planning matrix. Functional decomposition is the function of the organization for a more detailed decomposition process, the functional decomposition is to simplify the analysis of the issue, distracted and identify components and the use of the classical approach. Pine Valley furniture company in order to function in the functional decomposition example in figure 2 below. In dealing with business functions and support functions of the full set, multiple databases, is essential to a specific database therefore likely only to support functions (as shown in Figure 2) provide a subset of support. In order to reduce data redundancy and to make data more meaningful, has a complete, high-level business view is very helpful.The use of specific enterprise data model to describe the symbol. Apart from the graphical description of this type of entity, a complete enterprise data model should also include a description of each entity type description of business operations and a summary of that business rules. Business rules determine the validity of the data.An enterprise data model includes not only the types of entities, including the link between the data entities, as well as various other objects planning links. Showed that the linkage between planning targets a common form of matrix. Because of planning matrix need not be explicit modeling database can be clearly described business needs, planning matrix is an important function. Regular planning matrix derived from theoperational rules, it will help social development activities that top priority will be sorting and development activities under the top-down view through an enterprise-wide approach for the development of these activities. There are many types of planning matrix is available, their commonalities are:● locations - features show business function in which the implementation of operational locations.● unit - functions which showed that business function or business unit responsible for implementation.● Information System - data entities to explain how each information system interact with each data entity (for example, whether or not each system in each entity have the data to create, retrieve, update and delete).● support functions - data in each functional entities in the data set for the acquisition, use, update and delete.● Information System - target indication for each information system to support business objectives.Data entities matrix. Such a matrix can be used for a variety of purposes, including the following three objectives:1) identify gaps in the data entities to indicate the types of entities not use any function or functions which do not use any entity.2) found that the loss of each functional entities involved in the inspection staff through the matrix to identify any possible loss of the entity.3) The distinction between development activities if the priority to the top of a system development function for a high-priority (probably because it important organizational objectives related), then this area used by entities in the development of the database has a high priority. Hoffer, George and Valacich (2002) are the works of the matrix on how to use the planning and completion of the Information Engineering.The planning system more complete description.2 database development processBased on information engineering information systems planning database is a source of development projects. These new database development projects is usuallyin order to meet the strategic needs of organizations, such as improving customer support, improve product and inventory management, or a more accurate sales forecast. However, many more database development project is the bottom-up approach emerging, such as information system user needs specific information to complete their work, thus beginning a project request, and as other information systems experts found that organizations need to improve data management and begin new projects. Bottom-up even in the circumstances, to set up an enterprise data model is also necessary to understand the existing database can provide the necessary data, otherwise, the new database, data entities and attributes can be added to the current data resources to the organization. Both the strategic needs or operational information needs of each database development projects normally concentrated in a database. Some projects only concentrated in the database definition, design and implementation of a database, as a follow-up to the basis of the development of information systems. However, in most cases, the database and associated information processing function as a complete information systems development project was part of the development.2.1 System Development Life CycleGuide management information system development projects is the traditional process of system development life cycle (SDLC). System development life cycle is an organization of the database designers and programmers information system composed of the Panel of Experts detailed description, development, maintenance and replacement of the entire information system steps. This process is because Waterfall than for every step into the adjacent the next step, that is, the information system is a specification developed by a piece of land, every piece of the output is under an input. However shown in the figure, these steps are not purely linear, each of the steps overlap in time (and thus can manage parallel steps), but when the need to reconsider previous decisions, but also to roll back some steps ahead. (And therefore water can be put back in the waterfall!)Figure 4 on the system development life cycle and the purpose of each stage of the product can be delivered concise notes. The system development life cycle including each stage and database development-related activities, therefore, the question of database management systems throughout the entire development process. In Figure 5 we repeat of the system development life cycle stage of the seven, and outlines thecommon database at each stage of development activities. Please note that the systems development life cycle stages and database development steps一一对应exists between the relationship between the concept of modeling data in both systems development life cycle stages between.Enterprise ModelingDatabase development process from the enterprise modeling (system development life cycle stage of the project feasibility studies, and to choose a part), Organizations set the scope and general database content. Enterprise modeling in information systems planning and other activities, these activities determine which part of information systems need to change and strengthen the entire organization and outlines the scope of data. In this step, check the current database and information systems, development of the project as the main areas of the nature of the business, with a very general description of each term in the development of information systems when needed data. Each item only when it achieved the expected goals of organizations can be when the next step.Conceptual Data ModelingOne has already begun on the Information System project, the concept of data modeling phase of the information systems needs of all the data. It is divided into two stages. First, it began the project in the planning stage and the establishment of a plan similar to Figure 1. At the same time outlining the establishment of other documents to the existing database without considering the circumstances specific development projects in the scope of the required data. This category only includes high-level data (entities), and main contact. Then in the system development life-cycle analysis stage must have a management information system set the entire organization Details of the data model definition of all data attributes, listing all data types that all data inter-entity business linkages, defining description of the full data integrity rules. In the analysis phase, but also the concept of inspection data model (also called the concept behind the model) and the goal of information systems used to explain other aspects of the model of consistency categories, such as processing steps, rules and data processing time of timing. However, even if the concept is such detailed data model is only preliminary, because follow-up information system life cycle activities in the design of services, statements, display and inquiries may find that missing element or mistakes. Therefore, the concept of data often said that modeling is atop-down manner, its areas of operation from the general understanding of the driver, rather than the specific information processing activities by the driver.3. Logical Database DesignLogical database design from two perspectives database development. First, the concept of data model transform into relational database theory based on the criteria that means - between. Then, as the design of information systems, every computer procedures (including procedures for the input and output format), database support services, statements, and inquiries revealed that a detailed examination. In this so-called Bottom-up analysis, accurate verification of the need to maintain the database and the data in each affairs, statements and so on the needs of those in the nature of the data.For each separate statements, services, and so on the analysis must take into account a specific, limited but complete database view. When statements, services, and other analysis might be necessary to change the concept of data model. Especially in large-scale projects, the different analytical systems development staff and the team can work independently in different procedures or in a centralized, the details of their work until all the logic design stage may be displayed. In these circumstances, logic database design stage must be the original concept of data model and user view these independent or merged into a comprehensive design. In logic design information systems also identify additional information processing needs of these new demands at this time must be integrated into the logic of earlier identified in the database design.Logical database design is based on the final step for the formation of good data specifications and determine the rules, the combination, the data after consultation specifications or converted into basic atomic element. Most of today's database, these rules from the relational database theory and the process known as standardization. This step is the result of management of these data have not cited any database management system for a complete description of the database map. Logical database design completed, we began to identify in detail the logic of the computer program and maintenance, the report contents of the database for inquiries.4. Physical database design and definitionPhysical database design and definition phase decisions computer memory (usuallydisk) database in the organization, definition of According to the library management system for physical structure, the procedures outlined processing services, produce the desired management information and decision support statements. The objective of this stage is to design an effective and safe management of all data-processing database, the physical database design to closely integrate the information systems of other physical aspects of the design, including procedures, computer hardware, operating systems and data communications networks.5. Database ImplementationThe database prepared by the realization stage, testing and installation procedures for handling databases. Designers can use the standard programming language (such as COBOL, C or Visual Basic), the dedicated database processing languages (such as SQL), or the process of the non-exclusive language programming in order to produce a statement of the fixed format, the result will be displayed, and may also include charts. In achieving stage, but also the completion of all the database files, training users for information systems (database) user setup program. The final step is to use existing sources of information (documents legacy applications and databases and now needs new data) loading data. Loading data is often the first step in data from existing files and databases to an intermediate format (such as binary or text files) and then to turn intermediate loading data to a new database. Finally, running databases and related applications for the actual user maintenance and retrieval of data. In operation, the regular backup database and the database when damaged or affected resume database.6. Database maintenanceDuring the database in the progressive development of database maintenance. In this step, in order to meet changing business conditions, in order to correct the erroneous database design, database applications or processing speed increase, delete or change the structure of the database. When a procedure or failure of the computer database affect or damage the database may also be reconstruction. This step usually is the longest in the database development process step, as it continued to databases and related applications throughout the life cycle, the development of each database can be seen as a brief database development process and data modeling concepts arise, logical and physical database design and database to achieve dealing with the changes.2.2 Information System developed by other meansSystem Development Life Cycle minor changes in law or its variant of the often used to guide information systems and database development. Information System is a life-cycle methodology, it is highly structured approach, which includes many checks and balances to ensure that every step of produce accurate results, and new or alternative information system and it must communications or data definitions consistent existing system needs consistency. System development life cycle because of the regular need to have a working system for a long time been criticized because only work in the system until the end of the whole process generated. More and more organizations now use rapid application development method, it is a includes analysis, design and implementation of steps to repeat the rapid iterative process until convergence to users the system so far. Rapid Application Development Act required the database has been in existence, and enhance system is mainly to the application of data retrieval application, but not to those who generate and modify database applications.The most widely used method of rapid application development is one of the prototype. The prototype system is a method of iterative development process, analysts and users through close co-operation, continuing to revise the system will eventually convert all the needs of a working system. Figure 6 shows prototype of the process. In this diagram we contains notes, briefly describes each stage of the prototype of the database development activities. Normally, when information systems problems were identified, tried only a rough concept of data modeling. In the development of the initial prototype, the design of the user wants to display and statements, and that any new database needs and define a term prototype database. This is usually a new database, copy the part of the existing system, but might also added some new content. When the need for new content, these elements are usually from external data sources, such as market research data, the general economic indicators or industry standards.When a prototype of a new version to repeat the achievement and maintenance of database activities. Usually only a minimum level of security and integrity control, because at this time the focus is as soon as possible to produce a prototype version can be used. But document management project also deferred to the final, only be used in the delivery of user training. Finally, once constructed an acceptable prototype,developers, and users will be the final decision of whether to prototype delivery and the use of the database. If the system (including database) efficiency is very low, then the system and database will be re-programming and re-organization in order to achieve the desired performance.Along with visual programming tools (such as Visual Basic, Java, Visual C + + and fourth generation language) increasingly popular use of visual programming tools can easily change the user interface with the system, the prototype is becoming the choice of system development methodology. Customers using the prototype method statements and show changes to the content and layout is quite easy. In the process, the new database needs were identified, so it is the development of the use of the existing database should be amended. There is even the possibility of a need for a new database system prototype method, in such circumstances, when the system demand in the iterative process of development in the ever-changing needs access to sample data, the construction or reconstruction of the database prototype.3 database development of the three-tier architecture modelIn this article on the front of the database development process mentioned in the interpretation of a system development project on the establishment of the several different, but related database view or model:● conceptual model (in the analysis stage of the establishment).● external model or user view (in the analysis phase and the establishment of logical design phase).● physical model or internal model (in the physical design phase of the establishment).Figure 7 describes the database view that the relationship between the three, it is important to remember that they are the same organizations database view or model. In other words, each organization has a database of the physical model, a concept model and one or more users view.Therefore, the three-tier architecture model using the same data set observe the different ways definition database.Concept models on the full database structure, has nothing to do with the technical specifications. Conceptual model definition do not involve the entire database datastored in the computer how the secondary memory. Usually, the conceptual model by entities - links (E-R) map or object modeling symbols such a graphical format to describe, we have this type of concept model called the data model. In addition, the conceptual model specification as a metadata stored in the database or data dictionary.Physical models including conceptual model of how data stored in computer memory in the two specifications. Analysts and the database design is as important to the physical database (physical mode) definition, it provides information on the distribution and management of data storage and access of the physical memory space of two full database technology specifications.Database development and database technology database is among the three models divided into basis. Database development projects may have a role to only deal with these three views of a related work. For example, a beginner may be designed for one or more procedures external model, and an experienced developer will design the physical model or conceptual model. Database design issues at different levels are quite different.4 three-tier structure of the database positioning systemObviously, all the good things in the database are, and the "three"!When designing a database, you have to choose where to store data. This option in the physical database design stage. Database is divided into individual databases, the Working Group database, departmental databases, corporate databases and the Internet database. Individuals often by the end-user database design and development of their own, just by database experts to give training and advice to help, it only contains individual end-users interested in the data. Sometimes, personal database from the database or enterprise Working Group extracted from the database, such circumstances database prepared by some experts from the regular routine to create local database. Sector Working Group database and the database is often the end-user, business experts and the central database system experts development. The collaborative work of these officers is necessary because in the design of the database to be shared by a large number of issues weigh: processing speed, ease of use, data definition differences and other similar problems. Due to corporate databases and the Internet database broad impact, large-scale, it is normally concentrated in the database development team has received professional training to develop a database of experts.1. Customers layerA desktop or notebook also known as that layer, which specialized management user interface and system localization data in this layer can be implemented on the Web scripting tasks.2. Server / Web serverHTTP protocol handling, scripting tasks, the implementation of computing and provide data access, the layer known as processing services layer.3. Enterprise Server (Minicomputer or mainframe) layerThe implementation of complex computing and inter-organizational management from multiple data sources of data integration, also known as data services layer.In an organization, hierarchical database and information system architecture for distributed computing and the client / server architecture of the concept of correlation. Client / server architecture based on a LAN environment, including servers (referred to as database server or database engine) database software implementation from the client workstation database orders, each customer applications focus on their user interface functions. In fact, the whole concept of the database (as well as the application of these databases to handle routine) as a distributed database or the separate but related physical database distribution in the local PC workstation, server intermediate (working group or sector) and one center server (departments or enterprises ). Simply said that the use of client / server architecture for:● it can handle multiple processors on the same application at the same time, improve application response time and data processing speed.● It can use each computer platform of the best data processing (such as PC Minicom Advanced user interface with the mainframe and computing speed).● can mix various client technology (Intel or Motorola processor assembly of personal computers, computer networks, information kiosks, etc.) and public data sharing. In addition, you can change the technology at any layer and other layers only a small influence on the system module.● able to handle close to the data source to be addressed to improve response time and reduce network traffic.。

数据库管理系统介绍-外文翻译说课材料

数据库管理系统介绍-外文翻译说课材料

外文资料Database Management SystemsA database (sometimes spelled data base) is also called an electronic database , referring to any collection of data, or information, that is specially organized for rapid search and retrieval by a computer. Databases are structured to facilitate the storage, retrieval , modification, and deletion of data in conjunction with various data-processing operations .Databases can be stored on magnetic disk or tape, optical disk, or some other secondary storage device.A database consists of a file or a set of files. The information in these files may be broken down into records, each of which consists of one or more fields. Fields are the basic units of data storage , and each field typically contains information pertaining to one aspect or attribute of the entity described by the database . Using keywords and various sorting commands, users can rapidly search , rearrange, group, and select the fields in many records to retrieve or create reports on particular aggregate of data.Complex data relationships and linkages may be found in all but the simplest databases .The system software package that handles the difficult tasks associated with creating ,accessing, and maintaining database records is called a database management system(DBMS).The programs in a DBMS package establish an interface between the database itself and the users of the database.. (These users may be applications programmers, managers and others with information needs, and various OS programs.)A DBMS can organize, process, and present selected data elements form the database. This capability enables decision makers to search, probe, and query database contents in order to extract answers to nonrecurring and unplanned questions that aren’t available in regular reports. These questions might initially be vague and/or poorly defined ,but people can “browse” through the database until they have the needed information. In short, the DBMS will “manage” the stored data items and assemble the needed items from the common database in response to the queries of those who aren’t programmers.A database management system (DBMS) is composed of three major parts:(1)a storage subsystem that stores and retrieves data in files;(2) a modeling and manipulation subsystem that provides the means with which to organize the data and to add , delete, maintain, and update the data;(3)and an interface between the DBMS and its users. Several major trends are emerging that enhance the value and usefulness of database management systems;Managers: who require more up-to-data information to make effective decisionCustomers: who demand increasingly sophisticated information services and more current information about the status of their orders, invoices, and accounts.Users: who find that they can develop custom applications with database systems in a fraction of the time it takes to use traditional programming languages.Organizations : that discover information has a strategic value; they utilize their database systems to gain an edge over their competitors.The Database ModelA data model describes a way to structure and manipulate the data in a database. The structural part of the model specifies how data should be represented(such as tree, tables, and so on ).The manipulative part of the model specifies the operation with which to add, delete, display, maintain, print, search, select, sort and update the data.Hierarchical ModelThe first database management systems used a hierarchical model-that is-they arranged records into a tree structure. Some records are root records and all others have unique parent records. The structure of the tree is designed to reflect the order in which the data will be used that is ,the record at the root of a tree will be accessed first, then records one level below the root ,and so on.The hierarchical model was developed because hierarchical relationships are commonly found in business applications. As you have known, an organization char often describes a hierarchical relationship: top management is at the highest level, middle management at lower levels, and operational employees at the lowest levels. Note that within a strict hierarchy, each level of management may have many employees or levels of employees beneath it, but each employee has only one manager. Hierarchical data are characterized by this one-to-many relationship among data.In the hierarchical approach, each relationship must be explicitly defined when the database is created. Each record in a hierarchical database can contain only one key field and only one relationship is allowed between any two fields. This can create a problem because data do not always conform to such a strict hierarchy.Relational ModelA major breakthrough in database research occurred in 1970 when E. F. Codd proposed a fundamentally different approach to database management called relational model ,which uses a table as its data structure.The relational database is the most widely used database structure. Data is organized into related tables. Each table is made up of rows called and columns called fields. Each record contains fields of data about some specific item. For example, in a table containing information on employees, a recordwould contain fields of data such as a person’s last name ,first name ,and street address.Structured query language(SQL)is a query language for manipulating data in a relational database .It is nonprocedural or declarative, in which the user need only specify an English-like description that specifies the operation and the described record or combination of records. A query optimizer translates the description into a procedure to perform the database manipulation.Network ModelThe network model creates relationships among data through a linked-list structure in which subordinate records can be linked to more than one parent record. This approach combines records with links, which are called pointers. The pointers are addresses that indicate the location of a record. With the network approach, a subordinate record can be linked to a key record and at the same time itself be a key record linked to other sets of subordinate records. The network mode historically has had a performance advantage over other database models. Today , such performance characteristics are only important in high-volume ,high-speed transaction processing such as automatic teller machine networks or airline reservation system.Both hierarchical and network databases are application specific. If a new application is developed ,maintaining the consistency of databases in different applications can be very difficult. For example, suppose a new pension application is developed .The data are the same, but a new database must be created.Object ModelThe newest approach to database management uses an object model , in which records are represented by entities called objects that can both store data and provide methods or procedures to perform specific tasks.The query language used for the object model is the same object-oriented programming language used to develop the database application .This can create problems because there is no simple , uniform query language such as SQL . The object model is relatively new, and only a few examples of object-oriented database exist. It has attracted attention because developers who choose an object-oriented programming language want a database based on an object-oriented model. Distributed DatabaseSimilarly , a distributed database is one in which different parts of the database reside on physically separated computers . One goal of distributed databases is the access of information without regard to where the data might be stored. Keeping in mind that once the users and their data are separated , the communication and networking concepts come into play .Distributed databases require software that resides partially in the larger computer. This software bridges the gap between personal and large computers and resolves the problems of incompatible dataformats. Ideally, it would make the mainframe databases appear to be large libraries of information, with most of the processing accomplished on the personal computer.A drawback to some distributed systems is that they are often based on what is called a mainframe-entire model , in which the larger host computer is seen as the master and the terminal or personal computer is seen as a slave. There are some advantages to this approach . With databases under centralized control , many of the problems of data integrity that we mentioned earlier are solved . But today’s personal computers, departmental computers, and distributed processing require computers and their applications to communicate with each other on a more equal or peer-to-peer basis. In a database, the client/server model provides the framework for distributing databases.One way to take advantage of many connected computers running database applications is to distribute the application into cooperating parts that are independent of one anther. A client is an end user or computer program that requests resources across a network. A server is a computer running software that fulfills those requests across a network . When the resources are data in a database ,the client/server model provides the framework for distributing database.A file serve is software that provides access to files across a network. A dedicated file server is a single computer dedicated to being a file server. This is useful ,for example ,if the files are large and require fast access .In such cases, a minicomputer or mainframe would be used as a file server. A distributed file server spreads the files around on individual computers instead of placing them on one dedicated computer.Advantages of the latter server include the ability to store and retrieve files on other computers and the elimination of duplicate files on each computer. A major disadvantage , however, is that individual read/write requests are being moved across the network and problems can arise when updating files. Suppose a user requests a record from a file and changes it while another user requests the same record and changes it too. The solution to this problems called record locking, which means that the first request makes others requests wait until the first request is satisfied . Other users may be able to read the record, but they will not be able to change it .A database server is software that services requests to a database across a network. For example, suppose a user types in a query for data on his or her personal computer . If the application is designed with the client/server model in mind ,the query language part on the personal computer simple sends the query across the network to the database server and requests to be notified when the data are found.Examples of distributed database systems can be found in the engineering world. Sun’s Network Filing System(NFS),for example, is used in computer-aided engineering applications to distribute data among the hard disks in a network of Sun workstation.Distributing databases is an evolutionary step because it is logical that data should exist at thelocation where they are being used . Departmental computers within a large corporation ,for example, should have data reside locally , yet those data should be accessible by authorized corporate management when they want to consolidate departmental data . DBMS software will protect the security and integrity of the database , and the distributed database will appear to its users as no different from the non-distributed database .In this information age, the data server has become the heart of a company. This one piece of software controls the rhythm of most organizations and is used to pump information lifeblood through the arteries of the network. Because of the critical nature of this application, the data server is also the one of the most popular targets for hackers. If a hacker owns this application, he can cause the company's "heart" to suffer a fatal arrest.Ironically, although most users are now aware of hackers, they still do not realize how susceptible their database servers are to hack attacks. Thus, this article presents a description of the primary methods of attacking database servers (also known as SQL servers) and shows you how to protect yourself from these attacks.You should note this information is not new. Many technical white papers go into great detail about how to perform SQL attacks, and numerous vulnerabilities have been posted to security lists that describe exactly how certain database applications can be exploited. This article was written for the curious non-SQL experts who do not care to know the details, and as a review to those who do use SQL regularly.What Is a SQL Server?A database application is a program that provides clients with access to data. There are many variations of this type of application, ranging from the expensive enterprise-level Microsoft SQL Server to the free and open source mySQL. Regardless of the flavor, most database server applications have several things in common.First, database applications use the same general programming language known as SQL, or Structured Query Language. This language, also known as a fourth-level language due to its simplistic syntax, is at the core of how a client communicates its requests to the server. Using SQL in its simplest form, a programmer can select, add, update, and delete information in a database. However, SQL can also be used to create and design entire databases, perform various functions on the returned information, and even execute other programs.To illustrate how SQL can be used, the following is an example of a simple standard SQL query and a more powerful SQL query:Simple: "Select * from dbFurniture.tblChair"This returns all information in the table tblChair from the database dbFurniture.Complex: "EXEC master..xp_cmdshell 'dir c:\'"This short SQL command returns to the client the list of files and folders under the c:\ directory of the SQL server. Note that this example uses an extended stored procedure that is exclusive to MS SQL Server.The second function that database server applications share is that they all require some form of authenticated connection between client and host. Although the SQL language is fairly easy to use, at least in its basic form, any client that wants to perform queries must first provide some form of credentials that will authorize the client; the client also must define the format of the request and response.This connection is defined by several attributes, depending on the relative location of the client and what operating systems are in use. We could spend a whole article discussing various technologies such as DSN connections, DSN-less connections, RDO, ADO, and more, but these subjects are outside the scope of this article. If you want to learn more about them, a little Google'ing will provide you with more than enough information. However, the following is a list of the more common items included in a connection request.Database sourceRequest typeDatabaseUser IDPasswordBefore any connection can be made, the client must define what type of database server it is connecting to. This is handled by a software component that provides the client with the instructions needed to create the request in the correct format. In addition to the type of database, the request type can be used to further define how the client's request will be handled by the server. Next comes the database name and finally the authentication information.All the connection information is important, but by far the weakest link is the authentication information—or lack thereof. In a properly managed server, each database has its own users with specifically designated permissions that control what type of activity they can perform. For example, a user account would be set up as read only for applications that need to only access information. Another account should be used for inserts or updates, and maybe even a third account would be used for deletes. This type of account control ensures that any compromised account is limited in functionality. Unfortunately, many database programs are set up with null or easy passwords, which leads to successful hack attacks.译文数据库管理系统介绍数据库也可以称为电子数据库,是专门组织起来的一组数据或信息,其目的是为了便于计算机快速查询及检索。

软件工程毕业论文外文文献—信息管理系统简介

软件工程毕业论文外文文献—信息管理系统简介

外文原文The information management system brief introductionA.output background of the management information systemThe information is a kind of resources, in pass by of 30 years, the every trade usually all had not a few managers and administrations the mastermind treated the data processing and calculators isolatedly.Result in the reason of this kind of viewpoint is, the data processing( DP) and the information service( IS) the personnel does not wish to use easily drive the language that customer( namely the personnel of" usage" calculator) comprehend and customer carries on the exchanges.The manager lacks the interest and inabilities as dint to this kind of exchanges, cause defer the development of the calculator system, thus fostering to live in isolation in many other aspects and the phenomenon of the redundancy labor.Communicate with the information attendant in the customer aspect, there is no an unit hope can make perfect, but, have some units indeed to have already obtained the more very successful experience.The customer thinks with some units of the information attendant match tacit understanding:This kind of successful reason lie in, the customer has already controled basic knowledge of the calculator and the information resources management.It is thus clear that, customer the manager controls the knowledge of this aspect is very necessary.Perfectly right, the information serve what professional personnel is to have this aspect knowledge, but to use a manager to acquire these knowledges, must pass the regular study, reading and fulfillments.Together between the information attendant relation of appropriate processing customer, can strengthen the both parties to work in coordination.For building up and supporting an information system of high quantity, the everyone must respect the will of the other party.The good and bad of the system quantity is direct to become the direct proportion with customer and a quality for work in coordination of the information attendant.Every those customer managers who would not like to control the basic knowledge of relevant calculator and the information resources management aspects and administration mastermind, will become the behind the time necessarily, participate the development trends that the information system develops the process directly in current this kind of encouragementcustomer especially under.Recommend in the past, customer manager to a large extent is depend on the information attendant, the information system that development and realizations need of.Owing to the information service needs the continuous development variety, leaving the responsibility that discriminates and raises the system now to customer- this is also a reason should of.The customer participates the development of the information system morely, this kind of trend as early as 70's the middle started, and, from that time hereafter develop constantly, have already entered the information attendant now together ages of the customer cooperation.Because only have the customer to even understand that they want to get from the information system by themselves what.The customer participates the typical model case performance of the information resources management( IRM) in the distribute type data processing( DDP) aspect.In this aspect, the customer not only need to attend the development of the system, and but also need to be responsible for the hardware equipments that manage the system movement's demand and personnel.People did not know until most in the last few years:The information is a kind of resources, must take into the exploitation to this kind of worthy resources, don't make it the white white run to waste.In compete the environment of the vehemence, manager and administration the mastermind must make use of the information availably, otherwise hard have a foothold in the invincible position.In the past, manager only the calculator see is a saving money of tool, but now, the calculator is see is a tool that created the profits.Each companies have a great deal of of, didn't°yet discover of, can make use of the potential of the calculator and the information resources.Discover this kind of potential the knowledge level of the calculator and the information processing that demand have, is most managers and the administration mastermind's what lies in one's powers of.B.basic type of the information systemThe information system can be artificial or according to calculator of, independent or comprehensive of, become to criticize processing of or machine of.The usual information system is the combination of above-mentioned various type.Certainly it can't be independent again comprehensive,1.The independent system is for satisfying a certain and particular applied realm( such as, personal management) but design.The independent system contain itsown document, these documents take to have the certain redundancy by all means.2.The comprehensive information system passes the data that they use but drive comprehensive together.The system makes use of a database with commonly shared resources to attain the comprehensive purpose.For example, the wages system requests to find out the data from the human resource system and accountancy's systems in go order.3.Taking the artificial system as the foundation has already developped a calculator information system of various each kind.So far, while carry on the artificial" the calculator turn", still lack to design the experience and( or) the want for information attendants and exchanges between customers.Also is to say, drew lessons from the workflow of the artificial system directly according to the workflow of the system of the ually these systems are independent, and used to only the calculator to handle the machine for the data.While design these systems, few in consideration of end want intention that they synthesize.4.The information system also can press criticize processing, the machine processing or two combinationses to categorize.In become criticize handle system, divide business and datas to criticize a ground of processing or the creation statement.For example, the bank code a great deal of check, then at a day end, criticize the place check separately, row preface and carry on the processing.Again such as, for prevent°froming the airline pulling in the tower a sell the ticket to order with in Atlanta of another sell the last ticket that the ticket orders to sell some one service gone to San Francisco from Los Angeles at the same time, the airline system book the ticket to must be the machine of , with the current appearance of the reflection database.Most s machine information system also has results to show the request of criticize the processing.Even appeared the information resources management( IRM) system, and after the potential of the calculator information system got extensive acknowledgement, most systems are still independent criticize to handle the system.Now these system in the most has already lost the use value, and is re- designed comprehensive of, the system of the machine .Pass the definition can know,"ing comprehensive" to request the business realm manager and company the leadership cooperates closely.The information serve the professional personnel and can be the adviser, but relevant comprehensive information system and the business realm of conflict and difference then should be solve by the customer group.Environment that solves these differences to synthesizewith the real realization is the information attendant to customer the manager put forward of challenge.C.social influence of the information systemThe social influence of various company information system is the responsibility that the information serves the manager and professional realm managers.Should check all plans in of and existing information system, to distinguish whether these systems will bring the harmful society influence or not.Should check the existing system with regularity specially.The society influence may be internal, be also likely to be exterior or two and but have it.The serious degree of affect will involve from the officers and workers not like this kind of short date of a certain new method to affect because the calculator turns but makes some officers and workerses reduce such long-term influence.These circumstances explained the information system harmful internal society influence.If know that the particular and applied system that a certain calculator of realization( under the condition of some, only is design) turn will bring the harmful society influence in advance, so customer the manager should serve the manager and company management section with information to cooperate, responding this kind of influence to contract to minimum extent.The exterior society influence involves with those person who the company has the friendly intercourse.( customer, client, attendant, creditor etc.)The change of a certain procedure is also possible to bring important influence to the image of the companies, thus also affecting the profits of the company.For example, a very and greatly the nationwide public enterprise company decision repeal is in 12 service organizations of small town, then request the residents of these towns and will pay to mail the company originally department, that company did not estimate the influence that this kind of change on the policy bring.The residents are angry with can't directly hand over style give native organization.Unique result is the organization that the public enterprise company must re- set up those places, and examine from the beginning lately- install accept the debt system.D.the function and the responsibility of the customer and the information service departmentA quantity of information system and a benefits with future company, on the very big degree dependence hence denied to rule the function and the responsibility of the customer andthe information service department clearly.The function and responsibilities of the underneath are in keeping with to most units, however for ising suitable for own circumstance and shoulding still make a little amount of modification.The function and the responsibility of the customer:1.The information system policy committee( ISPC).The information serves the deluxe coordination commission, usually being leader by the high class of the customer to constitute.Therefore, the responsibility of that committee is the responsibility of the customer.ISPC approval to some gravenesses request that information serve, build up having the initiative the class system, solve the difference between each section and build up the first- degree information service counterplan of company.2.Accept the reform.The calculator turn, in regard to its essence, mean the reform.But the person does not wish to accept the reform essentially.The whole section brush-off of the some business realm carries out the circumstance of an information system not seldom seen.Even if to the personnel assurance of that section and they also believe that the end product will raise the rate of production that they work and make under personal satisfied circumstance, also still such.The manager of the customer has the responsibility creation the appropriate environment to accept the ineluctable reform- carry out a calculator information system in that company.Perform is one of the best paths that encouragement accepts to reform probably.Perform a successful information system( is the company inner part in spite of of or exterior of) needs to cost some time properly.Should encourage the people to carry on the exchanges with those persons who turns the aspect to be subjected to" frustrate" in the calculator.3.The system service claim.The plait writes the service claim and hands over is the responsibility of the end customer for the information service department.4.To the support of the information service item.Isn't the member of an item set even if, customer the manager still should participate the activity of the item, because the end product of the item set is end will to the method, work of the section and succeed to produce the important influence.Should request the customer manager is after each important stage complete" the signing approve".Some customer managers exist a kind of innocent viewpoint,they think that the normal progress of the item is a naturally of, but system will completely according to hope to was so complete, the procedure that signing approve is the responsibility of the customer, and for the success of the item is to go to pass important.This kind of signing not only mean the satisfied approval that designs to the basic system, and but also mean the approbation toward the detailed function manual.Manager and their employees of customers should meet the relevant item to constitute the member, comprehending and agreeing with the system suggest for them every way to carry on the pit actually.At the stage of Ⅱend can't still over-emphasize the importance of the signing approbation, because the that time system function a manual still" is freeze of".At the system of the modification ratio that stage of Ⅱdo realization after do the manpower that same modification need to want to be little and have to have another.For example, may need a person only to the modification of some document design to can complete no longer than a day in stage of Ⅱ , but after system carry out, do the same modification and may request several individuals to do a few months.The customer should find out the blemish as early as possible, and before understanding the system thoroughly, before use the section satisfaction, do not sign the approbation.cate.The manager of the customer and customer the personnel is responsible for the training that provides the business to the information attendant.( for example, stock method, the open account principle...etc.)According to the size of the item set, this kind of training can summit the form to carry on with the personal form or group.If customer the manager can recommend some informations sources( such as book, magazine, regular course...etc.) that can make use of also helpful to training.The customer also may need to be some to have something to do with training of calculator and the information system of knowledge.The information service department will be responsible for this kind of training.The customer just attends the training.The contents of this kind of training includes to be like how to use the calculator hardware, according to the work principle of the calculator system and involve the training of not deeply general calculator knowledge etc. topic.6.The data records to go into.According to the scope that the traditional information service working talent distribute, the customer group may participate almost all aspects of theinformation service.( include to record to go into the program design from the data)At least, the customer section wants to be responsible for the importation of the system.In the machine system, the data importation still include to is a readable form of machine the original data conversion that comes from the video frequency manifestation equipments.In become criticize handle system, the customer is responsible for completing accurate and legal original data.Then record these original datas criticize separately erupt the data of send to the information service into the section.This kind of a serious problem that becomes to criticize to turn to record the processing is many character lists are" illegal" in the original data, this will cause to usually make a phone call for the customer section or seek to come or saved into in the database bad or the data of the mistake.The manager of the customer should know the legitimacy and the accuracy equal importance of the character list.Should encourage the importance that clerk's personnel knows accurate and clean and neat twos.7.For provide of information service hand over the fee.According to the dissimilarity of each company policy, the service that the customer section may provide to the information service department pay all or parts of expenses or not pay, have already adopted a typical model to charge those companies of system and will consult with, analyze the member and program designs service, use the hardware machine and use to save the machine and materials to the inner part, charge to the customer open account. 8.The periodical evaluation information system.An information system( its ownership) from the customer section own, not from the information service department own.Therefore, carry on to their information system the regular commentary with regularity is the customer manager's responsibility.These comment on, will rise a kind of aggressive function for the improvement system.The function and the responsibility of the information service department:1.Keep advanced sex on the technique.Because the technique of the modern is in the variety everyday, the company can't neglect to decline low cost and suggest the opportunity of the high performance.For making use of the existing technique, the information attendant must be join force to keep advanced sex on the technique with one mind.The information service department and customers manage the technique invention that the section should notice to those to raise the rate of production and efficiency probably.2.Rise to promote the function.In the aspects of discovering the new information system and raising the existing information system, the information attendant should rise to promote the function.Any improvement data processing or management make policy the opportunities of the process and should cause concerning the business realm manager's attention.3.Provide to suggest the source.The information attendant is to provide the suggestion and advisory headsprings toward the customer group.The information service department should provide an organization( for example, customer contact section), for the purpose of customer can pass that organization request suggestion of the relevant calculator and the information processing.4.Help the customer in system develop process.The system development process press half to half of comparisons, from the expert of the business realm with( the information system aspect) technique the expert combine together, developping together a take calculator as the basal information system.By 1980, it is the responsibility of the information service department that popular viewpoint is the system development in customer and the information attendants.Today, the information system is own by customer, therefore, the system development is the responsibility of the customer.The responsibility of the information service department is an information system item that"s help" the customer to carry out them.5.Provide the movement ability for the information system.The information service department is responsible for a part that produces the system to have something to do with hardware.Certainly, this is is not suitable for in to distribute the data processing environment also.So-called have something to do with hardware the part includes the engine room, control, output's to send out to record to go into with data.( only rightness become criticize to handle the environment)The responsibility concerning database, sometimes will produce to confuse.The company database is saving saving equipments at the big capacity that be control by the information attendant and operate up.The managing person of the database is responsible for the physics and logical maintenances of the database.However, to any change of the database is to is carried on the push by the customer importation, therefore, the accuracy of the database is from the customer be responsible for, not database managing person is responsible of.6.Support the data of the information system.To the whichever and existing informationsystem, the complete set data includes the " circulate the order", the database data( may support one or several information systemses) and user's manuals of the system and program design data, the calculator operator.Must reflect to any improvement of the system in above- mentioned data, these datas are distribute by the information attendant and support.7.For the company whole turn to provide the help.The data becomes comprehensive( combination) tool of company.Each company, the education section and the government agency all exist the redundancy in the data and procedureses.The information service department contain responsibility provide the ability( hardware and expert) on the technique to remove this kind of phenomenon.8.Provide to educate the project( outline) toward the customer.Nowadays widespread viewpoint is, the customer handle the education of the aspect in the calculator and information, having the important influence successfully for an unit.The manager of the customer and deluxe administration leadership is making use of the professional public lecturer and facing to the book and the inner part colloquium of the customer well.The information service department be responsible for organize the customer manager of internal public lecturer.Handle the knowledge in the calculator and information, exist thus a kind of request, educate the reasonable charges to the customer namely, even in the small companyalso such.外文翻译信息管理系统简介一.管理信息系统产生的背景信息是一种资源,在过去的 30 年中,各行各业往往都有不少管理人员和行政首脑孤立地看待数据处理和计算机。

信息管理系统中英文对照外文翻译文献

信息管理系统中英文对照外文翻译文献

中英文对照翻译信息管理系统对于“管理信息系统”并没有一致的定义。

一些作者喜欢用其他术语代替,例如:“信息处理系统”“信息与决策系统”“组织信息系统”,或者干脆将“信息系统”用组织内具有支持操作、管理、决策职能的计算机信息处理系统代替。

这篇文章使用“管理信息系统”一词,是因为它是通俗易懂的,当涉及组织信息系统时也常用“信息系统”代替“管理信息系统”。

一个管理信息系统的定义,通常被理解为:一种集成用户机器系统,为组织提供信息支持运作、管理、决策职能。

该信息系统利用计算机硬件和软件;手工处理程序;模拟分析法计划、控制和决策;和数据库。

事实上,它是一个集成系统并不意味着它是单一的,单块集成结构;相反,它意味着零件适合加入整体设计。

内容定义如下:计算机为主的用户机器系统理论上,管理信息系统可以脱离计算机上而存在,但是计算机的存在可以让管理信息系统可行。

问题不是计算机是否被使用在管理信息系统中,而是信息的使用被计算机化的程度。

用户机器系统的概念暗示了, 一些任务最好由人执行, 其他的最好由机器做。

MIS的使用者是那些负责输入输入数据、指示系统或运用系统信息产品的人。

因为许多问题,用户和计算机建立了一个联合系统,其结果通过一套在计算机和用户之间的相互作用得到。

用户机器的相互作用是由用户连接在计算机上的输入-输出设备(通常是一个视觉显示终端)推动的。

计算机可以使一台个人机器服务于一名用户或者一台大规模的机器为一定数量通过终端由通信线路连接的用户服务。

用户输入-输出设备允许直接输入数据和紧接着输出结果。

例如:一个人使用计算机交互的在金融理财上通过在终端键盘输入提交“如果什么,怎么办?”之类的问题,结果几秒钟后便被显示在屏幕上。

MIS的计算机为主的用户机器特征影响系统开发商和系统用户的知识要求。

“计算机为主”意味着管理信息系统的设计者必须拥有计算机和对处理有用的知识。

“用户机器”的概念意味着系统设计者也应该了解人作为系统组成部分(信息处理器)的能力和人作为信息使用者的行为。

信息管理与信息系统专业英语:专业词汇的中英文翻译和具体英文介绍

信息管理与信息系统专业英语:专业词汇的中英文翻译和具体英文介绍

1. informationInformation, in its most restricted technical sense, is a sequence of symbols that can be interpreted as a message. Information can be recorded as signs, or transmitted as signals. Information is any kind of event that affects the state of a dynamic system. Conceptually, information is the message (utterance or expression) being conveyed. This concept has numerous other meanings in different contexts.[1] Moreover, the concept of information is closely related to notions of constraint, communication, control, data, form, instruction, knowledge, meaning, mental stimulus, pattern, perception, representation, and especially entropy.(信息,在其最受限制的技术意义上,是一个序列的符号,可以被解释为一个消息。

信息可以被记录为标志,或传输信号。

信息是任何类型的事件,影响一个动态系统的状态。

从概念上讲,信息是信息(话语或表达式)的表达。

这一概念具有许多其他在不同语境下的含义。

[1]此外,信息的概念密切相关的概念约束、通信、控制、数据、形式、指令、知识、意义,精神刺激,模式,感知的代表性,尤其是熵。

数据库管理系统中英文对照

数据库管理系统中英文对照

数据库管理系统地介绍Raghu Ramakrishnan数据库<database, 有时拼作data base )又称为电子数据库, 是专门组织起来地一组数据或信息, 其目地是为了便于计算机快速查询及检索. 数据库地结构是专门设计地, 在各种数据处理操作命令地支持下, 可以简化数据地存储, 检索, 修改和删除. 数据库可以存储在磁盘, 磁带, 光盘或其他辅助存储设备上. b5E2RGbCAP 数据库由一个或一套文件组成, 其中地信息可以分解为记录, 每一记录又包含一个或多个字段<或称为域). 字段是数据存取地基本单位. 数据库用于描述实体,其中地一个字段通常表示与实体地某一属性相关地信息. 通过关键字以及各种分类<排序)命令,用户可以对多条记录地字段进行查询,重新整理,分组或选择,以实体对某一类数据地检索, 也可以生成报表. p1EanqFDPw所有数据库<最简单地除外)中都有复杂地数据关系及其链接.处理与创建,访问以及维护数据库记录有关地复杂任务地系统软件包叫做数据库管理系统vDBMS .DBMS 软件包中地程序在数据库与其用户间建立接口.<这些用户可以是应用程序员,管理员及其他需要信息地人员和各种操作系统程序). DXDiTa9E3d DBMS可组织,处理和表示从数据库中选出地数据元•该功能使决策者能搜索探查和查询数据库地内容, 从而对在正规报告中没有地,不再出现地且无法预料地问题做出回答.这些问题最初可能是模糊地并且<或者)是定义不恰当地, 但是人们可以浏览数据库直到获得所需地信息•简言之,DBMS将“管理”存储地数据项, 并从公共数据库中汇集所需地数据项以回答非程序员地询问. RTCrpUDGiTDBMS由3个主要部分组成:<1)存储子系统,用来存储和检索文件中地数据;<2)建模和操作子系统, 提供组织数据以及添加, 删除,维护, 更新数据地方法;<3)用户和DBMS之间地接口.在提高数据库管理系统地价值和有效性方面正在展现以下一些重要发展趋势;5PCzVD7HxA1 .管理人员需要最新地信息以做出有效地决策.2.客户需要越来越复杂地信息服务以及更多地有关其订单, 发票和账号地当前信息.3.用户发现他们可以使用传统地程序设计语言, 在很短地一段时间内用数据库系统开发客户应用程序4.商业公司发现了信息地战略价值,他们利用数据库系统领先于竞争对手. 数据库模型数据库模型描述了在数据库中结构化和操纵数据地方法, 模型地结构部分规定了数据如何被描述<例如树, 表等):模型地操纵部分规定了数据添加,删除, 显示, 维护, 打印,查找,选择,排序和更新等操作. jLBHrnAILg 分层模型第一个数据库管理系统使用地是分层模型,也就是说,将数据记录排列成树形结构.一些记录时根目录, 在其他所有记录都有独立地父记录.树形结构地设计反映了数据被使用地顺序, 也就是首先访问处于树根位置地记录, 接下来是跟下面地记录,等等. xHAQX74J0X分层模型地开发是因为分层关系在商业应用中普遍存在,众所周知,一个组织结构图表就描述了一种分层关系:高层管理人员在最高层, 中层管理人员在较低地层次,负责具体事务地雇员在最底层. 值得注意地是, 在一个严格地分层结构体系中, 在每个管理层下可能有多个雇员或多个层次地雇员, 但每个雇员只有一个管理者.分层结构数据地典型特征是数据之间地一对多关系. LDAYtRyKfE 在分层方法中,当数据库建立时, 每一关系即被明确地定义. 在分层数据库中地每一记录只能包含一个关键字段, 任意两个字段之间只能有一种关系. 由于数据并不总是遵循这种严格地分层关系, 所以这样可能会出现一些问题. Zzz6ZB2Ltk 关系模型在1970 年, 数据库研究取得了重大突破.E.F.Codd 提出了一种截然不同地数据库管理方法, 使用表作为数据结构, 称之为关系模型. dvzfvkwMI1关系数据库是使用最广地数据结构,数据被组织成关系表, 每个表由称作记录地行和称作字段地列组成. 每个记录包含了专用工程地字段值. 例如,在一个包含雇员信息地表中, 一个记录包含了像一个人姓名和地址这样地字段地值. rqyn14ZNXI 结构化查询语言<SQL是一种在关系型数据库中用于处理数据地查询语言.它是非过程化语言或者说是描述性地,用户只须指定一种类似于英语地描述, 用来确定操作, 记录或描述记录组合. 查询优化器将这种描述翻译为过程执行数据库操作. EmxvxOtOco 网状模型网状模型在数据之间通过链接表结构创建关系, 子记录可以链接到多个父记录.这种将记录和链接捆绑到一起地方法叫做指针, 他是指向一个记录存储位置地存储地址. 使用网状方法,一个子记录可以链接到一个关键记录,同时, 它本身也可以作为一个关键记录.链接到其他一系列子记录.在早期, 网状模型比其他模型更有性能优势;但是在今天,这种优势地特点只有在自动柜员机网络, 航空预定系统等大容量和高速处理过程中才是最重要地. SixE2yXPq5分层和网状数据库都是专用程序, 如果开发一个新地应用程序, 那么在不同地应用程序中保持数据库地一致性是非常困难地. 例如开发一个退休金程序, 需要访问雇员数据,这一数据同时也被工资单程序访问.虽然数据是相同地, 但是也必须建立新地数据库. 6ewMyirQFL 对象模型最新地数据库管理方法是使用对象模型, 记录由被称作对象地实体来描述, 可以在对象中存储数据, 同时提供方法或程序执行特定地任务. kavU42VRUs对象模型使用地查询语言与开发数据库程序所使用地面向对象地程序设计语言是相同地,因为没有像SQL这样简单统一地查询语言,所以会产生一些问题. 对象模型相对较新, 仅有少数几个面向对象地数据库实例. 它引起了人们地关注, 因为选择面向对象程序设计语言地开发人员希望有一个基于在对象模型基础上地数据库. y6v3ALoS89 分布式数据库类似地, 分布式数据库指地是数据库地各个部分分别存储在物理上相互分开地计算机上. 分布式数据库地一个目地是访问数据信息时不必考虑其他位置. 注意, 一旦用户和数据分开, 通信和网络则开始扮演重要角色. M2ub6vSTnP分布式数据库需要部分常驻于大型主机上地软件, 这些软件在大型机和个人计算机之间建立桥梁, 并解决数据格式不兼容地问题. 在理想情况下, 大型主机上地数据库看起来像是一个大地信息仓库, 而大部分处理则在个人计算机上完成. 0YujCfmUCw 分布式数据库系统地一个缺点是它们常以主机中心模型为基础, 在这种模型中, 大型主机看起来好像是雇主, 而终端和个人计算机看起来好像是奴隶. 但是这种方法也有许多优点:由于数据库地集中控制, 前面提到地数据完整性和安全性地问题就迎刃而解了.当今地个人计算机,部门级计算机和分布式处理都需要计算机之间以及应用程序之间在相等或对等地基础上相互通信, 在数据库中客户机/ 服务器模型为分布式数据库提供了框架结构. eUts8ZQVRd利用相互连接地计算机上运行地数据库应用程序地一种方法是将程序分解为相互独立地部分. 客户端是一个最终用户或通过网络申请资源地计算机程序, 服务器是一个运行着地计算机软件, 存储着那些通过网络传输地申请.当申请地资源是数据库中地数据时, 客户机/服务器模型则为分布式数据库提供了框架结构. sQsAEJkW5T 文件服务器指地是一个通过网络提供文件访问地软件, 专门地文件服务器是一台被指定为文件服务器地计算机. 这是非常有用地,例如,如果文件比较大而且需要快速访问,在这种情况下,一台微型计算机或大型主机将被用作文件服务器. 分布式文件服务器将文件分散到不同地计算机上, 而不是将它们集中存放到专门地文件服务器上.GMsIasNXkA后一种文件服务器地优点包括在其他计算机上存储和检索文件地能力, 并可以在每一台计算机上消除重复文件. 然而,一个重要地缺点是每个读写请求需要在网络上传播, 在刷新文件时可能出现问题. 假设一个用户申请文件中地一个数据并修改它, 同时另外一个用户也申请这个数据并修改它, 解决这种问题地方法叫做数据锁定, 即第一个申请使其他申请处于等待状态, 直到完成第一个申请,其他用户可以读取这个数据, 但不能修改. TIrRGchYzg数据库服务器是一个通过网络为数据库申请提供服务地软件,例如, 假设某个用户在他地个人计算机上输入了一个数据查询命令, 如果应用程序按照客户机/ 服务器模型设计, 那么个人计算机上地查询语言通过网络传送数据库服务器上, 当发现数据时发出通知. 7EqZcWLZNX在工程界也有许多分布式数据库地例子,如SUN公司地网络文件系统<NFS 被应用到计算机辅助工程应用程序中,将数据分散到由SUNT作站组成地网络上地不同硬盘之间. lzq7IGf02E分布式数据库是革命性地进步, 因为把数据存放在被使用位置上是很合乎常理地.例如一个大公司不同部门之间地计算机, 应该将数据存储在本地, 然而,当被授权地管理人员需要整理部门数据时, 数据应该能够被访问. 数据库信息系统软件将保护数据库地安全性和完整性, 对用户而言, 分布式数据库和非分布式数据库看起来没有什么差别. zvpgeqJ1hk原文Database Management Systems( 3th Edition >,Wiley ,2004, 5-12NrpoJac3v1A introduction to Database Management SystemRaghu RamakrishnanA database (sometimes spelled data base> is also called an electronicdatabase , referring to any collection of data, or information, that is specially organized for rapid search and retrieval by a computer. Databases are structuredto facilitate the storage, retrieval , modification, and deletion of data in conjunction with various data- processing operations .Databases can be stored on magnetic disk or tape, optical disk, or some other secondary storagedevic1e n.owfTG4KIA database consists of a file or a set of files. The information in thesefiles may be broken down into records, each of which consists of one or more fields. Fields are the basic units of data storage , and each field typically contains information pertaining to one aspect or attribute of the entity described by the database . Using keywords and various sorting commands, users can rapidly search , rearrange, group, and select the fields in many records to retrieve or create reports on particular aggregate of data f.jnFLDa5ZoComplex data relationships and linkages may be found in all but the simplest databases .The system software package that handles the difficult tasks associated with creating ,accessing, and maintaining database records is called a database management system(DBMS>.The programs in a DBMS package establish an interface between the database itself and the users of the database.. (These users may be applications programmers, managers and others with information needs, and various OS programs.>tfnNhnE6e5A DBMS can organize, process, and present selected data elements form the database. This capability enables decision makers to search, probe, and query database contents in order to extract answers to nonrecurring and unplanned questions that aren't available in regular reports. These questions mightinitially be vague and/or poorly defined ,but people can “browse”through the database until they have the needed information. In short, the DBMS will “manage”the stored data items and assemble the needed items from the common database in response to the queries of those who aren't programmers.HbmVN777sLA database management system (DBMS> is composed of three major parts:(1>a storage subsystem that stores and retrieves data in files 。

数据库管理系统介绍-外文翻译

数据库管理系统介绍-外文翻译

外文资料Database Management SystemsA database (sometimes spelled data base) is also called an electronic database , referring to any collection of data, or information, that is specially organized for rapid search and retrieval by a computer. Databases are structured to facilitate the storage, retrieval , modification, and deletion of data in conjunction with various data-processing operations .Databases can be stored on magnetic disk or tape, optical disk, or some other secondary storage device.A database consists of a file or a set of files. The information in these files may be broken down into records, each of which consists of one or more fields. Fields are the basic units of data storage , and each field typically contains information pertaining to one aspect or attribute of the entity described by the database . Using keywords and various sorting commands, users can rapidly search , rearrange, group, and select the fields in many records to retrieve or create reports on particular aggregate of data.Complex data relationships and linkages may be found in all but the simplest databases .The system software package that handles the difficult tasks associated with creating ,accessing, and maintaining database records is called a database management system(DBMS).The programs in a DBMS package establish an interface between the database itself and the users of the database.. (These users may be applications programmers, managers and others with information needs, and various OS programs.)A DBMS can organize, process, and present selected data elements form the database. This capability enables decision makers to search, probe, and query database contents in order to extract answers to nonrecurring and unplanned questions that aren’t available in regular reports. These questions might initially be vague and/or poorly defined ,but people can “browse”through the database until they have the needed information. In short, the DBMS will “manage” the stored data items and assemble the needed items from the common database in response to the queries of those who aren’t programmers.A database management system (DBMS) is composed of three major parts:(1)a storage subsystem that stores and retrieves data in files;(2) a modeling and manipulationsubsystem that provides the means with which to organize the data and to add , delete, maintain, and update the data;(3)and an interface between the DBMS and its users. Several major trends are emerging that enhance the value and usefulness of database management systems;Managers: who require more up-to-data information to make effective decision Customers: who demand increasingly sophisticated information services and more current information about the status of their orders, invoices, and accounts.Users: who find that they can develop custom applications with database systems in a fraction of the time it takes to use traditional programming languages.Organizations : that discover information has a strategic value; they utilize their database systems to gain an edge over their competitors.The Database ModelA data model describes a way to structure and manipulate the data in a database. The structural part of the model specifies how data should be represented(such as tree, tables, and so on ).The manipulative part of the model specifies the operation with which to add, delete, display, maintain, print, search, select, sort and update the data. Hierarchical ModelThe first database management systems used a hierarchical model-that is-they arranged records into a tree structure. Some records are root records and all others have unique parent records. The structure of the tree is designed to reflect the order in which the data will be used that is ,the record at the root of a tree will be accessed first, then records one level below the root ,and so on.The hierarchical model was developed because hierarchical relationships are commonly found in business applications. As you have known, an organization char often describes a hierarchical relationship: top management is at the highest level, middle management at lower levels, and operational employees at the lowest levels. Note that within a strict hierarchy, each level of management may have many employees or levels of employees beneath it, but each employee has only one manager. Hierarchical data are characterized by this one-to-many relationship among data.In the hierarchical approach, each relationship must be explicitly defined when the database is created. Each record in a hierarchical database can contain only one key field and only one relationship is allowed between any two fields. This can create a problem because data do not always conform to such a strict hierarchy.Relational ModelA major breakthrough in database research occurred in 1970 when E. F. Codd proposed a fundamentally different approach to database management called relational model ,which uses a table as its data structure.The relational database is the most widely used database structure. Data is organized into related tables. Each table is made up of rows called and columns called fields. Each record contains fields of data about some specific item. For example, in a table containing information on employees, a record would contain fields of data such as a person’s last name ,first name ,and street address.Structured query language(SQL)is a query language for manipulating data in a relational database .It is nonprocedural or declarative, in which the user need only specify an English-like description that specifies the operation and the described record or combination of records. A query optimizer translates the description into a procedure to perform the database manipulation.Network ModelThe network model creates relationships among data through a linked-list structure in which subordinate records can be linked to more than one parent record. This approach combines records with links, which are called pointers. The pointers are addresses that indicate the location of a record. With the network approach, a subordinate record can be linked to a key record and at the same time itself be a key record linked to other sets of subordinate records. The network mode historically has had a performance advantage over other database models. Today , such performance characteristics are only important in high-volume ,high-speed transaction processing such as automatic teller machine networks or airline reservation system.Both hierarchical and network databases are application specific. If a new application is developed ,maintaining the consistency of databases in different applications can be very difficult. For example, suppose a new pension application is developed .The data are the same, but a new database must be created.Object ModelThe newest approach to database management uses an object model , in which records are represented by entities called objects that can both store data and provide methods or procedures to perform specific tasks.The query language used for the object model is the same object-oriented programming language used to develop the database application .This can create problems because there is no simple , uniform query language such as SQL . The object model is relatively new,and only a few examples of object-oriented database exist. It has attracted attention because developers who choose an object-oriented programming language want a database based on an object-oriented model.Distributed DatabaseSimilarly , a distributed database is one in which different parts of the database reside on physically separated computers . One goal of distributed databases is the access of information without regard to where the data might be stored. Keeping in mind that once the users and their data are separated , the communication and networking concepts come into play .Distributed databases require software that resides partially in the larger computer. This software bridges the gap between personal and large computers and resolves the problems of incompatible data formats. Ideally, it would make the mainframe databases appear to be large libraries of information, with most of the processing accomplished on the personal computer.A drawback to some distributed systems is that they are often based on what is called a mainframe-entire model , in which the larger host computer is seen as the master and the terminal or personal computer is seen as a slave. There are some advantages to this approach . With databases under centralized control , many of the problems of data integrity that we mentioned earlier are solved . But today’s personal computers, departmental computers, and distributed processing require computers and their applications to communicate with each other on a more equal or peer-to-peer basis. In a database, the client/server model provides the framework for distributing databases.One way to take advantage of many connected computers running database applications is to distribute the application into cooperating parts that are independent of one anther. A client is an end user or computer program that requests resources across a network. A server is a computer running software that fulfills those requests across a network . When the resources are data in a database ,the client/server model provides the framework for distributing database.A file serve is software that provides access to files across a network. A dedicated file server is a single computer dedicated to being a file server. This is useful ,for example ,if the files are large and require fast access .In such cases, a minicomputer or mainframe would be used as a file server. A distributed file server spreads the files around on individual computers instead of placing them on one dedicated computer.Advantages of the latter server include the ability to store and retrieve fileson other computers and the elimination of duplicate files on each computer. A major disadvantage , however, is that individual read/write requests are being moved across the network and problems can arise when updating files. Suppose a user requests a record from a file and changes it while another user requests the same record and changes it too. The solution to this problems called record locking, which means that the first request makes others requests wait until the first request is satisfied . Other users may be able to read the record, but they will not be able to change it .A database server is software that services requests to a database across a network. For example, suppose a user types in a query for data on his or her personal computer . If the application is designed with the client/server model in mind ,the query language part on the personal computer simple sends the query across the network to the database server and requests to be notified when the data are found.Examples of distributed database systems can be found in the engineering world. Sun’s Network Filing System(NFS),for example, is used in computer-aided engineering applications to distribute data among the hard disks in a network of Sun workstation.Distributing databases is an evolutionary step because it is logical that data should exist at the location where they are being used . Departmental computers within a large corporation ,for example, should have data reside locally , yet those data should be accessible by authorized corporate management when they want to consolidate departmental data . DBMS software will protect the security and integrity of the database , and the distributed database will appear to its users as no different from the non-distributed database .In this information age, the data server has become the heart of a company. This one piece of software controls the rhythm of most organizations and is used to pump information lifeblood through the arteries of the network. Because of the critical nature of this application, the data server is also the one of the most popular targets for hackers. If a hacker owns this application, he can cause the company's "heart" to suffer a fatal arrest.Ironically, although most users are now aware of hackers, they still do not realize how susceptible their database servers are to hack attacks. Thus, this article presents a description of the primary methods of attacking database servers (also known as SQL servers) and shows you how to protect yourself from these attacks.You should note this information is not new. Many technical white papers go into great detail about how to perform SQL attacks, and numerous vulnerabilities have beenposted to security lists that describe exactly how certain database applications can be exploited. This article was written for the curious non-SQL experts who do not care to know the details, and as a review to those who do use SQL regularly.What Is a SQL Server?A database application is a program that provides clients with access to data. There are many variations of this type of application, ranging from the expensive enterprise-level Microsoft SQL Server to the free and open source mySQL. Regardless of the flavor, most database server applications have several things in common.First, database applications use the same general programming language known as SQL, or Structured Query Language. This language, also known as a fourth-level language due to its simplistic syntax, is at the core of how a client communicates its requests to the server. Using SQL in its simplest form, a programmer can select, add, update, and delete information in a database. However, SQL can also be used to create and design entire databases, perform various functions on the returned information, and even execute other programs.To illustrate how SQL can be used, the following is an example of a simple standard SQL query and a more powerful SQL query:Simple: "Select * from dbFurniture.tblChair"This returns all information in the table tblChair from the database dbFurniture.Complex: "EXEC master..xp_cmdshell 'dir c:\'"This short SQL command returns to the client the list of files and folders under the c:\ directory of the SQL server. Note that this example uses an extended stored procedure that is exclusive to MS SQL Server.The second function that database server applications share is that they all require some form of authenticated connection between client and host. Although the SQL language is fairly easy to use, at least in its basic form, any client that wants to perform queries must first provide some form of credentials that will authorize the client; the client also must define the format of the request and response.This connection is defined by several attributes, depending on the relative location of the client and what operating systems are in use. We could spend a whole article discussing various technologies such as DSN connections, DSN-less connections, RDO, ADO, and more, but these subjects are outside the scope of this article. If you want to learn more about them, a little Google'ing will provide you with more than enough information. However, the following is a list of the more common items included in a connection request.Database sourceRequest typeDatabaseUser IDPasswordBefore any connection can be made, the client must define what type of database server it is connecting to. This is handled by a software component that provides the client with the instructions needed to create the request in the correct format. In addition to the type of database, the request type can be used to further define how the client's request will be handled by the server. Next comes the database name and finally the authentication information.All the connection information is important, but by far the weakest link is the authentication information—or lack thereof. In a properly managed server, each database has its own users with specifically designated permissions that control what type of activity they can perform. For example, a user account would be set up as read only for applications that need to only access information. Another account should be used for inserts or updates, and maybe even a third account would be used for deletes. This type of account control ensures that any compromised account is limited in functionality. Unfortunately, many database programs are set up with null or easy passwords, which leads to successful hack attacks.译文数据库管理系统介绍数据库也可以称为电子数据库,是专门组织起来的一组数据或信息,其目的是为了便于计算机快速查询及检索。

数据库管理系统(DataBase Management System)

数据库管理系统(DataBase Management System)

数据库管理系统(DataBase Management System)的目标是创建,处理和管理数据库。

DB2作为关系数据库领域的开拓者和领航人,IBM在1977年完成了System R系统的原型,1980年开始提供集成的数据库服务器——System/38,随后是SQL/DSforVSE和VM,其初始版本与SystemR研究原型密切相关。

DB2 forMVSV1 在1983年推出。

该版本的目标是提供这一新方案所承诺的简单性,数据不相关性和用户生产率。

1988年DB2 for MVS 提供了强大的在线事务处理(OLTP)支持,1989 年和1993 年分别以远程工作单元和分布式工作单元实现了分布式数据库支持。

最近推出的DB2 Universal Database 6.1则是通用数据库的典范,是第一个具备网上功能的多媒体关系数据库管理系统,支持包括Linux在内的一系列平台。

OracleOracle 前身叫SDL,由Larry Ellison 和另两个编程人员在1977创办,他们开发了自己的拳头产品,在市场上大量销售,1979 年,Oracle公司引入了第一个商用SQL 关系数据库管理系统。

Oracle公司是最早开发关系数据库的厂商之一,其产品支持最广泛的操作系统平台。

目前Oracle关系数据库产品的市场占有率名列前茅。

SQL Server(用过。

)1987 年,微软和IBM合作开发完成OS/2,IBM 在其销售的OS/2 ExtendedEdition 系统中绑定了OS/2Database Manager,而微软产品线中尚缺少数据库产品。

为此,微软将目光投向Sybase,同Sybase 签订了合作协议,使用Sybase的技术开发基于OS/2平台的关系型数据库。

1989年,微软发布了SQL Server 1.0 版。

mySQLmySQL是一个小型关系型数据库管理系统,开发者为瑞典MySQL AB公司。

DBMS简介--外文翻译

DBMS简介--外文翻译

DBMS简介数据库管理系统是编程系统中的重要的一种,现今可以用在最大以及最小的电脑上。

其他重要形式的系统软件,比如汇编以及操作系统,近些年来开发出一系列容易理解的数据库管理系统原则,并且这些概念既有助于理解如何有效利用系统,以可以帮助设计和执行DBMS系统。

DBMS是一程序的集合,它使你能够存储、修改以及从数据库中提了提取信息。

有很多种不同类型的DBMS系统,从运行在个人电脑上的小型系统到运行在大型主机上的巨型系统。

DBMS的功能有两种功能使数据库区别于其他设计系统:1)管理固有数据的能力,以及2)高效访问大量数据的能力第一点只是表明现有一个固定存在的数据库,而这些数据库的内容也就是DBMS所要访问和管理的那些数据。

第二点将DBMS和同样能管理固有数据的文件系统区分开来。

通常在数据非常大的时候还需要用到DBMS系统的功能,因为对于小量数据而言,简单的访问技术如对数据的线性扫就足够了。

虽然我们将以上两点作为DBMS的基本特性,但是其他一些功能也是在商业DBSM的系统中常见的,它们是:·支持至少一种用户可以据这浏览数据的模式或数学提取方式。

·支持某种允许用户用来定义数据的结构,访问和操纵数据的高级语言。

·事务管理,即对多个用户提供正确,同时访问数据库的能力。

·访问控制,即限制末被授权用户对数据访问能力,以及检测数据有效性能力。

·恢复功能,即能够从系统错误中恢复过来而不丢失数据的能力。

数据模型每个DBMS提供了至少一种允许用户不是以原始比特位的方式,而是以更容易理解的术语来观看信息的抽象数据模型。

实际上,通常要观察以几个不同级别提取出来的数据是可能的。

在相关的低级别中,DBMS一般允许我们将数据形象化为文件的组成部分。

高效数据访问存储一个文件的能力并不特别:操纵系统中的结合的文件系统都能够如此。

DBMS的能力在我们访问文件的数据时才能显示出来。

比如,假设我希望找到员工经理“克拉克·肯特”。

数据库管理系统 Database Management System 英语介绍

数据库管理系统 Database Management System 英语介绍

数据库管理系统Database ManagementSystem – An easy way tomanage your dataIntroduction Students who have a course of Database Management should know the fundamentals of this subject. Then what is database management system? You can easily access, managed and updated the related data that are accumulated and organised in a manner so that you can do it easily. A database can be anything, for example, information about your college. In a simple way, we can say Database is a place where a similar type of information is cached and a variety of operations can be executed on it. Every organisation has theirlarge amounts of data in their database. A database management system (DBMS) is a software tool that organises those data in a database.A DBMS consists of three elements which are given below: The physical database: It is the collection of files that consist of the data. The database engine: It is a software that makes possible to connect and alter the contents of the database. The database scheme: It is the requirement of the logical structure of the data stored in the database. It can be divided into four components which are mentioned below: Users: Users may vary like DB administrator, System developer and End users. Database application: It can be Personal, Departmental, Enterprise and Internal DBMS : Software that grants users to specify, produce and organisesdatabase access, Ex: MySql, Oracle etc. Database: It is a set of logical data. This DBMS has numerous number of merits as compared to traditional computer file processing approach.Some advantages of DBMS are given below: 1. Controlling Data Redundancy: In traditional computer file processing or non-database systems, every application program has its own files. It is quite feasible in case of DBMS, all the data of an organisation is accumulated into a single database and cannot be duplicated.2. Data Consistency: If the DBMS has decreased redundancy to a least level, the database system imposes consistency. It implies that when a data item exists numerous times in the database and is updated, the DBMS repeatedly updates every occurrence of a dataitem in the database. 3. Data Sharing: In this system, data can be shared by allowed users of the company. It manages the data and allow the users to access the data. Many users can be allowed to access the same set of information at the same time. The distant users can also share the same data. Also, the data of same database can be shared between various application programs. 4. Data Integration: In this management system, data in database is stored in tables. A single database consists of multiple tables and relationships can be built between tables or related data entities. It enables easier data retrieve and update of the data.There are other various advantages of DBMS which helps in easier data management in an organisation. So in learning stage or duringstudy time, a student can learn this subject properly if he or she wants a career in this field.。

数据库管理系统英文名缩写

数据库管理系统英文名缩写

Database Management System AbbreviationA Database Management System (DBMS) is a software program that allows users to access, manipulate, and manage databases efficiently. The importance of a DBMS lies in its ability to provide a way to store and organize data in a structured manner, making it easier to retrieve and utilize information when needed.Evolution of DBMSThe concept of a DBMS dates back to the 1960s when the need for efficient data management became evident. Early systems were primarily focused on hierarchical and network models, which were later replaced by the more flexible and widely used relational model introduced in the 1970s. With the advancement of technology, new types of DBMS have emerged, including object-oriented, NoSQL, and NewSQL databases, each designed to cater to different data storage and retrieval needs.Importance of DBMS in Modern BusinessIn today’s digital age, data has become a crucial asset for businesses of all sizes.A well-designed DBMS helps organizations efficiently store, manage, and analyze large volumes of data, enabling them to make informed decisions and gain a competitive edge in the market. Additionally, DBMS provides data security measures to protect sensitive information from unauthorized access, ensuring compliance with privacy regulations.Commonly Used DBMS Abbreviations1.RDBMS: Relational Database Management System2.NoSQL: Not Only SQL3.ODBC: Open Database Connectivity4.SQL: Structured Query Language5.DB: Database6.ACID: Atomicity, Consistency, Isolation, Durability7.DML: Data Manipulation Language8.DDL: Data Definition LanguageAdvantages of Using a DBMS1.Data Integrity: DBMS helps maintain the accuracy and consistency ofdata stored in the database.2.Data Security: DBMS offers robust security features to protectsensitive information from unauthorized access.3.Scalability: DBMS allows businesses to scale their database systemsas their data storage requirements grow.4.Efficient Data Retrieval: With optimized indexing and queryingmechanisms, DBMS enables users to retrieve information quickly.5.Data Backup and Recovery: DBMS provides mechanisms for databackup and recovery, ensuring data availability in case of system failures.Future Trends in DBMSAs technology continues to evolve, the future of DBMS is expected to witness advancements in areas such as cloud-based databases, big data management, and real-time data processing. With the rise of Internet of Things (IoT) devices and the increasing volume of data generated, DBMS will play a crucial role in enabling data-driven decision-making and innovation across various industries.ConclusionIn conclusion, a Database Management System (DBMS) serves as a cornerstone for efficient data management in modern businesses. By utilizing the right DBMS, organizations can streamline their data operations, enhance data security, and gain valuable insights for strategic decision-making. As the volume and complexity of data continue to grow, the role of DBMS will be pivotal in ensuring data integrity, scalability, and performance in the digital age.。

数据库管理系统英语缩写

数据库管理系统英语缩写

数据库管理系统英语缩写
数据库管理系统(Database Management System,DBMS)是一种允许用户创建、读取、更新和删除数据库中的数据的软件系统。

DBMS的英语缩写为DBMS。

它是管理数据的核心系统,用于存储、检索和处理数据。

DBMS是现代信息技术领域中的重要组成部分,被广泛应用于各种行业和领域。

它提供了一种结构化数据的方法,用于有效地组织和管理信息。

DBMS使用户能够轻松地访问和处理大量数据,而不需要了解底层数据结构或物理存储细节。

在DBMS中,数据以表格的形式组织,每个表格由多个列组成,每一列对应着
一种数据类型。

用户可以通过SQL(Structured Query Language)语言向DBMS发
出查询命令,从而实现对数据的检索、更新和删除操作。

DBMS具有许多优点,包括数据的一致性、可靠性和安全性。

它可以确保数据
的完整性,避免数据冗余,并提供数据的备份和恢复功能。

此外,DBMS还可以提高数据的访问速度,提高工作效率。

DBMS还具有一些不足之处,例如需要较高的硬件和软件成本、复杂性较高,
需要专门的技术知识来管理和维护系统。

因此,在选择DBMS时,需要根据实际
需求和预算来进行评估。

总的来说,DBMS是一种非常重要的系统,在当今信息化的时代扮演着不可或
缺的角色。

通过使用DBMS,用户可以更好地管理和利用数据,提高工作效率,促
进信息的共享和交流,推动社会的发展和进步。

数据库简介 英文

数据库简介 英文

Conceptual schema (Chapter 2 and 19):
Students(sid: string, name: string, login: string, age: integer, gpa: real) Courses(cid: string, cname: string, credits: integer, fname: string) Enrolled(sid: string, cid:string, grade: string) Faculty(fid: string, fname: string, sal: real)

Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 13
Concurrency Control

Concurrent execution of user programs is essential for good DBMS performance.
Data Models
A data model is a collection of concepts for describing data. A schema is a description of a particular collection of data, using the given data model. The relational model of data is the most widely used model today.
Datasets increasing in diversity and volume.


DBMS encompasses most of CS

数据库信息管理系统简介外文翻译

数据库信息管理系统简介外文翻译

附录AIntroduction to database information management systemThe databaseis stored together a collection of the relevant data, the data is structured, non-harmful or unnecessary redundancy, and for a variety of application services, data storage independent of the use of its procedures, insert new data on the database,revised, and the original data can be retrieved by a common and can be controlled manner. When a system in the structure of a number of entirely separate from the database, the system includes a "database collection".Database management system is a manipulation and large-scale database management software is being used to set up, use and maintenance of the database. Its unified database management and control so as to ensure database security and integrity. Database management system users access data in the database, the database administrator through Database managementsystem databasemaintenance work. It provides a variety of functions, allows multiple applications and users use different methods at the same time or different time to build, modify, and asked whether the database. It allows users to easily manipulate data definition and maintenance of data security and integrity, as well as the multi-user concurrency control and the restoration of the database.Using the database can bring many benefits: such as reducing data redundancy, thus saving the data storage space; to achieve full sharing of data resources, and so on. In addition, the database technology also provides users with a very simple means to enable users to easily use the preparation of the database applications. Especially in recent years introduced micro-computer relational database management system , intuitive operation, the use of flexible, convenient programming environment to extensive (generally 16 machine, such as IBM / PC / XT, China Great Wall 0520, and other species can run software), data-processing capacity strong. Database in our country are being more and more widely used, will be a powerful tool of economic management.The database is through the database management system (DBMS-DATA BASEMANAGEMENT SYSTEM) software for data storage, management and use ofmicro-computer relational databasemanagement system is a databasemanagement systemsoftware.Information management system is the use of data acquisition and transmission technology, computer network technology, database construction, multimedia technology, business needs, such as the establishment of a management platform, the platform constructed on the basis of pure software business management system (to meet the business needs for the purpose), achieving operational systems of data and information sharing, and based on this structure enquiries, scheduling or decision-making system.Information system can be manual or computer-based, independent or integrated, batch or on-line. The information system is usually the various types of combination. That is, of course, it can not be independent and is integrated.1、Independent system to meet a specific application area (for example, personnel management) design. Independent system with its own documents, which are inevitable with a certain degree of redundancy.2、Integrated information systems through their use of the data were combined. Resource sharing system using a database to achieve integrated objectives. For example, the normal wage system requirements from the human resources and accounting systems found in the data.3、Artificial system has been developed based on a variety of computer information systems. So far, in a computerized artificial, and still lacks design experience (or) lack of information between users and service personnel exchanges. That is to say,computer-based workflow system directly from the manual system workflow. Often, these systems are independent, and the computer just as a data processor. In the design of these systems, with little regard to their integrated to the end of intent.4、Information systems according to a batch, on-line processing or both combination classification. In a batch system and data will be handled in batches or reports. For example, banks will be a large number of cheque code, and then the end of the day, in batches of cheques, sorting and processing. Also, in order to prevent an airline ticket agent in Atlanta and another at the same time point of sale outlets from Los Angeles to San Francisco, the last one a flight tickets, airlines must be on-line booking system, in order to reflect the current status of the database.Most on-line information system is successful batchrequirements. even if the information resources management (IRM) system, and the potential of the computer information system has been widely recognized, most of the systems is still independent batch system. Now most of these systems have lost value, but was re-designed as an integrated, online system. By definition, we can see the comprehensive requirements of business managers and company leaders closer cooperation. Information services professionals as consultants, and the integrated information system and business areas of conflict and differences should be resolved by the user groups. Resolve these differences in order to achieve a comprehensive environmental information services staff to the challenges posed by the user manager.中文译文数据库信息管理系统简介数据库是存储在一起的相关数据的集合,这些数据是结构化的,无有害的或不必要的冗余,并为多种应用服务;数据的存储独立于使用它的程序;对数据库插入新数据,修改和检索原有数据均能按一种公用的和可控制的方式进行。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

附录AIntroduction to database information management systemThe database is stored together a collection of the relevant data, the data is structured, non-harmful or unnecessary redundancy, and for a variety of application services, data storage independent of the use of its procedures, insert new data on the database, revised, and the original data can be retrieved by a common and can be controlled manner. When a system in the structure of a number of entirely separate from the database, the system includes a "database collection".Database management system is a manipulation and large-scale database management software is being used to set up, use and maintenance of the database. Its unified database management and control so as to ensure database security and integrity. Database management system users access data in the database, the database administrator through Database management system database maintenance work. It provides a variety of functions, allows multiple applications and users use different methods at the same time or different time to build, modify, and asked whether the database. It allows users to easily manipulate data definition and maintenance of data security and integrity, as well as the multi-user concurrency control and the restoration of the database.Using the database can bring many benefits: such as reducing data redundancy, thus saving the data storage space; to achieve full sharing of data resources, and so on. In addition, the database technology also provides users with a very simple means to enable users to easily use the preparation of the database applications. Especially in recent years introduced micro-computer relational database management system , intuitive operation, the use of flexible, convenient programming environment to extensive (generally 16 machine, such as IBM / PC / XT, China Great Wall 0520, and other species can run software), data-processing capacity strong. Database in our country are being more and more widely used, will be a powerful tool of economic management.The database is through the database management system (DBMS-DATA BASEMANAGEMENT SYSTEM) software for data storage, management and use of micro-computer relational database management system is a database management system software.Information management system is the use of data acquisition and transmission technology, computer network technology, database construction, multimedia technology, business needs, such as the establishment of a management platform, the platform constructed on the basis of pure software business management system (to meet the business needs for the purpose), achieving operational systems of data and information sharing, and based on this structure enquiries, scheduling or decision-making system.Information system can be manual or computer-based, independent or integrated, batch or on-line. The information system is usually the various types of combination. That is, of course, it can not be independent and is integrated.1、Independent system to meet a specific application area (for example, personnel management) design. Independent system with its own documents, which are inevitable with a certain degree of redundancy.2、Integrated information systems through their use of the data were combined. Resource sharing system using a database to achieve integrated objectives. For example, the normal wage system requirements from the human resources and accounting systems found in the data.3、Artificial system has been developed based on a variety of computer information systems. So far, in a computerized artificial, and still lacks design experience (or) lack of information between users and service personnel exchanges. That is to say, computer-based workflow system directly from the manual system workflow. Often, these systems are independent, and the computer just as a data processor. In the design of these systems, with little regard to their integrated to the end of intent.4、Information systems according to a batch, on-line processing or both combination classification. In a batch system and data will be handled in batches or reports. For example, banks will be a large number of cheque code, and then the endof the day, in batches of cheques, sorting and processing. Also, in order to prevent an airline ticket agent in Atlanta and another at the same time point of sale outlets from Los Angeles to San Francisco, the last one a flight tickets, airlines must be on-line booking system, in order to reflect the current status of the database. Most on-line information system is successful batch requirements. even if the information resources management (IRM) system, and the potential of the computer information system has been widely recognized, most of the systems is still independent batch system. Now most of these systems have lost value, but was re-designed as an integrated, online system. By definition, we can see the comprehensive requirements of business managers and company leaders closer cooperation. Information services professionals as consultants, and the integrated information system and business areas of conflict and differences should be resolved by the user groups. Resolve these differences in order to achieve a comprehensive environmental information services staff to the challenges posed by the user manager.中文译文数据库信息管理系统简介数据库是存储在一起的相关数据的集合,这些数据是结构化的,无有害的或不必要的冗余,并为多种应用服务;数据的存储独立于使用它的程序;对数据库插入新数据,修改和检索原有数据均能按一种公用的和可控制的方式进行。

相关文档
最新文档