From the course: CompTIA Data Systems (DSO-001) Cert Prep
Unlock this course with a free trial
Join today to access over 24,000 courses taught by industry experts.
Database schema
From the course: CompTIA Data Systems (DSO-001) Cert Prep
Database schema
- A database schema serves as a blueprint that outlines the structure of a database. It's similar to the architectural plan for a building, detailing the database's objects such as tables, views, indexes and procedures. These elements collectively define how data is organized, stored and accessed within the database. Each schema is tied to a database user or role that owns it, encapsulating the permissions to create, modify and delete objects within the schema. This setup facilitates data security and access management, allowing granular control over who can interact with what data and how. Let's break down the process of schema design into its essential stages, conceptual data modeling, logical schema design, and finally, physical schema design. Conceptual data modeling is the initial step focusing on defining the entities and relationships without bogging down in the technical implementation details. It's about understanding the big picture of what the database represents, such as…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Structured Query Language3m 41s
-
(Locked)
SELECT statement2m 27s
-
(Locked)
Sorting results4m 3s
-
(Locked)
Filtering data4m 1s
-
(Locked)
Aggregating data3m 8s
-
(Locked)
String manipulation2m 43s
-
(Locked)
Working with dates2m 14s
-
(Locked)
Derived values3m 16s
-
(Locked)
Set operations5m 37s
-
(Locked)
Join operations1m 58s
-
(Locked)
Inner joins7m 7s
-
(Locked)
Joining multiple tables6m 34s
-
(Locked)
Outer joins2m 55s
-
(Locked)
Transactions and the ACID model3m 48s
-
(Locked)
-
-
(Locked)
Query optimization2m 11s
-
(Locked)
Index optimization2m 5s
-
(Locked)
Patch management1m 33s
-
(Locked)
Database integrity checks2m 38s
-
(Locked)
Data corruption checks2m 21s
-
(Locked)
Audit log review2m 6s
-
(Locked)
Performance tuning3m 23s
-
(Locked)
Load balancing2m 58s
-
(Locked)
Change management3m
-
(Locked)
-
-
(Locked)
Legal and compliance risks2m 19s
-
(Locked)
Data privacy4m
-
(Locked)
General Data Protection Regulation (GDPR)7m 12s
-
(Locked)
California Consumer Privacy Act (CCPA)5m 56s
-
(Locked)
Data types1m 42s
-
(Locked)
Data classification2m 44s
-
(Locked)
Data loss prevention5m 17s
-
(Locked)
Security policies5m 7s
-
(Locked)
-
-
(Locked)
Identity and access management2m 58s
-
(Locked)
Usernames and access cards3m 23s
-
(Locked)
Biometrics2m 42s
-
(Locked)
Authentication factors3m 26s
-
(Locked)
Multifactor authentication2m 35s
-
(Locked)
Password policies4m 19s
-
(Locked)
Need to know and least privilege2m 34s
-
(Locked)
Privileged account management2m 31s
-
(Locked)