数据库(中英文翻译)
- 格式:docx
- 大小:24.65 KB
- 文档页数:7
单词汇总(数据库专业一点的词汇其实主要就是每章后面review items的内容,在这里简单列一下,如果你实在没时间看书,至少这些单词要熟悉.):1. 数据库系统:database system(DS),database management system(DBMS)2.数据库系统(DS),数据库治理系统(DBMS )3. 关系和关系数据库table= relation , column = attribute 属性,domain, atomic domain, row= tuple ,relational database, relation schema, relation instance, database schema, database instance;4.表=关系,列=属性属性,域,原子域,排二元组,关系型数据库,关系模式,关系实例,数据库模式,数据库实例;1. key 们:super key, candidate key, primary key, foreign key, referencing relation, referenced relation;2.超码,候选码,主码,外码,参照关系,被参照关系5.关系代数(relational algebra): selection, project, natural join, Cartesian product, set operations, union, intersect, set difference( except\minus), Rename, assignment, outer join, grouping, tuple relation calculus6.(关系代数):选择,工程,自然连接,笛卡尔积,集合运算,集,交集,集合差(除负),重命名,分配,外连接,分组,元组关系演算7.sql组成:DDL :数据库模式定义语言,关键字:createDML :数据操纵语言,关键字:Insert > delete、updateDCL :数据库限制语言,关键字:grant、removeDQL :数据库查询语言,关键字:select8.3.SQL 语言:DDL , DML , DCL , QL , sql query structure, aggregate functions, nested subqueries, exists(as an operator), unique(as anoperator), scalar subquery, assertion, index(indices), catalogs, authorization, all privileges, granting, revoking , grant option, trigger, stored procedure, stored function4.SQL语言:DDL , DML , DCL , QL , SQL查询结构,聚合函数,嵌套子查询,存在(如运营商),独特的(如运营商),标量子查询,断言指数(指数),目录,授权,所有权限,授予,撤销,GRANT OPTION ,触发器,存储过程,存储函数9. 表结构相关:Integrity constraints, domain constraints, referential integrity constraints10.完整性约束,域名约束,参照完整性约束5.数据库设计(ER 模型):Entity-Relationship data model, ER diagram, composite attribute, single-valued and multivalued attribute,derived attribute, binary relationship set, degree of relationship set, mapping cardinality, 1-1, 1-m, m-n relationship set (one to one, one to many, many to many), participation, partial or total participation, weak entity sets, discriminator attributes, specialization and generalization6.实体关系数据模型,ER图,复合属性,单值和多值属性,派生属性,二元关系集,关系集,映射基数的程度,1-1, 1-米,MN关系集合(一对一,一对多,多对多),参与局部或全部参与,弱实体集,分辨符属性,特化和概化11. 函数依赖理论:functional dependence, normalization, lossless join (or lossless) decomposition,First Normal Form (1NF), the third normal form (3NF), Boyce-codd normal form (BCNF), R satisfies F, F holds on R, Dependency preservation 保持依赖,Trivial, closure of a set of functional dependencies 函数依赖集的闭包,closure of a set of attributes 属性集闭包,Armstrong 's axioms Armstrong 公理,reflexivity rule 自反律,augmentation rule,增广率, transitivity 传递律,restriction of F to R i F 在Ri 上的限定,canonical cover 正那么覆盖, extraneous attributes 无关属性,decomposition algorithm 分解算法.7.函数依赖,标准化,无损连接〔或无损〕分解,第一范式〔1NF〕,第三范式〔3NF〕 BC范式〔BCNF〕, R满足F, F持有R,依赖保存,平凡,一组函数依赖封闭,一组属性,8. 事务:transition, ACID properties ACID特性,并发限制系统concurrency control system,故障恢复系统recovery system,事务状态transition state,活动的active,局部提交的partiallycommitted,失败的failed,中止的aborted,提交的committed,已结束的terminated,调度schedule,操作冲突conflict of operations, 冲突等价conflict equivalence,冲突可串彳f化conflictserializablity ,可串行化顺序serializablity order,联级回滚cascading rollback,封锁协议lockingprotocol ,共享〔S〕锁shared-mode lock 〔S-lock〕,排他〔X〕锁exclusive -mode lock 〔X-lock〕, 相容卜i compatibility,两阶段封锁协议2-phase locking protocol,意向锁intention lock,时间戳timestamp, 恢复机制recovery scheme,日志log, 基于日志的恢复log-based recovery, 延迟的修改deferredmodification,立即的修改immediate modification,检查点checkpoint.数据库系统DBS Database System数据库系统应用Database system applications文件处理系统file-processing system数据不一致性data inconsistency——致性约束consistency constraint数据抽象Data Abstraction实例instance模式schema物理模式physical schema逻辑模式logical schema物理数据独立性physical data independence数据方^型data model实体-联系模型entity-relationship model 〔E-R〕关系数据模型relational data model基于对象的数据模型object-based data model半结构化数据模型semistructured data model数据库语言database language数据定义语言data-definition language数据操纵语言data-manipulation language查询语言query language元数据metadata应用程序application program标准化normalization数据字典data dictionary存储治理器storage manager查询治理器query processor事务transaction原子性atomicity故障恢复failure recovery并发限制concurrency-control两层和三层数据库体系结构two-tier/three-tier数据才2掘data mining数据库治理员DBA database administrator表table关系relation元组tuple空值null value数据库模式database schema数据库实例database instance关系模式relation schema关系实例relation instance码keys超码super key候选码candidate key主码primary key外码foreign key参照关系referencing relation被参照关系referenced relation属性attribute域domain原子域atomic domain参照完整性约束referential integrity constraint模式图schema diagram查询语言query language过程化语言procedural language非过程化语言nonprocedural language关系运算operations on relations选择元组selection of tuples选择属性selection of attributes自然连接natural join笛卡尔积Cartesian product集合运算set operations关系代数relational algebraSQL 查询语言SQL query structureSelect 字句select clauseFrom 字句from clauseWhere 字句where clause自然连接运算natural join operationAs 字句as clauseOrder by 字句order by clause相关名称 (相关变量,元组变量) correlation name (correlation variable , tuple variable ) 集合运算set operationsUnionInterestExcept空值null values真值"unknown " truth “ unknown 〞聚集函数aggregate functionsavg, min, max, sum, countgroup byhaving嵌套子查询nested subqueries集合比拟set comparisons{ «,? 二 ,〉〉,?=}{some , all}existsuniquelateral 字句lateral clausewith 字句with clause标量子查询scalar subquery数据库彳修改database modification删除deletion插入insertion更新updating参照完整性referential integrity参照完整T约束referential Hntegrity constraint 或子集依赖subset dependency 可延迟的deferrable断言assertion连接类型join types内连接和夕卜连接inner and outer join左外连接、右外连接和全外连接left、right and full outer joinNatural连接条件、using连接条件和on连接条件natural using and so on 视图定义view definition物化视图materialized views视图更新view update事务transactions提交commit work回滚roll back work原子事务atomic transaction完整性约束integrity constraints域约束domain constraints唯——性约束unique constraintCheck 字句check clause参照完整性referential integrity级联删除cascading delete级联更新cascading updates断言assertions日期和时间类型date and time types默认值default values索弓I index大对象large object用户定义类型user-defined types域domains目录catalogs模式schemas授权authorization权卜M privileges选择select插入insert更新update所有权限all privileges授予权卜M granting of privileges收回权卜M revoking of privileges授予权限的权限privileges to privilegesGrant option角色roles视图授权authorization on views执行授权execute authorization调用者权限invoker privileges行级授权row-level authorizationJDBCODBC预备语句prepared statements 访问元数据accessing metadata SQL 注入SQL injection 嵌入式SQL embedded SQL 游标cursors 可更新的游标updatable cursors 动态SQL dynamic SQL SQL 函数SQL functions 存储过程stored procedures 过程化结构procedural constructs夕卜部语言例程external language routines触发器triggerBefore 和after 触发器before and after triggers过渡变量和过渡表transition variables and tables递归查询recursive queries单调查询monotonic queries排名函数ranking functionsRankDense rankPartition by分窗windowing联机分析处理〔OLAP 〕 online analytical processing多维数据multidimensional data度量属性measure attributes维属性dimension attributes转轴pivoting数据立方体data cube切片和切块slicing and dicing上卷和下钻rollup and drill down交叉表cross-tabulation第七章实体-联系数据模型Entity-relationship data model实体和实体集entity and entity set属性attribute域domain简单和复合属T生simple and composite attributes单值和多值属T生single-valued and multivalued attributes空值null value派生属性derived attribute超码、候选码以及主码super key ,candidate key, and primary key联系和联系集relationship and relationship set二元联系集binary relationship set联系集的度degree of relationship set描述性属性descriptive attributes超码、候选码以及主码super key ,candidate key, and primary key角色role自环联系集recursive relationship setE-R 图E-R diagram映射基数mapping cardinality——对——联系one-to-one relationship——对多联系one-to-many relationship多对——联系many-to-one relationship多对多联系many-to-many relationship参与participation全部参与total participation局部参与partial participation弱实体集和强实体集weak entity sets and strong entity sets分辨符属性discriminator attributes标识联系identifying relationship特化和概化specialization and generalization超类和子类superclass and subclass属性继承attribute inheritance单和多继承single and multiple inheritance条件定义的和用户定义的成员资格condition-defined and userdefined membership 不相交概化和重叠概化disjoint and overlapping generalization全部概化和局部概化total and partial generalization聚集aggregationUMLUML 类图UML class diagram第八章E-R 模型和标准化E-R model and normalization分解decomposition函数依赖functional dependencies无损分解lossless decomposition原子域atomic domains第一范式(1NF) first normal form(1NF)合法关系legal relations超码super keyR 满足 F R satisfies FF在R上成立 F holds on RBoyce-Codd 范式BCNF Boyce-Codd normal form(BCNF)保持依赖dependency preservation第三范式(3NF) third normal form(3NF)平凡的函数依赖thivial functional dependencies函数依赖集的闭包closure of a set of functional dependenciesArmstrong 公理Armstrong s axioms属性集闭包closure of attribute setsF 在Ri 上的限定restriction of F to Ri正贝 1 覆盖canonical cover无关属T生extraneous attributesBCNF 分解算法BCNF decomposition algorithm3NF 分解算法3NF decomposition algorithm多值依赖multivalued dependencies第四范式(4NF) fourth normal form(4NF)多值依赖的限定restriction of a multivalued independency投影-连接范式(PJNF) project-join normal form(PJNF)域-码范式(DKNF ) domain-key normal form(DKNF)泛关系universal relation唯一角色假设unique-role assumption 去标准化denormalization。
中英文对照外文翻译Database Management SystemsA database (sometimes spelled data base) is also called an electronic database , referring to any collection of data, or information, that is specially organized for rapid search and retrieval by a computer. Databases are structured to facilitate the storage, retrieval , modification, and deletion of data in conjunction with various data-processing operations .Databases can be stored on magnetic disk or tape, optical disk, or some other secondary storage device.A database consists of a file or a set of files. The information in these files may be broken down into records, each of which consists of one or more fields. Fields are the basic units of data storage , and each field typically contains information pertaining to one aspect or attribute of the entity described by the database . Using keywords and various sorting commands, users can rapidly search , rearrange, group, and select the fields in many records to retrieve or create reports on particular aggregate of data.Complex data relationships and linkages may be found in all but the simplest databases .The system software package that handles the difficult tasks associated with creating ,accessing, and maintaining database records is called a database management system(DBMS).The programs in a DBMS package establish an interface between the database itself and the users of the database.. (These users may be applications programmers, managers and others with information needs, and various OS programs.)A DBMS can organize, process, and present selected data elements form the database. This capability enables decision makers to search, probe, and query database contents in order to extract answers to nonrecurring and unplanned questions that aren’t available in regular reports. These questions might initially be vague and/or poorly defined ,but people can “browse” through the database until they have the needed information. In short, the DBMS will “manage” the stored data items and assemble the needed items from the common database in response to the queries of those who aren’t programmers.A database management system (DBMS) is composed of three major parts:(1)a storage subsystemthat stores and retrieves data in files;(2) a modeling and manipulation subsystem that provides the means with which to organize the data and to add , delete, maintain, and update the data;(3)and an interface between the DBMS and its users. Several major trends are emerging that enhance the value and usefulness of database management systems;Managers: who require more up-to-data information to make effective decisionCustomers: who demand increasingly sophisticated information services and more current information about the status of their orders, invoices, and accounts.Users: who find that they can develop custom applications with database systems in a fraction of the time it takes to use traditional programming languages.Organizations : that discover information has a strategic value; they utilize their database systems to gain an edge over their competitors.The Database ModelA data model describes a way to structure and manipulate the data in a database. The structural part of the model specifies how data should be represented(such as tree, tables, and so on ).The manipulative part of the model specifies the operation with which to add, delete, display, maintain, print, search, select, sort and update the data.Hierarchical ModelThe first database management systems used a hierarchical model-that is-they arranged records into a tree structure. Some records are root records and all others have unique parent records. The structure of the tree is designed to reflect the order in which the data will be used that is ,the record at the root of a tree will be accessed first, then records one level below the root ,and so on.The hierarchical model was developed because hierarchical relationships are commonly found in business applications. As you have known, an organization char often describes a hierarchical relationship: top management is at the highest level, middle management at lower levels, and operational employees at the lowest levels. Note that within a strict hierarchy, each level of management may have many employees or levels of employees beneath it, but each employee has only one manager. Hierarchical data are characterized by this one-to-many relationship among data.In the hierarchical approach, each relationship must be explicitly defined when the database is created. Each record in a hierarchical database can contain only one key field and only one relationship is allowed between any two fields. This can create a problem because data do not always conform to such a strict hierarchy.Relational ModelA major breakthrough in database research occurred in 1970 when E. F. Codd proposed a fundamentally different approach to database management called relational model ,which uses a table asits data structure.The relational database is the most widely used database structure. Data is organized into related tables. Each table is made up of rows called and columns called fields. Each record contains fields of data about some specific item. For example, in a table containing information on employees, a record would contain fields of data such as a person’s last name ,first name ,and street address.Structured query language(SQL)is a query language for manipulating data in a relational database .It is nonprocedural or declarative, in which the user need only specify an English-like description that specifies the operation and the described record or combination of records. A query optimizer translates the description into a procedure to perform the database manipulation.Network ModelThe network model creates relationships among data through a linked-list structure in which subordinate records can be linked to more than one parent record. This approach combines records with links, which are called pointers. The pointers are addresses that indicate the location of a record. With the network approach, a subordinate record can be linked to a key record and at the same time itself be a key record linked to other sets of subordinate records. The network mode historically has had a performance advantage over other database models. Today , such performance characteristics are only important in high-volume ,high-speed transaction processing such as automatic teller machine networks or airline reservation system.Both hierarchical and network databases are application specific. If a new application is developed ,maintaining the consistency of databases in different applications can be very difficult. For example, suppose a new pension application is developed .The data are the same, but a new database must be created.Object ModelThe newest approach to database management uses an object model , in which records are represented by entities called objects that can both store data and provide methods or procedures to perform specific tasks.The query language used for the object model is the same object-oriented programming language used to develop the database application .This can create problems because there is no simple , uniform query language such as SQL . The object model is relatively new, and only a few examples of object-oriented database exist. It has attracted attention because developers who choose an object-oriented programming language want a database based on an object-oriented model. Distributed DatabaseSimilarly , a distributed database is one in which different parts of the database reside on physically separated computers . One goal of distributed databases is the access of informationwithout regard to where the data might be stored. Keeping in mind that once the users and their data are separated , the communication and networking concepts come into play .Distributed databases require software that resides partially in the larger computer. This software bridges the gap between personal and large computers and resolves the problems of incompatible data formats. Ideally, it would make the mainframe databases appear to be large libraries of information, with most of the processing accomplished on the personal computer.A drawback to some distributed systems is that they are often based on what is called a mainframe-entire model , in which the larger host computer is seen as the master and the terminal or personal computer is seen as a slave. There are some advantages to this approach . With databases under centralized control , many of the problems of data integrity that we mentioned earlier are solved . But today’s personal computers, departmental computers, and distributed processing require computers and their applications to communicate with each other on a more equal or peer-to-peer basis. In a database, the client/server model provides the framework for distributing databases.One way to take advantage of many connected computers running database applications is to distribute the application into cooperating parts that are independent of one anther. A client is an end user or computer program that requests resources across a network. A server is a computer running software that fulfills those requests across a network . When the resources are data in a database ,the client/server model provides the framework for distributing database.A file serve is software that provides access to files across a network. A dedicated file server is a single computer dedicated to being a file server. This is useful ,for example ,if the files are large and require fast access .In such cases, a minicomputer or mainframe would be used as a file server. A distributed file server spreads the files around on individual computers instead of placing them on one dedicated computer.Advantages of the latter server include the ability to store and retrieve files on other computers and the elimination of duplicate files on each computer. A major disadvantage , however, is that individual read/write requests are being moved across the network and problems can arise when updating files. Suppose a user requests a record from a file and changes it while another user requests the same record and changes it too. The solution to this problems called record locking, which means that the first request makes others requests wait until the first request is satisfied . Other users may be able to read the record, but they will not be able to change it .A database server is software that services requests to a database across a network. For example, suppose a user types in a query for data on his or her personal computer . If the application is designed with the client/server model in mind ,the query language part on the personal computer simple sends the query across the network to the database server and requests to be notified when the data are found.Examples of distributed database systems can be found in the engineering world. Sun’s Network Filing System(NFS),for example, is used in computer-aided engineering applications to distribute data among the hard disks in a network of Sun workstation.Distributing databases is an evolutionary step because it is logical that data should exist at the location where they are being used . Departmental computers within a large corporation ,for example, should have data reside locally , yet those data should be accessible by authorized corporate management when they want to consolidate departmental data . DBMS software will protect the security and integrity of the database , and the distributed database will appear to its users as no different from the non-distributed database .In this information age, the data server has become the heart of a company. This one piece of software controls the rhythm of most organizations and is used to pump information lifeblood through the arteries of the network. Because of the critical nature of this application, the data server is also the one of the most popular targets for hackers. If a hacker owns this application, he can cause the company's "heart" to suffer a fatal arrest.Ironically, although most users are now aware of hackers, they still do not realize how susceptible their database servers are to hack attacks. Thus, this article presents a description of the primary methods of attacking database servers (also known as SQL servers) and shows you how to protect yourself from these attacks.You should note this information is not new. Many technical white papers go into great detail about how to perform SQL attacks, and numerous vulnerabilities have been posted to security lists that describe exactly how certain database applications can be exploited. This article was written for the curious non-SQL experts who do not care to know the details, and as a review to those who do use SQL regularly.What Is a SQL Server?A database application is a program that provides clients with access to data. There are many variations of this type of application, ranging from the expensive enterprise-level Microsoft SQL Server to the free and open source mySQL. Regardless of the flavor, most database server applications have several things in common.First, database applications use the same general programming language known as SQL, or Structured Query Language. This language, also known as a fourth-level language due to its simplistic syntax, is at the core of how a client communicates its requests to the server. Using SQL in its simplest form, a programmer can select, add, update, and delete information in a database. However, SQL can also be used to create and design entire databases, perform various functions on the returned information, and even execute other programs.To illustrate how SQL can be used, the following is an example of a simple standard SQL query and a more powerful SQL query:Simple: "Select * from dbFurniture.tblChair"This returns all information in the table tblChair from the database dbFurniture.Complex: "EXEC master..xp_cmdshell 'dir c:\'"This short SQL command returns to the client the list of files and folders under the c:\ directory of the SQL server. Note that this example uses an extended stored procedure that is exclusive to MS SQL Server.The second function that database server applications share is that they all require some form of authenticated connection between client and host. Although the SQL language is fairly easy to use, at least in its basic form, any client that wants to perform queries must first provide some form of credentials that will authorize the client; the client also must define the format of the request and response.This connection is defined by several attributes, depending on the relative location of the client and what operating systems are in use. We could spend a whole article discussing various technologies such as DSN connections, DSN-less connections, RDO, ADO, and more, but these subjects are outside the scope of this article. If you want to learn more about them, a little Google'ing will provide you with more than enough information. However, the following is a list of the more common items included in a connection request.Database sourceRequest typeDatabaseUser IDPasswordBefore any connection can be made, the client must define what type of database server it is connecting to. This is handled by a software component that provides the client with the instructions needed to create the request in the correct format. In addition to the type of database, the request type can be used to further define how the client's request will be handled by the server. Next comes the database name and finally the authentication information.All the connection information is important, but by far the weakest link is the authentication information—or lack thereof. In a properly managed server, each database has its own users with specifically designated permissions that control what type of activity they can perform. For example, a user account would be set up as read only for applications that need to only access information. Another account should be used for inserts or updates, and maybe even a third account would be used for deletes.This type of account control ensures that any compromised account is limited in functionality. Unfortunately, many database programs are set up with null or easy passwords, which leads to successful hack attacks.译文数据库管理系统介绍数据库(database,有时拼作data base)又称为电子数据库,是专门组织起来的一组数据或信息,其目的是为了便于计算机快速查询及检索。
DBA词典:数据库设计常用词汇中英文对照表1. Access method(访问方法):此步骤包括从文件中存储和检索记录。
2. Alias(别名):某属性的另一个名字。
在SQL中,可以用别名替换表名。
3. Alternate keys(备用键,ER/关系模型):在实体/表中没有被选为主健的候选键。
4. Anomalies(异常)参见更新异常(update anomalies)5. Application design(应用程序设计):数据库应用程序生命周期的一个阶段,包括设计用户界面以及使用和处理数据库的应用程序。
6. Attribute(属性)(关系模型):属性是关系中命名的列。
7. Attribute(属性)(ER模型):实体或关系中的一个性质。
8. Attribute inheritance(属性继承):子类成员可以拥有其特有的属性,并且继承那些与超类有关的属性的过程。
9. Base table(基本表):一个命名的表,其记录物理的存储在数据库中。
10. Binary relationship(二元关系):一个ER术语,用于描述两个实体间的关系。
例如,panch Has Staff。
11. Bottom-up approach(自底向上方法):用于数据库设计,一种设计方法学,他从标识每个设计组建开始,然后将这些组件聚合成一个大的单元。
在数据库设计中,可以从表示属性开始底层设计,然后将这些属性组合在一起构成代表实体和关系的表。
12. Business rules(业务规则):由用户或数据库的管理者指定的附加规则。
13. Candidate key(候选键,ER关系模型):仅包含唯一标识实体所必须得最小数量的属性/列的超键。
14. Cardinality(基数):描述每个参与实体的可能的关系数目。
15. Centralized approach(集中化方法,用于数据库设计):将每个用户试图的需求合并成新数据库应用程序的一个需求集合16. Chasm trap(深坑陷阱):假设实体间存在一根,但某些实体间不存在通路。
激活(activate)数组(array)数组公式(array formula)相关联的数据透视表(associated PivotTable report) 自动套用格式(autoformat)坐标轴(axis)基础地址(base address)“合并计算”表(consolidation table)比较条件(comparison criteria)比较运算符(comparison operator)常量(constant)单元格引用(cell reference)当前区域(current region)分类轴(category axis)分类字段(category field)复制区域(copy area)计算列(calculated column)计算项(calculated item)计算字段(数据库)(calculated field)计算字段(数据透视表)(calculated field)列标题(column heading)列标题(column heading)列字段(column field)条件(criteria)条件窗格(criteria pane)条件格式(conditional format)图表工作表(chart sheet)图表区(chart area)修订记录(change history)约束条件(constraints)证书验证机构(certifying authority)自定义计算(custom calculation)垂直线(drop lines)从属单元格(dependents)明细数据(detail data)默认工作表模板(default worksheet template)默认工作簿模板(default workbook template)默认启动工作簿(default startup workbook)目标区域(destination area)数据标签(data label)数据标志(data marker)数据表(data table)数据表单(data form)数据窗格(data pane)数据点(data points)数据库(database)数据区域(data region)数据系列(data series)数据系列(data series)数据有效性(data validation)数据源(data source)数据源驱动程序(data source driver)图表数据表(data table in charts)下拉列表框(drop-down list box)值区域(values area)值字段(value field)表达式(expression)嵌入图表(embedded chart)外部数据(external data)外部数据(external data)外部数据区域(external data range)外部引用(external reference)误差线(error bars)编辑栏(formula bar)公式(formula)公式选项板(Formula Palette)函数(Microsoft Query)(function)函数(Office Excel)(function)筛选(filter)填充柄(fill handle)字段(数据库)(field)字段(数据透视表)(field)单变量求解(goal seek)图表中的网格线(gridlines in charts)组(group)冲突日志工作表(History worksheet)高低点连线(high-low lines)插入行(Insert row)迭代(iteration)绝对交集(implicit intersection)内部连接(inner join)输入单元格(input cell)索引(index)项(item)连接(join)连接线(join line)连接线(join line)锁定的字段或记录(locked field or record)图例(legend)图例项标示(legend keys)合并单元格(merged cell)活动选定框(moving border)矩阵(matrix)移动平均(moving average)映射范围(mapped range)操作数(operand)分级显示(outline)分级显示符号(outline symbols)分级显示数据(outline data)脱机多维数据集文件(offline cube file)外部连接(outer join)外部连接(outer join)运算符(operator)磅(point)保护(protect)报表筛选(report filter)参数(parameter)参数查询(parameter query)打印标题(print titles)打印区域(print area)分页符(page break)分页预览(page break preview)绘图区(plot area)密码(password)数据透视表(PivotTable report)数据透视表(PivotTable report)数据透视表分类汇总(PivotTable subtotal)数据透视表列表(PivotTable list)数据透视表数据(PivotTable data)数据透视表总计(PivotTable grand totals)数据透视图报表(PivotChart report)数据透视图分类字段(PivotChart category field)数据透视图系列字段(PivotChart series field)透视区域(pivot area)引用单元格(precedents)粘贴区域(paste area)主键(primary key)属性字段(property fields)查询(query)详细出处参考:/office/excel/16273.htmlEXCEL函数大全数据库和清单管理函数DA VERAGE 返回选定数据库项的平均值DCOUNT 计算数据库中包含数字的单元格的个数DCOUNTA 计算数据库中非空单元格的个数DGET 从数据库中提取满足指定条件的单个记录DMAX 返回选定数据库项中的最大值DMIN 返回选定数据库项中的最小值DPRODUCT 乘以特定字段(此字段中的记录为数据库中满足指定条件的记录)中的值DSTDEV 根据数据库中选定项的示例估算标准偏差DSTDEVP 根据数据库中选定项的样本总体计算标准偏差DSUM 对数据库中满足条件的记录的字段列中的数字求和DV AR 根据数据库中选定项的示例估算方差DV ARP 根据数据库中选定项的样本总体计算方差GETPIVOTDA TA 返回存储在数据透视表中的数据日期和时间函数DATE 返回特定时间的系列数DATEDIF 计算两个日期之间的年、月、日数DATEV ALUE 将文本格式的日期转换为系列数DAY 将系列数转换为月份中的日DAYS360 按每年360天计算两个日期之间的天数EDATE 返回在开始日期之前或之后指定月数的某个日期的系列数EOMONTH 返回指定月份数之前或之后某月的最后一天的系列数HOUR 将系列数转换为小时MINUTE 将系列数转换为分钟MONTH 将系列数转换为月NETWORKDAYS 返回两个日期之间的完整工作日数NOW 返回当前日期和时间的系列数SECOND 将系列数转换为秒TIME 返回特定时间的系列数TIMEV ALUE 将文本格式的时间转换为系列数TODAY 返回当天日期的系列数WEEKDAY 将系列数转换为星期WORKDAY 返回指定工作日数之前或之后某日期的系列数YEAR 将系列数转换为年YEARFRAC 返回代表START_DATE(开始日期)和END_DATE(结束日期)之间天数的以年为单位的分数DDE 和外部函数CALL 调用动态链接库(DLL)或代码源中的过程REGISTER.ID 返回已注册的指定DLL或代码源的注册IDSQL.REQUEST 连接外部数据源,并从工作表中运行查询,然后将结果作为数组返回,而无需进行宏编程。
计算机网络中英翻译ACK (ACKnowledgement) 确认帧ADSL (Asymmetric Digital Subscriber Line) 非对称数字用户线AN (Access Network )接入网ANSI (American National Standards Institute) 美国国家标准协会AP (Access Point) 接入点API (Application Programming Interface) 应用编程接口APNIC (Asia Pacific Network Information Center) 亚太网络信息中心ARP ( Address Resolution Protocol )地址解析协议ARPA (Advanced Research Project Agency)美国国防部远景研究规划局(高级研究计划署)ARQ (Automatic Repeat reQuest) 自动请求重发ATM (Asynchronous Transfer Mode) 异步传递方式ATU (Access Termination Unit) 接入端接单元ATU-C (Access Termination Unit Central Office )端局接入端接单元ATU-R (Access Termination Unit Remote) 远端接入端接单元AUI (Attachment Unit Interface )连接接口单元AWT ( Abstract Window Toolkit )抽象窗口工具箱BECN (Backward Explicit Congestion Notification) 反向显式拥塞通知BER (Basic Encoding Rule) 基本编码规则BGP (Border Gateway Protocol) 边界网关协议BSA (Basic Service Area) 基本服务区BSS (Basic Service Set) 基本服务集BNA 宝来网络体系结构CAC (Connection Admission Control) 连接准许控制CAP (Carrierless Amplitude Phase) 无载波振幅相位调制CATV (Community Antenna TV, CAble TV) 有线电视CBR ( Constant Bit Rate )恒定比特率CCIR (Consultative Committee,International Radio) 国际无线电咨询委员会CCITT (Consultative Committee, International Telegraph and Telephone)国际电报电话咨询委员会CCP 通信控制处理机CDM (Code Division Multiplexing) 码分复用CDMA (Code Division Multiplex Access) 码分多址CNNIC (Network Information Center of China) 中国互联网络信息中心CRC (Cyclic Redundancy Check) 循环冗余检验CSMA/CD (Carrier Sense Multiple Access / Collision Detection)载波监听多点接入/碰撞检测CSU/DSU ( Channel Service Unit/Data Service Unit) 信道服务单元/数据服务单元CTD (Cell Transfer Delay) 信元传送时延DACS (Digital Access and Cross-connect System) 数字交接系统DCA 数据通信体系结构DCE (Data Circuit-terminating Equipment) 数据电路端接设备DE (Discard Eligibility) 丢弃指示DES (Data Encryption Standard) 数据加密标准DHCP (Dynamic Host Configuration Protocol) 动态主机配置协议DLCI (Data Link Connection Identifier) 数据链路连接标识符DMT (Discrete Multi-Tone) 离散多音(调制)DNS (Domain Name System) 域名系统DNA 数据网络系统结构DSL (Digital Subscriber Line) 数字用户线DSLAM (DSL Access Multiplexer) 数字用户线接入复用器DSSS (Direct Sequence Spread Spectrum) 直接序列扩频DTE (Data Terminal Equipment) 数据终端设备DVMRP (Distance Vector Multicast Routing Protocol) 距离向量多播路由选择协议DWDM (Dense WDM) 密集波分复用EGP (External Gateway Protocol) 外部网关协议EIA (Electronic Industries Association )美国电子工业协会ESP (Encapsulating Security Payload) 封装安全有效载荷ESS 伍 xtended Service Set) 扩展的服务集FCS (Frame Check Sequence) 帧检验序列FDDI (Fiber Distributed Data Interface )光纤分布式数据接口FDM (Frequency Division Multiplexing) 频分复用FEC (Forwarding Equivalence Class) 转发等价类FEC (Forward Error Correction) 前向纠错FHSS (Frequency Hopping Spread Spectrum) 跳频扩频FIFO ( First In First Out) 先进先出FQ (Fair Queuing) 公平排队FR (Frame Relay) 帧中继FSK (Frequency Shift Keying) 移频键控FTP (File Transfer Protocol )文件传送协议FTTB (Fiber To The Building) 光纤到大楼FTTC (Fiber To The Curb )光纤到路边FTTH (Fiber To The Home) 光纤到家FTTD (Fiber To The Desk) 光纤到桌面FTTZ(Fiber To The Zone )光纤到小区FTTO (Fiber To The Office) 光纤到办公室FTTF (Fiber To The Floor) 光纤到楼层GIF (Graphics Interchange Format) 图形交换格式GII (Global Information Infrastructure) 全球信息基础结构,全球信息基础设施GFC ( Generic Flow Control) 通用流量控制GSM (Group Special Mobile) 群组专用移动通信体制HDLC (High-level Data Link Control) 面向比特的链路控制规程HDSL (High speed DSL) 高速数字用户线HEC (Header Error Control) 首部差错控制HFC (Hybrid Fiber Coax) 光纤同轴混合(网)HTML (HyperText Markup Language) 超文本置标语言HTTP (HyperText Transfer Protocol) 超文本传送协议IAB (Internet Architecture Board) 因特网体系结构委员会IAC ( Interpret As Command )作为命令解释IAHC (Internet International Ad Hoc Committee )因特网国际特别委员会ICMP ( Internet Control Message Protocol )因特网控制报文协议IDEA (International Data Encryption Algorithm) 国际数据加密算法IEEE电气和电子工程师协会IESG (Internet Engineering Steering Group) 因特网工程指导小组IETF (Internet Engineering Task Force) 因特网工程部IFS (Inter Frame Space) 帧间间隔IGMP (Internet Group Management Protocol) 因特网组管理协议IGP (Interior Gateway Protocol) 内部网关协议IM (Instant Messaging) 即时传信IMAP (Internet Message Access Protocol) 因特网报文存取协议IMP ( Interface Message Processor) 接口报文处理机IP (Internet Protocol )网际协议IR (InfraRed )红外技术IRTF ( Internet Research Task Force )因特网研究部ISDN (Integrated Services Digital Network) 综合业务数字网ISO ( International Organization for Standardization )国际标准化组织ISOC (Internet Society) 因特网协会ISP ( Internet Service Provider) 因特网服务提供者ITU ( International Telecommunication Union )国际电信联盟ITU-T ( ITU Telecommunication Standardization Sector) 国际电信联盟电信标准化部门JPEG (Joint Photographic Expert Group) 联合图像专家组标准KDC (Key Distribution Center) 密钥分配中心LAN (Local Area Network )局域网LANE (LAN Emulation )局域网仿真LAPB (Link Access Procedure Balanced) 链路接入规程(平衡型)LCP (Link Control Protocol) 链路控制协议LDP (Label Distribution Protocol) 标记分配协议LLC (Logical Link Control) 逻辑链路控制LSP (Label Switched Path) 标记交换路径LSR (Label Switching Router) 标记交换路由器MAC (Medium Access Control) 媒体接入控制MAN (Metropolitan Area Network) 城域网MAU (Medium Attachment Unit) 媒体连接单元MBONE (Multicast Backbone On the InterNEt )多播主干网MBS (Maximum Burst Size )最大突发长度MCR (Minimum Cell Rate )最小信元速率 MCU (Multipoint Control Unit)多点控制单元MD (Message Digest) 报文摘要MDI (Medium Dependent Interface )媒体相关接口MIB (Management Information Base) 管理信息库MIME (Multipurpose Internet Mail Extensions) 通用因特网邮件扩充modem 调制解调器MOTIF (Message Oriented Text Interchange System) 面向报文的电文交换系统MPEG (Motion Picture Experts Group) 活动图像专家组标准MPOA (MultiProtocol Over ATM) 多协议在 ATM 上运行MPLS (MultiProtocol Label Switching) 多协议标记交换MRU (Maximum Receive Unit) 最大接收单元MSS (Maximum Segment Size) 最长报文段MTU (Maximum Transfer Unit) 最大传送单元NAK (Negative AcKnowlegement) 否认帧NAP ( Network Access Point) 网络接入点N.ISDN (Narrowband-ISDN) 窄带综合业务数字网NAT (Network Address Translation )网络地址转换NAV (Network Al location Vector) 网络分配向量NCP (Network Control Protocol) 网络控制协议NFS (Network File System) 网络文件系统NGI 下一代因特网计划NIA 网络适配器NIC (Network Interface Card) 网络接口卡、网卡NII (National Information Infrastructure) 国家信息基础结构,国家信息基础设施NLRI (Network Layer Reachability Information) 网络层可达性信息NNI (Network-Node Interface) 网络结点接口NSF (National Science Foundation) (美国)国家科学基金会NVT (Network Virtual Terminal )网络虚拟终端ODBC (Open Database Connection)开放数据库互连OSF (Open Software Fundation )开放软件基金会OSI (Open System Interconnection )开放系统互联PBX (Private Branch eXchange )用户交换机PCM (Pulse Code Modulation ) 脉冲编码调制PCN (Personal Communications Network ) 个人通信网络PCR (Peak Cell Rate )峰值信元速率PCS 个人通信服务 Personal Communications ServicePDH 准同步数字系列PDA 个人数字助理 Personal Digital AssistantPDN 公用数据网 Public Data NetworkPDU 协议数据单元 Protocol Data UnitPER 分组差错率 packet error ratePIR 分组插入率 packet insertion ratePLCP 物理层会聚协议 Physical Layer Convergence ProtocolPLR 分组丢失率 packet loss ratePMD 物理媒体相关(子层) Physical Medium DependentPPP 点到点协议 Point to Point ProtocolPPTP 点对点隧道协议PRM 协议参考模型 Protocol Reference ModelPRN 分组无线网 Packet Radio NetworkPSN 分组交换节点 Packet Switch NodePSTN 公用电话交换网 Public Switched Telephone NetworkRARP 逆向地址解析协议 Reverse Address Resolution ProtocolRAS 远程访问服务器RFC 请求评注 Request for CommentsRMON 远程网络管理Router 路由器RPC 远程过程调用 Remote Procedure CallRSVP 资源重复利用协议RTP 接收和发送端口RTS 往返样本 Round Trip SampleRTS 剩余时间标签SAP 业务接入点 Service Access PointSAP 服务公告协议 Service Advertising ProtocolSAR 分段和重组(子层) Segmentation and ReassemblySDH 同步数字系列 Synchronous Digital HierarchySDLC 同步数据链路控制(协议) Advanced Data Communication Control Procedure SDTV 标准数字电视SDU 业务数据单元 Service Data UnitSIPP 增强的简单因特网协议 Simple Internet Protocol PlusSLIP 串行线路IP Serial Line Interface ProtocolSMDS 交换式多兆比特数据业务 Switched Multimegabit Data ServicesSMF 单模光纤 Single-mode FiberSMT 站点管理 Station ManagementSMTP 简单邮件传输协议 Simple Mail Transfer ProtocolSNA 系统网络体系结构 System Network ArchitectureSNMP 简单网络管理协议 Simple Network Management ProtocolSNR 信噪比 Signal-Noise ratioSONET 同步光纤网络 Synchronous Optical NetworkSTM 同步传输方式 Synchronous Transfer ModeSTP 屏蔽双绞线 Shielded Twisted PairSTS 同步传输信号 Synchronous Transport SignalSVC 交换虚电路 Switched Virtual CircuitSwitch 交换机TCP 传输控制协议 Transmission Control ProtocolTDM 时分多路复用 Time Division MultiplexingTFTP 单纯文件传输协议 Trivial File Transfer protocolTelnet 远程登录协议TIP 终端接口处理机 Terminal Interface ProcessorTP 双绞线 Twisted PairTSAP 传输层服务访问点 Transport Service Access PointUDP 用户数据报协议 User Datagram ProtocolUSB 通用串行总线 Universal Serial BusUTP 非屏蔽双绞线 Unshielded Twisted PairVAN 增值网 Value Added NetworkVBR 可变比特率 Variable Bit RateVCC 虚信道连接 Virtual Channel ConnectionVLAN 虚拟局域网 Virtual LANVLSI 超大规模集成电路VOD 点播图像 Video on DemandVPC 虚路径连接 Virtual Path ConnectionVPI 虚路径标识 virtual path identifierVPN 虚拟专用网络 Virtual Private NetworkVRML 虚拟现实造型语言 Virtual Reality Modeling Language VTP 虚拟隧道协议WAN 广域网 Wide Area NetworkWDM 波分多路复用 Wavelength Division MultiplexingWWW 万维网 World Wide Web。
Database FundamentalsIntroduction to DBMSA database management system (DBMS) is an important type of programming system, used today on the biggest and the smallest computers. As for other major forms of system software, such as compilers and operating systems, a well-understood set of principles for database management systems has developed over the years, and these concepts are useful both for understanding how to use these systems effectively and for designing and implementing DBMS's. DBMS is a collection of programs that enables you to store, modify, and extract information from a database. There are many different types of DBMS's, ranging from small systems that run on personal computers to huge systems that run on mainframes.There are two qualities that distinguish database management systems from other sorts of programming systems.1) The ability to manage persistent data, and2) The ability to access large amounts of data efficiently.Point 1) merely states that there is a database which exists permanently; the content of this database is the data that a DBMS accesses and manages. Point 2) distinguishes a DBMS from a file system, which also manages persistent data.A DBMS's capabilities are needed most when the amount of data is very large, because for small amounts of data, simple access techniques, such as linear scans of the data, are usually adequate.While we regard the above two properties of a DBMS as fundamental, there are a number of other capabilities that are almost universally found in commercial DBMS's. These are:(1) Support for at least one data model, or mathematical abstraction through which the user can view the data.(2) Support for certain high-level languages that allow the user to define the structure of data, access data, and manipulate data.(3) Transaction management, the capability to provide correct, concurrent access to the database by many users at once.(4) Access control, the ability to limit access to data by unauthorized users, and the ability to check the validity of data.(5) Resiliency, the ability to recover from system failures without losing data.Data Models Each DBMS provides at least one abstract model of data that allows the user to see information not as raw bits, but in more understandable terms.In fact, it is usually possible to see data at several levels of abstraction. At a relatively low level, a DBMS commonly allows us to visualize data as composed of files.Efficient File Access The ability to store a file is not remarkable: the file system associated with any operating system does that. The capability of a DBMS is seen when we access the data of a file. For example, suppose we wish to find the manager of employee "Clark Kent". If the company has thousands of employees, It is very expensive to search the entire file to find the one with NAME="Clark Kent". A DBMS helps us to set up "index files," or "indices," that allow us to access the record for "Clark Kent" in essentially one stroke no matter how large the file is. Likewise, insertion of new records or deletion of old ones can be accomplished in time that is small and essentially constant, independent of the file length. Another thing a DBMS helps us do is navigate among files, that is, to combine values in two or more files to obtain the information we want.Query Languages To make access to files easier, a DBMS provides a query language, or data manipulation language, to express operations on files. Query languages differ in the level of detail they require of the user, with systems based on the relational data model generally requiring less detail than languages based on other models.Transaction Management Another important capability of a DBMS is the ability to manage simultaneously large numbers of transactions, which are procedures operating on the database. Some databases are so large that they can only be useful if they are operated upon simultaneously by many computers: often these computers are dispersed around the country or the world. The database systems use by banks, accessed almost instantaneously by hundreds or thousands of automated teller machines (ATM), as well as by an equal or greater number of employees in the bank branches, is typical of this sort of database. An airline reservation system is another good example.Sometimes, two accesses do not interfere with each other. For example, any number of transactions can be reading your bank balance at the same time, without any inconsistency. But if you are in the bank depositing your salary check at the exact instant your spouse is extracting money from an automatic teller, the result of the two transactions occurring simultaneously and without coordination is unpredictable. Thus, transactions that modify a data item must “lock out” other transactions trying to read or write that item at the same time. A DBMS must therefore provide some form ofconcurrency control to prevent uncoordinated access to the same data item by more than one transaction.Even more complex problems occur when the database is distributed over many different computer systems, perhaps with duplication of data to allow both faster local access and to protect against the destruction of data if one computer crashes.Security of Data A DBMS must not only protect against loss of data when crashes occur, as we just mentioned, but it must prevent unauthorized access. For example, only users with a certain clearance should have access to the salary field of an employee file, and the DBMS must be able associate with the various users their privileges to see files, fields within files, or other subsets of the data in the database. Thus a DBMS must maintain a table telling for each user known to it, what access privileges the user has for each object. For example, one user may be allowed to read a file, but not to insert or delete data; another may not be allowed to see the file at all, while a third may be allowed to read or modify the file at will.DBMS TypesDesigners developed three different types of database structures: hierarchical, network, and relational. Hierarchical and network were first developed but relational has become dominant. While the relational design is dominant, the older databases have not been dropped. Companies that installed a hierarchical system such as IMS in the 1970s will be using and maintaining these databases for years to come even though new development is being done on relational systems. These older systems are often referred to as legacy systems.数据库基础DBMS 简介数据库管理系统是编程系统中的重要的一种,现今可以用在最大的以及最小的电脑上。
spss软件的中英文翻译Absolute deviation, 绝对离差Absolute number, 绝对数Absolute residuals, 绝对残差Acceleration array, 加速度立体阵Acceleration in an arbitrary direction, 任意方向上的加速度Acceleration normal, 法向加速度Acceleration space dimension, 加速度空间的维数Acceleration tangential, 切向加速度Acceleration vector, 加速度向量Acceptable hypothesis, 可接受假设Accumulation, 累积Accuracy, 准确度Actual frequency, 实际频数Adaptive estimator, 自适应估计量Addition, 相加Addition theorem, 加法定理Additivity, 可加性Adjusted rate, 调整率Adjusted value, 校正值Admissible error, 容许误差Aggregation, 聚集性Alternative hypothesis, 备择假设Among groups, 组间Amounts, 总量Analysis of correlation, 相关分析Analysis of covariance, 协方差分析Analysis of regression, 回归分析Analysis of time series, 时间序列分析Analysis of variance, 方差分析Angular transformation, 角转换ANOVA (analysis of variance), 方差分析ANOVA Models, 方差分析模型Arcing, 弧/弧旋Arcsine transformation, 反正弦变换Area under the curve, 曲线面积AREG , 评估从一个时间点到下一个时间点回归相关时的误差ARIMA, 季节和非季节性单变量模型的极大似然估计Arithmetic grid paper, 算术格纸Arithmetic mean, 算术平均数Arrhenius relation, 艾恩尼斯关系Assessing fit, 拟合的评估Associative laws, 结合律Asymmetric distribution, 非对称分布Asymptotic bias, 渐近偏倚Asymptotic efficiency, 渐近效率Asymptotic variance, 渐近方差Attributable risk, 归因危险度Attribute data, 属性资料Attribution, 属性Autocorrelation, 自相关Autocorrelation of residuals, 残差的自相关Average, 平均数Average confidence interval length, 平均置信区间长度Average growth rate, 平均增长率Bar chart, 条形图Bar graph, 条形图Base period, 基期Bayes' theorem , Bayes定理Bell-shaped curve, 钟形曲线Bernoulli distribution, 伯努力分布Best-trim estimator, 最好切尾估计量Bias, 偏性Binary logistic regression, 二元逻辑斯蒂回归Binomial distribution, 二项分布Bisquare, 双平方Bivariate Correlate, 二变量相关Bivariate normal distribution, 双变量正态分布Bivariate normal population, 双变量正态总体Biweight interval, 双权区间Biweight M-estimator, 双权M估计量Block, 区组/配伍组BMDP(Biomedical computer programs), BMDP统计软件包Boxplots, 箱线图/箱尾图Breakdown bound, 崩溃界/崩溃点Canonical correlation, 典型相关Caption, 纵标目Case-control study, 病例对照研究Categorical variable, 分类变量Catenary, 悬链线Cauchy distribution, 柯西分布Cause-and-effect relationship, 因果关系Cell, 单元Censoring, 终检Center of symmetry, 对称中心Centering and scaling, 中心化和定标Central tendency, 集中趋势Central value, 中心值CHAID -χ2 Automatic Interaction Detector, 卡方自动交互检测Chance, 机遇Chance error, 随机误差Chance variable, 随机变量Characteristic equation, 特征方程Characteristic root, 特征根Characteristic vector, 特征向量Chebshev criterion of fit, 拟合的切比雪夫准则Chernoff faces, 切尔诺夫脸谱图Chi-square test, 卡方检验/χ2检验Choleskey decomposition, 乔洛斯基分解Circle chart, 圆图Class interval, 组距Class mid-value, 组中值Class upper limit, 组上限Classified variable, 分类变量Cluster analysis, 聚类分析Cluster sampling, 整群抽样Code, 代码Coded data, 编码数据Coding, 编码Coefficient of contingency, 列联系数Coefficient of determination, 决定系数Coefficient of multiple correlation, 多重相关系数Coefficient of partial correlation, 偏相关系数Coefficient of production-moment correlation, 积差相关系数Coefficient of rank correlation, 等级相关系数Coefficient of regression, 回归系数Coefficient of skewness, 偏度系数Coefficient of variation, 变异系数Cohort study, 队列研究Column, 列Column effect, 列效应Column factor, 列因素Combination pool, 合并Combinative table, 组合表Common factor, 共性因子Common regression coefficient, 公共回归系数Common value, 共同值Common variance, 公共方差Common variation, 公共变异Communality variance, 共性方差Comparability, 可比性Comparison of bathes, 批比较Comparison value, 比较值Compartment model, 分部模型Compassion, 伸缩Complement of an event, 补事件Complete association, 完全正相关Complete dissociation, 完全不相关Complete statistics, 完备统计量Completely randomized design, 完全随机化设计Composite event, 联合事件Composite events, 复合事件Concavity, 凹性Conditional expectation, 条件期望Conditional likelihood, 条件似然Conditional probability, 条件概率Conditionally linear, 依条件线性Confidence interval, 置信区间Confidence limit, 置信限Confidence lower limit, 置信下限Confidence upper limit, 置信上限Confirmatory Factor Analysis , 验证性因子分析Confirmatory research, 证实性实验研究Confounding factor, 混杂因素Conjoint, 联合分析Consistency, 相合性Consistency check, 一致性检验Consistent asymptotically normal estimate, 相合渐近正态估计Consistent estimate, 相合估计Constrained nonlinear regression, 受约束非线性回归Constraint, 约束Contaminated distribution, 污染分布Contaminated Gausssian, 污染高斯分布Contaminated normal distribution, 污染正态分布Contamination, 污染Contamination model, 污染模型Contingency table, 列联表Contour, 边界线Contribution rate, 贡献率Control, 对照Controlled experiments, 对照实验Conventional depth, 常规深度Convolution, 卷积Corrected factor, 校正因子Corrected mean, 校正均值Correction coefficient, 校正系数Correctness, 正确性Correlation coefficient, 相关系数Correlation index, 相关指数Correspondence, 对应Counting, 计数Counts, 计数/频数Covariance, 协方差Covariant, 共变Cox Regression, Cox回归Criteria for fitting, 拟合准则Criteria of least squares, 最小二乘准则Critical ratio, 临界比Critical region, 拒绝域Critical value, 临界值Cross-over design, 交叉设计Cross-section analysis, 横断面分析Cross-section survey, 横断面调查Crosstabs , 交叉表Cross-tabulation table, 复合表Cube root, 立方根Cumulative distribution function, 分布函数Cumulative probability, 累计概率Curvature, 曲率/弯曲Curvature, 曲率Curve fit , 曲线拟和Curve fitting, 曲线拟合Curvilinear regression, 曲线回归Curvilinear relation, 曲线关系Cut-and-try method, 尝试法Cycle, 周期Cyclist, 周期性D test, D检验Data acquisition, 资料收集Data bank, 数据库Data capacity, 数据容量Data deficiencies, 数据缺乏Data handling, 数据处理Data manipulation, 数据处理Data processing, 数据处理Data reduction, 数据缩减Data set, 数据集Data sources, 数据来源Data transformation, 数据变换Data validity, 数据有效性Data-in, 数据输入Data-out, 数据输出Dead time, 停滞期Degree of freedom, 自由度Degree of precision, 精密度Degree of reliability, 可靠性程度Degression, 递减Density function, 密度函数Density of data points, 数据点的密度Dependent variable, 应变量/依变量/因变量Dependent variable, 因变量Depth, 深度Derivative matrix, 导数矩阵Derivative-free methods, 无导数方法Design, 设计Determinacy, 确定性Determinant, 行列式Determinant, 决定因素Deviation, 离差Deviation from average, 离均差Diagnostic plot, 诊断图Dichotomous variable, 二分变量Differential equation, 微分方程Direct standardization, 直接标准化法Discrete variable, 离散型变量DISCRIMINANT, 判断Discriminant analysis, 判别分析Discriminant coefficient, 判别系数Discriminant function, 判别值Dispersion, 散布/分散度Disproportional, 不成比例的Disproportionate sub-class numbers, 不成比例次级组含量Distribution free, 分布无关性/免分布Distribution shape, 分布形状Distribution-free method, 任意分布法Distributive laws, 分配律Disturbance, 随机扰动项Dose response curve, 剂量反应曲线Double blind method, 双盲法Double blind trial, 双盲试验Double exponential distribution, 双指数分布Double logarithmic, 双对数Downward rank, 降秩Dual-space plot, 对偶空间图DUD, 无导数方法Duncan's new multiple range method, 新复极差法/Duncan新法Effect, 实验效应Eigenvalue, 特征值Eigenvector, 特征向量Ellipse, 椭圆Empirical distribution, 经验分布Empirical probability, 经验概率单位Enumeration data, 计数资料Equal sun-class number, 相等次级组含量Equally likely, 等可能Equivariance, 同变性Error, 误差/错误Error of estimate, 估计误差Error type I, 第一类错误Error type II, 第二类错误Estimand, 被估量Estimated error mean squares, 估计误差均方Estimated error sum of squares, 估计误差平方和Euclidean distance, 欧式距离Event, 事件Event, 事件Exceptional data point, 异常数据点Expectation plane, 期望平面Expectation surface, 期望曲面Expected values, 期望值Experiment, 实验Experimental sampling, 试验抽样Experimental unit, 试验单位Explanatory variable, 说明变量Exploratory data analysis, 探索性数据分析Explore Summarize, 探索-摘要Exponential curve, 指数曲线Exponential growth, 指数式增长EXSMOOTH, 指数平滑方法Extended fit, 扩充拟合Extra parameter, 附加参数Extrapolation, 外推法Extreme observation, 末端观测值Extremes, 极端值/极值F distribution, F分布F test, F检验Factor, 因素/因子Factor analysis, 因子分析Factor Analysis, 因子分析Factor score, 因子得分Factorial, 阶乘Factorial design, 析因试验设计False negative, 假阴性False negative error, 假阴性错误Family of distributions, 分布族Family of estimators, 估计量族Fanning, 扇面Fatality rate, 病死率Field investigation, 现场调查Field survey, 现场调查Finite population, 有限总体Finite-sample, 有限样本First derivative, 一阶导数First principal component, 第一主成分First quartile, 第一四分位数Fisher information, 费雪信息量Fitted value, 拟合值Fitting a curve, 曲线拟合Fixed base, 定基Fluctuation, 随机起伏Forecast, 预测Four fold table, 四格表Fourth, 四分点Fraction blow, 左侧比率Fractional error, 相对误差Frequency, 频率Frequency polygon, 频数多边图Frontier point, 界限点Function relationship, 泛函关系Gamma distribution, 伽玛分布Gauss increment, 高斯增量Gaussian distribution, 高斯分布/正态分布Gauss-Newton increment, 高斯-牛顿增量General census, 全面普查GENLOG (Generalized liner models), 广义线性模型Geometric mean, 几何平均数Gini's mean difference, 基尼均差GLM (General liner models), 通用线性模型Goodness of fit, 拟和优度/配合度Gradient of determinant, 行列式的梯度Graeco-Latin square, 希腊拉丁方Grand mean, 总均值Gross errors, 重大错误Gross-error sensitivity, 大错敏感度Group averages, 分组平均Grouped data, 分组资料Guessed mean, 假定平均数Half-life, 半衰期Hampel M-estimators, 汉佩尔M估计量Happenstance, 偶然事件Harmonic mean, 调和均数Hazard function, 风险均数Hazard rate, 风险率Heading, 标目Heavy-tailed distribution, 重尾分布Hessian array, 海森立体阵Heterogeneity, 不同质Heterogeneity of variance, 方差不齐Hierarchical classification, 组内分组Hierarchical clustering method, 系统聚类法High-leverage point, 高杠杆率点HILOGLINEAR, 多维列联表的层次对数线性模型Hinge, 折叶点Histogram, 直方图Historical cohort study, 历史性队列研究Holes, 空洞HOMALS, 多重响应分析Homogeneity of variance, 方差齐性Homogeneity test, 齐性检验Huber M-estimators, 休伯M估计量Hyperbola, 双曲线Hypothesis testing, 假设检验Hypothetical universe, 假设总体Impossible event, 不可能事件Independence, 独立性Independent variable, 自变量Index, 指标/指数Indirect standardization, 间接标准化法Individual, 个体Inference band, 推断带Infinite population, 无限总体Infinitely great, 无穷大Infinitely small, 无穷小Influence curve, 影响曲线Information capacity, 信息容量Initial condition, 初始条件Initial estimate, 初始估计值Initial level, 最初水平Interaction, 交互作用Interaction terms, 交互作用项Intercept, 截距Interpolation, 内插法Interquartile range, 四分位距Interval estimation, 区间估计Intervals of equal probability, 等概率区间Intrinsic curvature, 固有曲率Invariance, 不变性Inverse matrix, 逆矩阵Inverse probability, 逆概率Inverse sine transformation, 反正弦变换Iteration, 迭代Jacobian determinant, 雅可比行列式Joint distribution function, 分布函数Joint probability, 联合概率Joint probability distribution, 联合概率分布K means method, 逐步聚类法Kaplan-Meier, 评估事件的时间长度Kaplan-Merier chart, Kaplan-Merier图Kendall's rank correlation, Kendall等级相关Kinetic, 动力学Kolmogorov-Smirnove test, 柯尔莫哥洛夫-斯米尔诺夫检验Kruskal and Wallis test, Kruskal及Wallis检验/多样本的秩和检验/H检验Kurtosis, 峰度Lack of fit, 失拟Ladder of powers, 幂阶梯Lag, 滞后Large sample, 大样本Large sample test, 大样本检验Latin square, 拉丁方Latin square design, 拉丁方设计Leakage, 泄漏Least favorable configuration, 最不利构形Least favorable distribution, 最不利分布Least significant difference, 最小显著差法Least square method, 最小二乘法Least-absolute-residuals estimates, 最小绝对残差估计Least-absolute-residuals fit, 最小绝对残差拟合Least-absolute-residuals line, 最小绝对残差线Legend, 图例L-estimator, L估计量L-estimator of location, 位置L估计量L-estimator of scale, 尺度L估计量Level, 水平Life expectance, 预期期望寿命Life table, 寿命表Life table method, 生命表法Light-tailed distribution, 轻尾分布Likelihood function, 似然函数Likelihood ratio, 似然比line graph, 线图Linear correlation, 直线相关Linear equation, 线性方程Linear programming, 线性规划Linear regression, 直线回归Linear Regression, 线性回归Linear trend, 线性趋势Loading, 载荷Location and scale equivariance, 位置尺度同变性Location equivariance, 位置同变性Location invariance, 位置不变性Location scale family, 位置尺度族Log rank test, 时序检验Logarithmic curve, 对数曲线Logarithmic normal distribution, 对数正态分布Logarithmic scale, 对数尺度Logarithmic transformation, 对数变换Logic check, 逻辑检查Logistic distribution, 逻辑斯特分布Logit transformation, Logit转换LOGLINEAR, 多维列联表通用模型Lognormal distribution, 对数正态分布Lost function, 损失函数Low correlation, 低度相关Lower limit, 下限Lowest-attained variance, 最小可达方差LSD, 最小显著差法的简称Lurking variable, 潜在变量。
Working with DatabasesThis chapter describes how to use SQL statements in embedded applications to control databases. There are three database statements that set up and open databases for access: SET DATABASE declares a database handle, associates the handle with an actual database file, and optionally assigns operational parameters for the database.SET NAMES optionally specifies the character set a client application uses for CHAR, VARCHAR, and text Blob data. The server uses this information totransli terate from a database’s default character set to the client’s character set on SELECT operations, and to transliterate from a client application’s character set to the database character set on INSERT and UPDATE operations.g CONNECT opens a database, allocates system resources for it, and optionally assigns operational parameters for the database.All databases must be closed before a program ends. A database can be closed by using DISCONNECT, or by appending the RELEASE option to the final COMMIT or ROLLBACK in a program. Declaring a databaseBefore a database can be opened and used in a program, it must first be declared with SET DATABASE to:CHAPTER 3 WORKING WITH DATABASES. Establish a database handle. Associate the database handle with a database file stored on a local or remote node.A database handle is a unique, abbreviated alias for an actual database name. Database handles are used in subsequent CONNECT, COMMIT RELEASE, and ROLLBACK RELEASE statements to specify which databases they should affect. Except in dynamic SQL (DSQL) applications, database handles can also be used inside transaction blocks to qualify, or differentiate, table names when two or more open databases contain identically named tables.Each database handle must be unique among all variables used in a program. Database handles cannot duplicate host-language reserved words, and cannot be InterBase reserved words.The following statement illustrates a simple database declaration:EXEC SQLSET DATABASE DB1 = ’employee.gdb’;This database declaration identifies the database file, employee.gdb, as a database the program uses, and assigns the database a handle, or alias, DB1.If a program runs in a directory different from the directory that contains the database file, then the file name specification in SET DATABASE must include a full path name, too. For example, the following SET DATABASE declaration specifies the full path to employee.gdb:EXEC SQLSET DATABASE DB1 = ’/interbase/examples/employee.gdb’;If a program and a database file it uses reside on different hosts, then the file name specification must also include a host name. The following declaration illustrates how a Unix host name is included as part of the database file specification on a TCP/IP network:EXEC SQLSET DATABASE DB1 = ’jupiter:/usr/interbase/examples/employee.gdb’;On a Windows network that uses the Netbeui protocol, specify the path as follows: EXEC SQLSET DATABASE DB1 = ’//venus/C:/Interbase/examples/employee.gdb’; DECLARING A DATABASEEMBEDDED SQL GUIDE 37Declaring multiple databasesAn SQL program, but not a DSQL program, can access multiple databases at the same time. In multi-database programs, database handles are required. A handle is used to:1. Reference individual databases in a multi-database transaction.2. Qualify table names.3. Specify databases to open in CONNECT statements.Indicate databases to close with DISCONNECT, COMMIT RELEASE, and ROLLBACK RELEASE.DSQL programs can access only a single database at a time, so database handle use is restricted to connecting to and disconnecting from a database.In multi-database programs, each database must be declared in a separate SET DATABASE statement. For example, the following code contains two SET DATABASE statements:. . .EXEC SQLSET DATABASE DB2 = ’employee2.gdb’;EXEC SQLSET DATABASE DB1 = ’employee.gdb’;. . .4Using handles for table namesWhen the same table name occurs in more than one simultaneously accessed database, a database handle must be used to differentiate one table name from another. The database handle is used as a prefix to table names, and takes the formhandle.table.For example, in the following code, the database handles, TEST and EMP, are used to distinguish between two tables, each named EMPLOYEE:. . .EXEC SQLDECLARE IDMATCH CURSOR FORSELECT TESTNO INTO :matchid FROM TEST.EMPLOYEEWHERE TESTNO > 100;EXEC SQLDECLARE EIDMATCH CURSOR FORSELECT EMPNO INTO :empid FROM EMP.EMPLOYEEWHERE EMPNO = :matchid;. . .CHAPTER 3 WORKING WITH DATABASES38 INTERBASE 6IMPORTANTThis use of database handles applies only to embedded SQL applications. DSQL applications cannot access multiple databases simultaneously.4Using handles with operationsIn multi-database programs, database handles must be specified in CONNECT statements to identify which databases among several to open and prepare for use in subsequent transactions.Database handles can also be used with DISCONNECT, COMMIT RELEASE, and ROLLBACKRELEASE to specify a subset of open databases to close.To open and prepare a database w ith CONNECT, see “Opening a database” on page 41.To close a database with DISCONNECT, COMMIT RELEASE, or ROLLBACK RELEASE, see“Closing a database” on page 49. To learn more about using database handles in transactions, see “Accessing an open database” on p age 48.Preprocessing and run time databasesNormally, each SET DATABASE statement specifies a single database file to associate with a handle. When a program is preprocessed, gpre uses the specified file to validate the program’s table and column referenc es. Later, when a user runs the program, the same database file is accessed. Different databases can be specified for preprocessing and run time when necessary.4Using the COMPILETIME clause A program can be designed to run against any one of several identically structured databases. In other cases, the actual database that a program will use at runtime is not available when a program is preprocessed and compiled. In such cases, SET DATABASE can include a COMPILETIME clause to specify a database for gpre to test against during preprocessing. For example, the following SET DATABASE statement declares that employee.gdb is to be used by gpre during preprocessing: EXEC SQLSET DATABASE EMP = COMPILETIME ’employee.gdb’;IMPORTANTThe file specification that follows the COMPILETIME keyword must always be a hard-coded, quoted string.DECLARING A DATABASEEMBEDDED SQL GUIDE 39When SET DATABASE uses the COMPILETIME clause, but no RUNTIME clause, and does not specify a different database file specification in a subsequent CONNECT statement, the same database file is used both for preprocessing and run time. To specify different preprocessing and runtime databases with SET DATABASE, use both the COMPILETIME andRUNTIME clauses.4Using the RUNTIME clauseWhen a database file is specified for use during preprocessing, SET DATABASE can specify a different database to use at run time by including the RUNTIME keyword and a runtime file specification:EXEC SQLSET DATABASE EMP = COMPILETIME ’employee.gdb’RUNTIME ’employee2.gdb’;The file specification that follows the RUNTIME keyword can be either ahard-coded, quoted string, or a host-language variable. For example, the following C code fragment prompts the user for a database name, and stores the name in a variable that is used later in SET DATABASE:. . .char db_name[125];. . .printf("Enter the desired database name, including node and path):\n");gets(db_name);EXEC SQLSET DATABASE EMP = COMPILETIME ’employee.gdb’ RUNTIME : db_name; . . .Note host-language variables in SET DATABASE must be preceded, as always, by a colon.Controlling SET DATABASE scopeBy default, SET DATABASE creates a handle that is global to all modules in an application.A global handle is one that may be referenced in all host-language modules comprising the program. SET DATABASE provides two optional keywords to change the scope of a declaration:g STATIC limits declaration scope to the module containing the SET DATABASE statement. No other program modules can see or use a database handle declared STATIC.CHAPTER 3 WORKING WITH DATABASES40 INTERBASE 6EXTERN notifies gpre that a SET DATABASE statement in a module duplicates a globally-declared database in another module. If the EXTERN keyword is used, then another module must contain the actual SET DATABASE statement, or an error occurs during compilation.The STATIC keyword is used in a multi-module program to restrict database handle access to the single module where it is declared. The following example illustrates the use of theSTATIC keyword:EXEC SQLSET DATABASE EMP = STATIC ’employee.gdb’;The EXTERN keyword is used in a multi-module program to signal that SET DATABASE in one module is not an actual declaration, but refers to a declaration made in a different module. Gpre uses this information during preprocessing. The following example illustrates the use of the EXTERN keyword:EXEC SQLSET DATABASE EMP = EXTERN ’employee.gdb’;If an application contains an EXTERN reference, then when it is used at run time, the actual SET DATABASE declaration must be processed first, and the database connected before other modules can access it.A single SET DATABASE statement can contain either the STATIC or EXTERN keyword, but not both. A scope declaration in SET DATABASE applies to both COMPILETIME and RUNTIME databases.Specifying a connection character setWhen a client application connects to a database, it may have its own character set requirements. The server providing database access to the client does not know about these requirements unless the client specifies them. The client application specifies its character set requirement using the SET NAMES statement before it connects to the database.SET NAMES specifies the character set the server should use when translating data from the database to the client application. Similarly, when the client sends data to the database, the server translates the data from the client’s character set to the database’s default character set (or the character set for an individual column if it differs from the databas e’s default character set). For example, the following statements specify that the client is using the DOS437 character set, then connect to the database:EXEC SQLOPENING A DATABASEEMBEDDED SQL GUIDE 41SET NAMES DOS437;EXEC SQLCONNECT ’europe.gdb’ USER ’JAMES’ PASSWORD ’U4EEAH’;For more information about character sets, see the Data Definition Guide. For the complete syntax of SET NAMES and CONNECT, see the Language Reference. Opening a databaseAfter a database is declared, it must be attached with a CONNECT statement before it can be used. CONNECT:1. Allocates system resources for the database.2. Determines if the database file is local, residing on the same host where the application itself is running, or remote, residing on a different host.3. Opens the database and examines it to make sure it is valid.InterBase provides transparent access to all databases, whether local or remote. If the database structure is invalid, the on-disk structure (ODS) number does not correspond to the one required by InterBase, or if the database is corrupt, InterBase reports an error, and permits no further access. Optionally, CONNECT can be used to specify:4. A user name and password combination that is checked against the server’s security database before allowing the connect to succeed. User names can be up to 31 characters.Passwords are restricted to 8 characters.5. An SQL role name that the user adopts on connection to the database, provided that the user has previously been granted membership in the role. Regardless of role memberships granted, the user belongs to no role unless specified with this ROLE clause.The client can specify at most one role per connection, and cannot switch roles except by reconnecting.6. The size of the database buffer cache to allocate to the application when the default cache size is inappropriate.Using simple CONNECT statementsIn its simplest form, CONNECT requires one or more database parameters, each specifying the name of a database to open. The name of the database can be a: Database handle declared in a previous SET DATABASE statement.CHAPTER 3 WORKING WITH DATABASES42 INTERBASE 61. Host-language variable.2. Hard-coded file name.4Using a database handleIf a program uses SET DATABASE to provide database handles, those handles should be used in subsequent CONNECT statements instead of hard-coded names. For example,. . .EXEC SQLSET DATABASE DB1 = ’employee.gdb’;EXEC SQLSET DATABASE DB2 = ’employee2.gdb’;EXEC SQLCONNECT DB1;EXEC SQLCONNECT DB2;. . .There are several advantages to using a database handle with CONNECT:1. Long file specifications can be replaced by shorter, mnemonic handles.2. Handles can be used to qualify table names in multi-database transactions. DSQL applications do not support multi-database transactions.3. Handles can be reassigned to other databases as needed.4. The number of database cache buffers can be specified as an additional CONNECT parameter.For more information about setting the number of database cache buffers, see “Setting d atabase cache buffers” on page 47. 4Using strings or host-language variables Instead of using a database handle, CONNECT can use a database name supplied at run time. The database name can be supplied as either a host-language variable or a hard-coded, quoted string.The following C code demonstrates how a program accessing only a single database might implement CONNECT using a file name solicited from a user at run time:. . .char fname[125];. . .printf(’Enter the desired database name, including nodeand path):\n’);OPENING A DATABASEEMBEDDED SQL GUIDE 43gets(fname);. . .EXEC SQLCONNECT :fname;. . .TipThis technique is especially useful for programs that are designed to work with many identically structured databases, one at a time, such as CAD/CAM or architectural databases.MULTIPLE DATABASE IMPLEMENTATIONTo use a database specified by the user as a host-language variable in a CONNECT statement in multi-database programs, follow these steps:1. Declare a database handle using the following SET DATABASE syntax:EXEC SQLSET DATABASE handle = COMPILETIME ’ dbname’;Here, handle is a hard-coded database handle supplied by the programmer, dbnameis a quoted, hard-coded database name used by gpre during preprocessing.2. Prompt the user for a database to open.3. Store the database name entered by the user in a host-language variable.4. Use the handle to open the database, associating the host-language variable with the handle using the following CONNECT syntax:EXEC SQLCONNECT : variable AS handle;The following C code illustrates these steps:. . .char fname[125];. . .EXEC SQLSET DATABASE DB1 = ’employee.gdb’;printf("Enter the desired database name, including nodeand path):\n");gets(fname);EXEC SQLCONNECT :fname AS DB1;. . .CHAPTER 3 WORKING WITH DATABASES44 INTERBASE 6In this example, SET DATABASE provides a hard-coded database file name for preprocessing with gpre. When a user runs the program, the database specified in the variable, fname, is used instead. 4Using a hard-coded database namesIN SINGE-DATABASE PROGRAMSIn a single-database program that omits SET DATABASE, CONNECT must contain a hard-coded, quoted file name in the following format:EXEC SQLCONNECT ’[ host[ path]] filename’; host is required only if a program and a dat abase file it uses reside on different nodes.Similarly, path is required only if the database file does not reside in the current working directory. For example, the following CONNECT statement contains ahard-coded file name that includes both a Unix host name and a path name:EXEC SQLCONNECT ’valdez:usr/interbase/examples/employee.gdb’;Note Host syntax is specific to each server platform.IMPORTANT A program that accesses multiple databases cannot use this form of CONNECT.IN MULTI-DATABASE PROGRAMSA program that accesses multiple databases must declare handles for each of them in separate SET DATABASE statements. These handles must be used in subsequent CONNECT statements to identify specific databases to open:. . .EXEC SQLSET DATABASE DB1 = ’employee.gdb’;EXEC SQLSET DATABASE DB2 = ’employee2.gdb’;EXEC SQLCONNECT DB1;EXEC SQLCONNECT DB2;. . .Later, when the program closes these databases, the database handles are no longer in use. These handles can be reassigned to other databases by hard-coding a file name in a subsequent CONNECT statement. For example,OPENING A DATABASEEMBEDDED SQL GUIDE 45. . .EXEC SQLDISCONNECT DB1, DB2;EXEC SQLCONNECT ’project.gdb’ AS DB1;. . .Additional CONNECT syntaxCONNECT supports several formats for opening databases to provide programming flexibility. The following table outlines each possible syntax, provides descriptions and examples, and indicates whether CONNECT can be used in programs that access single or multiple databases:For a complete discussion of CONNECT syntax and its uses, see the Language Reference.Syntax Description ExampleSingle accessMultiple accessCONNECT ‘dbfile’; Opens a single, hard-coded database file, dbfile.EXEC SQLCONNECT ‘employee.gdb’;Yes NoCONNECT handle; Opens the database file associated with a previously declared database handle. This is the preferred CONNECT syntax.EXEC SQLCONNECT EMP;Yes YesCONNECT ‘dbfile’ AS handle;Opens a hard-coded database file, dbfile, and assigns a previously declared database handle to it.EXEC SQLCONNECT ‘employee.gdb’AS EMP;Yes Yes CONNECT :varname AS handle;Opens the database file stored in the host-language variable, varname, and assigns a previously declared database handle to it.EXEC SQL CONNECT :fname AS EMP;Yes YesTABLE 3.1 CONNECT syntax summaryCHAPTER 3 WORKING WITH DATABASES46 INTERBASE 6Attaching to multiple databasesCONNECT can attach to multiple databases. To open all databases specified in previous SETDATABASE statements, use either of the following CONNECT syntax options: EXEC SQLCONNECT ALL;EXEC SQLCONNECT DEFAULT;CONNECT can also attach to a specified list of databases. Separate each database request from others with commas. For example, the following statement opens two databases specified by their handles:EXEC SQLCONNECT DB1, DB2;The next statement opens two hard-coded database files and also assigns them to previously declared handles:EXEC SQLCONNECT ’employee.gdb’ AS DB1, ’employee2.gdb’ AS DB2;Tip Opening multiple databases with a single CONNECT is most effective when a program’s database access is simple and clear. In complex programs that open and close several databases, that substitute database names with host-language variables, or that assign multiple handles to the same database, use separate CONNECT statements to make program code easier to read, debug, and modify.Handling CONNECT errors. The WHENEVER statement should be used to trap and handle runtime errors that occur during database declaration. The following C code fragment illustrates an error-handling routine that displays error messages and ends the program in an orderly fashion:. . .EXEC SQLWHENEVER SQLERRORGOTO error_exit;. . .OPENING A DATABASEEMBEDDED SQL GUIDE 47:error_exitisc_print_sqlerr(sqlcode, status_vector);EXEC SQLDISCONNECT ALL;exit(1);. . .For a complete discussion of SQL error handling, see Chapter 12, “Error Handling and Recovery.”数据库的工作这章描述怎样使用在嵌入式应用过程中的SQL语句控制数据库。
abbreviation 缩写 [省略语]ablative 夺格(的)abrupt 突发音accent 口音/{Phonetics}重音accusative 受格(的)acoustic phonetics 声学语音学acquisition 习得action verb 动作动词active 主动语态active chart parser 活动图句法剖析程序active knowledge 主动知识active verb 主动动词actor-action-goal 施事(者)-动作-目标actualization 实现(化)acute 锐音address 地址{信息科学}/称呼(语){语言学} adequacy 妥善性adjacency pair 邻对adjective 形容词adjunct 附加语 [附加修饰语]adjunction 加接adverb 副词adverbial idiom 副词词组affective 影响的affirmative 肯定(的;式)affix 词缀affixation 加缀affricate 塞擦音agent 施事agentive-action verb 施事动作动词agglutinative 胶着(性)agreement 对谐AI (artificial intelligence) 人工智能 [人工智能] AI language 人工智能语言 [人工智能语言]Algebraic Linguistics 代数语言学algorithm 算法 [算法]alienable 可分割的alignment 对照 [多国语言文章词;词组;句子翻译的] allo- 同位-allomorph 同位语素allophone 同位音位alpha notation alpha 标记alphabetic writing 拼音文字alternation 交替alveolar 齿龈音ambiguity 歧义ambiguity resolution 歧义消解ambiguous 歧义American structuralism 美国结构主义analogy 类推analyzable 可分析的anaphor 照应语 [前方照应词]animate 有生的A-not-A question 正反问句antecedent 先行词anterior 舌前音anticipation 预期 (音变)antonym 反义词antonymy 反义A-over-A A-上-A 原则apposition 同位语appositive construction 同位结构appropriate 恰当的approximant 无擦通音approximate match 近似匹配arbitrariness 任意性archiphoneme 大音位argument 论元 [变元]argument structure 论元结构 [变元结构] arrangement 配列array 数组articulatory configuration 发音结构articulatory phonetics 发音语音学artificial intelligence (AI) 人工智能 [人工智能] artificial language 人工语言ASCII 美国标准信息交换码aspect 态 [体]aspirant 气音aspiration 送气assign 指派assimilation 同化association 关联associative phrase 联想词组asterisk 标星号ATN (augmented transition network) 扩充转移网络attested 经证实的attribute 属性attributive 属性auditory phonetics 听觉语音学augmented transition network 扩充转移网络automatic document classification 自动文件分类automatic indexing 自动索引automatic segmentation 自动切分automatic training 自动训练automatic word segmentation 自动分词automaton 自动机autonomous 自主的auxiliary 助动词axiom 公理baby-talk 儿语back-formation 逆生构词(法)backtrack 回溯Backus-Naur Form 巴科斯诺尔形式 [巴科斯诺尔范式] backward deletion 逆向删略ba-construction 把─字句balanced corpus 平衡语料库base 词基Bayesian learning 贝式学习Bayesian statistics 贝式统计behaviorism 行为主义belief system 信念系统benefactive 受益(格;的)best first parser 最佳优先句法剖析器bidirectional linked list 双向串行bigram 双连词bilabial 双唇音bilateral 双边的bilingual concordancer 双语关键词前后文排序程序binary feature 双向特征[二分征性]binding 约束bit 位 [二进制制;比特]biuniqueness 双向唯一性blade 舌叶blend 省并词block 封阻[封杀]Bloomfieldian 布隆菲尔德(学派)的body language 肢体语言Boolean lattice 布尔网格 [布尔网格]borrow 借移Bottom-up 由下而上bottom-up parsing 由下而上剖析bound 附着(的)bound morpheme 附着语素 [黏着语素]boundary marker 界线标记boundary symbol 界线符号bracketing 方括号法branching 分枝法breadth-first search 广度优先搜寻 [宽度优先搜索]breath group 换气单位breathy 气息音的buffer 缓冲区byte 字节CAI (Computer Assisted Instruction) 计算机辅助教学CALL (computer assisted language learning) 计算机辅助语言学习canonical 典范的capacity 能力cardinal 基数的cardinal vowels 基本元音case 格位case frame 格位框架Case Grammar 格位语法case marking 格位标志CAT (computer assisted translation) 计算机辅助翻译cataphora 下指Categorial Grammar 范畴语法Categorial Unification Grammar 范畴连并语法 [范畴合一语法] causative 使动causative verb 使役动词causativity 使役性centralization 央元音化chain 炼chart parsing 表式剖析 [图表句法分析]checked 受阻的checking 验证Chinese character code 中文编码 [汉字代码]Chinese character code for information interchange 中文信息交换码[汉字交换码]Chinese character coding input method 中文输入法 [汉字编码输入] choice 选择Chomsky hierarchy 杭士基阶层 [Chomsky 层次结构]citation form 基本形式CKY algorithm (Cocke-Kasami-Younger) CKY 算法classifier 类别词cleft sentence 分裂句click 啧音clitic 附着词closed world assumption 封闭世界假说cluster 音群Cocke-Kasami-Younger algorithm CKY 算法coda 音节尾code conversion 代码变换cognate 同源(的;词)Cognitive Linguistics 认知语言学coherence 一致性cohesion 凝结性 [黏着性;结合力]collapse 合并collective 集合的collocation 连用语 [同现;搭配]combinatorial construction 合并结构combinatorial insertion 合并中插combinatorial word 合并词Combinatory Categorial Grammar 组合范畴语法comment 评论commissive 许诺[语行]common sense semantics 常识语意学Communication Theory 通讯理论 [通讯论;信息论]Comparative Linguistics 比较语言学comparison 比较competence 语言知能compiler 编译器complement 补语complementary 互补complementary distribution 互补分布complementizer 补语标记complex predicate 复杂谓语complex stative construction 复杂状态结构complex symbol 复杂符号complexity 复杂度component 成分compositionality 语意合成性 [合成性]compound word 复合词Computational Lexical Semantics 计算词汇语意学Computational Lexicography 计算词典编纂学Computational Linguistics 计算语言学Computational Phonetics 计算语音学Computational Phonology 计算声韵学Computational Pragmatics 计算语用学Computational Semantics 计算语意学Computational Syntax 计算句法学computer language 计算器语言computer-aided translation 计算机辅助翻译 [计算器辅助翻译]computer-assisted instruction (CAI) 计算机辅助教学computer-assisted language learning 计算机辅助语言学习[计算器辅助语言学习] concatenation 串联concept classification 概念分类concept dependency 概念依存conceptual hierarchy 概念阶层concord 谐和concordance 关键词 (前后文) 排序concordancer 关键词 (前后文) 排序的程序concurrent parsing 并行句法剖析conditional decision 条件决定 [条件决策]conjoin 连接conjunction 连接词 (合取;逻辑积;"与";连词)conjunctive 连接的connected speech 连续语言Connectionist model 类神经网络模型Connectionist model for natural language 自然语言类神经网络模型[自然语言连接模型]connotation 隐涵意义consonant 子音 [辅音]constituent 成分constituent structure tree 词组结构树constraint 限制constraint propagation 限制条件的传递 [限定因素增殖]constraint-based grammar formalism 限制为本的语法形式Construct Grammar 句构语法content word 实词context 语境context-free language 语境自由语言 [上下文无关语言]context-sensitive language 语境限定语言 [上下文有关语言;上下文敏感语言] continuant 连续音continuous speech recognition 连续语音识别contraction 缩约control agreement principle 控制一致原理control structure 控制结构control theory 控制论convention 约定俗成[规约]convergence 收敛[趋同现象]conversational implicature 会话含义converse 相反(词;的)cooccurrence relation 共现关系 [同现关系]co-operative principle 合作原则coordination 对称连接词 [同等;并列连接]copula 系词co-reference 同指涉 [互指]co-referential 同指涉coronal 前舌音corpora 语料库corpus 语料库Corpus Linguistics 语料库语言学corpus-based learning 语料库为本的学习correlation 相关性counter-intuitive 违反语感的courseware 课程软件 [课件]coverb 动介词C-structure 成分结构data compression 数据压缩 [数据压缩]data driven analysis 资料驱动型分析 [数据驱动型分析]data structure 数据结构 [数据结构]database 数据库 [数据库]database knowledge representation 数据库知识表示 [数据库知识表示]data-driven 资料驱动 [数据驱动]dative 与格declarative knowledge 陈述性知识decomposition 分解deductive database 演译数据库 [演译数据库]default 默认值 [默认;缺省]definite 定指Definite Clause Grammar 确定子句语法definite state automaton 有限状态自动机Definite State Grammar 有限状态语法definiteness 定指degree adverb 程度副词degree of freedom 自由度deixis 指示delimiter 定界符号 [定界符]denotation 外延denotic logic 符号逻辑dependency 依存关系Dependency Grammar 依存关系语法dependency relation 依存关系depth-first search 深度优先搜寻derivation 派生derivational bound morpheme 派生性附着语素Descriptive Grammar 描述型语法 [描写语法]Descriptive Linguistics 描述语言学 [描写语言学] desiderative 意愿的determiner 限定词deterministic algorithm 决定型算法 [确定性算法] deterministic finite state automaton 决定型有限状态机deterministic parser 决定型语法剖析器 [确定性句法剖析程序] developmental psychology 发展心理学Diachronic Linguistics 历时语言学diacritic 附加符号dialectology 方言学dictionary database 辞典数据库 [词点数据库]dictionary entry 辞典条目digital processing 数字处理 [数值处理]diglossia 双言digraph 二合字母diminutive 指小词diphone 双连音directed acyclic graph 有向非循环图disambiguation 消除歧义 [歧义消除]discourse 篇章discourse analysis 篇章分析 [言谈分析]discourse planning 篇章规划Discourse Representation Theory 篇章表征理论 [言谈表示理论] discourse strategy 言谈策略discourse structure 言谈结构discrete 离散的disjunction 选言dissimilation 异化distributed 分布式的distributed cooperative reasoning 分布协调型推理distributed text parsing 分布式文本剖析disyllabic 双音节的ditransitive verb 双宾动词 [双宾语动词;双及物动词] divergence 扩散[分化]D-M (Determiner-Measure) construction 定量结构D-N (determiner-noun) construction 定名结构document retrieval system 文件检索系统 [文献检索系统] domain dependency 领域依存性 [领域依存关系]double insertion 交互中插double-base 双基downgrading 降级dummy 虚位duration 音长{语音学}/时段{语法学/语意学}dynamic programming 动态规划Earley algorithm Earley 算法echo 回声句egressive 呼气音ejective 紧喉音electronic dictionary 电子词典elementary string 基本字符串 [基本单词串]ellipsis 省略EM algorithm EM算法embedding 崁入emic 功能关系的empiricism 经验论Empty Category Principle 虚范畴原则 [空范畴原理]empty word 虚词enclitics 后接成份end user 终端用户 [最终用户]endocentric 同心的endophora 语境照应entailment 蕴涵entity 实体entropy 熵entry 条目episodic memory 情节性记忆epistemological network 认识论网络ergative verb 作格动词ergativity 作格性Esperando 世界语etic 无功能关系etymology 词源学event 事件event driven control 事件驱动型控制example-based machine translation 以例句为本的机器翻译exclamation 感叹exclusive disjunction 排它性逻辑 “或”experiencer case 经验者格expert system 专家系统extension 外延external argument 域外论元extraposition 移外变形 [外置转换]facility value 易度值feature 特征feature bundle 特征束feature co-occurrence restriction 特征同现限制 [特性同现限制] feature instantiation 特征体现feature structure 特征结构 [特性结构]feature unification 特征连并 [特性合一]feedback 回馈felicity condition 妥适条件file structure 档案结构finite automaton 有限状态机 [有限自动机]finite state 有限状态Finite State Morphology 有限状态构词法 [有限状态词法]finite-state automata 有限状态自动机finite-state language 有限状态语言finite-state machine 有限状态机finite-state transducer 有限状态置换器flap 闪音flat 降音foreground information 前景讯息 [前景信息]Formal Language Theory 形式语言理论Formal Linguistics 形式语言学Formal Semantics 形式语意学forward inference 前向推理 [向前推理]forward-backward algorithm 前前后后算法frame 框架frame based knowledge representation 框架型知识表示Frame Theory 框架理论free morpheme 自由语素Fregean principle Fregean 原则fricative 擦音F-structure 功能结构full text searching 全文检索function word 功能词Functional Grammar 功能语法functional programming 函数型程序设计 [函数型程序设计]functional sentence perspective 功能句子观functional structure 功能结构functional unification 功能连并 [功能合一]functor 功能符fundamental frequency 基频garden path sentence 花园路径句GB (Government and Binding) 管辖约束geminate 重叠音gender 性Generalized Phrase Structure Grammar 概化词组结构语法 [广义短语结构语法] Generative Grammar 衍生语法Generative Linguistics 衍生语言学 [生成语言学]generic 泛指genetic epistemology 发生认识论genetive marker 属格标记genitive 属格gerund 动名词Government and Binding Theory 管辖约束理论GPSG (Generalized Phrase Structure Grammar) 概化词组结构语法[广义短语结构语法]gradability 可分级性grammar checker 文法检查器grammatical affix 语法词缀grammatical category 语法范畴grammatical function 语法功能grammatical inference 文法推论grammatical relation 语法关系grapheme 字素haplology 类音删略head 中心语head driven phrase structure 中心语驱动词组结构 [中心词驱动词组结构] head feature convention 中心语特征继承原理 [中心词特性继承原理] Head-Driven Phrase Structure Grammar 中心语驱动词组结构律heteronym 同形heuristic parsing 经验式句法剖析Heuristics 经验知识hidden Markov model 隐式马可夫模型hierarchical structure 阶层结构 [层次结构]holophrase 单词句homograph 同形异义词homonym 同音异义词homophone 同音词homophony 同音异义homorganic 同部位音的Horn clause Horn 子句HPSG (Head-Driven Phrase Structure Grammar) 中心语驱动词组结构语法human-machine interface 人机界面hypernym 上位词hypertext 超文件 [超文本]hyponym 下位词hypotactic 主从结构的IC (immediate constituent) 直接成份ICG (Information-based Case Grammar) 讯息为本的格位语法idiom 成语 [熟语]idiosyncrasy 特异性illocutionary 施为性immediate constituent 直接成份imperative 祈使句implicative predicate 蕴含谓词implicature 含意indexical 标引的indirect object 间接宾语indirect speech act 间接言谈行动 [间接言语行为]Indo-European language 印欧语言inductional inference 归纳推理inference machine 推理机器infinitive 不定词 [to 不定式]infix 中缀inflection/inflexion 屈折变化inflectional affix 屈折词缀information extraction 信息撷取information processing 信息处理 [信息处理]information retrieval 信息检索Information Science 信息科学 [信息科学; 情报科学] Information Theory 信息论 [信息论]inherent feature 固有特征inherit 继承inheritance 继承inheritance hierarchy 继承阶层 [继承层次]inheritance of attribute 属性继承innateness position 语法天生假说insertion 中插inside-outside algorithm 里里外外算法instantiation 体现instrumental (case) 工具格integrated parser 集成句法剖析程序integrated theory of discourse analysis 篇章分析综合理论[言谈分析综合理论]intelligence intensive production 知识密集型生产intensifier 加强成分intensional logic 内含逻辑Intensional Semantics 内涵语意学intensional type 内含类型interjection/exclamation 感叹词inter-level 中间成分interlingua 中介语言interlingual 中介语(的)interlocutor 对话者internalise 内化International Phonetic Association (IPA) 国际语音学会internet 网际网络Interpretive Semantics 诠释性语意学intonation 语调intonation unit (IU) 语调单位IPA (International Phonetic Association) 国际语音学会IR (information retrieval) 信息检索IS-A relation IS-A 关系isomorphism 同形现象IU (intonation unit) 语调单位junction 连接keyword in context 上下文中关键词[上下文内关键词] kinesics 体势学knowledge acquisition 知识习得knowledge base 知识库knowledge based machine translation 知识为本之机器翻译knowledge extraction 知识撷取 [知识题取]knowledge representation 知识表示KWIC (keyword in context) 关键词前后文 [上下文内关键词] label 卷标labial 唇音labio-dental 唇齿音labio-velar 软颚唇音LAD (language acquisition device) 语言习得装置lag 发声延迟language acquisition 语言习得language acquisition device 语言习得装置language engineering 语言工程language generation 语言生成language intuition 语感language model 语言模型language technology 语言科技left-corner parsing 左角落剖析 [左角句法剖析]lemma 词元lenis 弱辅音letter-to-phone 字转音lexeme 词汇单位lexical ambiguity 词汇歧义lexical category 词类lexical conceptual structure 词汇概念结构lexical entry 词项lexical entry selection standard 选词标准lexical integrity 词语完整性Lexical Semantics 词汇语意学Lexical-Functional Grammar 词汇功能语法Lexicography 词典学Lexicology 词汇学lexicon 词汇库 [词典;词库]lexis 词汇层LF (logical form) 逻辑形式LFG (Lexical-Functional Grammar) 词汇功能语法liaison 连音linear bounded automaton 线性有限自主机linear precedence 线性次序lingua franca 共通语linguistic decoding 语言译码linguistic unit 语言单位linked list 串行loan 外来语local 局部的localism 方位主义localizer 方位词locus model 轨迹模型locution 惯用语logic 逻辑logic array network 逻辑数组网络logic programming 逻辑程序设计 [逻辑程序设计] logical form 逻辑形式logical operator 逻辑算子 [逻辑算符]Logic-Based Grammar 逻辑为本语法 [基于逻辑的语法] long term memory 长期记忆longest match principle 最长匹配原则 [最长一致法] LR (left-right) parsing LR 剖析machine dictionary 机器词典machine language 机器语言machine learning 机器学习machine translation 机器翻译machine-readable dictionary (MRD) 机读辞典Macrolinguistics 宏观语言学Markov chart 马可夫图Mathematical Linguistics 数理语言学maximum entropy 最大熵M-D (modifier-head) construction 偏正结构mean length of utterance (MLU) 语句平均长度measure of information 讯习测度 [信息测度] memory based 根据记忆的mental lexicon 心理词汇库mental model 心理模型mental process 心理过程 [智力过程;智力处理] metalanguage 超语言metaphor 隐喻metaphorical extension 隐喻扩展metarule 律上律 [元规则]metathesis 语音易位Microlinguistics 微观语言学middle structure 中间式结构minimal pair 最小对Minimalist Program 微言主义MLU (mean length of utterance) 语句平均长度modal 情态词modal auxiliary 情态助动词modal logic 情态逻辑modifier 修饰语Modular Logic Grammar 模块化逻辑语法modular parsing system 模块化句法剖析系统modularity 模块性(理论)module 模块monophthong 单元音monotonic 单调monotonicity 单调性Montague Grammar 蒙泰究语法 [蒙塔格语法]mood 语气morpheme 词素morphological affix 构词词缀morphological decomposition 语素分解morphological pattern 词型morphological processing 词素处理morphological rule 构词律 [词法规则] morphological segmentation 语素切分Morphology 构词学Morphophonemics 词音学 [形态音位学;语素音位学] morphophonological rule 形态音位规则Morphosyntax 词句法Motor Theory 肌动理论movement 移位MRD (machine-readable dictionary) 机读辞典MT (machine translation) 机器翻译multilingual processing system 多语讯息处理系统multilingual translation 多语翻译multimedia 多媒体multi-media communication 多媒体通讯multiple inheritance 多重继承multistate logic 多态逻辑mutation 语音转换mutual exclusion 互斥mutual information 相互讯息nativist position 语法天生假说natural language 自然语言natural language processing (NLP) 自然语言处理natural language understanding 自然语言理解negation 否定negative sentence 否定句neologism 新词语nested structure 套结构network 网络neural network 类神经网络Neurolinguistics 神经语言学neutralization 中立化n-gram n-连词n-gram modeling n-连词模型NLP (natural language processing) 自然语言处理node 节点nominalization 名物化nonce 暂用的non-finite 非限定non-finite clause 非限定式子句non-monotonic reasoning 非单调推理normal distribution 常态分布noun 名词noun phrase 名词组NP (noun phrase) completeness 名词组完全性object 宾语{语言学}/对象{信息科学}object oriented programming 对象导向程序设计 [面向对向的程序设计] official language 官方语言one-place predicate 一元述语on-line dictionary 线上查询词典 [联机词点]onomatopoeia 拟声词onset 节首音ontogeny 个体发生Ontology 本体论open set 开放集operand 操作数 [操作对象]optimization 最佳化 [最优化]overgeneralization 过度概化overgeneration 过度衍生paradigmatic relation 聚合关系paralanguage 附语言parallel construction 并列结构Parallel Corpus 平行语料库parallel distributed processing (PDP) 平行分布处理paraphrase 转述 [释意;意译;同意互训]parole 言语parser 剖析器 [句法剖析程序]parsing 剖析part of speech (POS) 词类particle 语助词PART-OF relation PART-OF 关系part-of-speech tagging 词类标注pattern recognition 型样识别P-C (predicate-complement) insertion 述补中插PDP (parallel distributed processing) 平行分布处理perception 知觉perceptron 感觉器 [感知器]perceptual strategy 感知策略performative 行为句periphrasis 用独立词表达perlocutionary 语效性的permutation 移位Petri Net Grammar Petri 网语法philology 语文学phone 语音phoneme 音素phonemic analysis 因素分析phonemic stratum 音素层Phonetics 语音学phonogram 音标Phonology 声韵学 [音位学;广义语音学]Phonotactics 音位排列理论phrasal verb 词组动词 [短语动词]phrase 词组 [短语]phrase marker 词组标记 [短语标记]pitch 音调pitch contour 调形变化Pivot Grammar 枢轴语法pivotal construction 承轴结构plausibility function 可能性函数PM (phrase marker) 词组标记 [短语标记]polysemy 多义性POS-tagging 词类标记postposition 方位词PP (preposition phrase) attachment 介词依附Pragmatics 语用学Precedence Grammar 优先级语法precision 精确度predicate 述词predicate calculus 述词计算predicate logic 述词逻辑 [谓词逻辑]predicate-argument structure 述词论元结构prefix 前缀premodification 前置修饰preposition 介词Prescriptive Linguistics 规定语言学 [规范语言学]presentative sentence 引介句presupposition 前提Principle of Compositionality 语意合成性原理privative 二元对立的probabilistic parser 概率句法剖析程序problem solving 解决问题program 程序programming language 程序设计语言 [程序设计语言]proofreading system 校对系统proper name 专有名词prosody 节律prototype 原型pseudo-cleft sentence 准分裂句Psycholinguistics 心理语言学punctuation 标点符号pushdown automata 下推自动机pushdown transducer 下推转换器qualification 后置修饰quantification 量化quantifier 范域词Quantitative Linguistics 计量语言学question answering system 问答系统queue 队列radical 字根 [词干;词根;部首;偏旁]radix of tuple 元组数基random access 随机存取rationalism 理性论rationalist (position) 理性论立场 [唯理论观点]reading laboratory 阅读实验室real time 实时real time control 实时控制 [实时控制]recursive transition network 递归转移网络reduplication 重叠词 [重复]reference 指涉referent 指称对象referential indices 指针referring expression 指涉词 [指示短语]register 缓存器 [寄存器]{信息科学}/调高{语音学}/语言的场合层级{社会语言学} regular language 正规语言 [正则语言]relational database 关系型数据库 [关系数据库]relative clause 关系子句relaxation method 松弛法relevance 相关性Restricted Logic Grammar 受限逻辑语法resumptive pronouns 复指代词retroactive inhibition 逆抑制rewriting rule 重写规则rheme 述位rhetorical structure 修辞结构rhetorics 修辞学robust 强健性robust processing 强健性处理robustness 强健性schema 基朴school grammar 教学语法scope 范域 [作用域;范围]script 脚本search mechanism 检索机制search space 检索空间searching route 检索路径 [搜索路径]second order predicate 二阶述词segmentation 分词segmentation marker 分段标志selectional restriction 选择限制semantic field 语意场semantic frame 语意架构semantic network 语意网络semantic representation 语意表征 [语义表示]semantic representation language 语意表征语言semantic restriction 语意限制semantic structure 语意结构Semantics 语意学sememe 意素Semiotics 符号学sender 发送者sensorimotor stage 感觉运动期sensory information 感官讯息 [感觉信息]sentence 句子sentence generator 句子产生器 [句子生成程序]sentence pattern 句型separation of homonyms 同音词区分sequence 序列serial order learning 顺序学习serial verb construction 连动结构set oriented semantic network 集合导向型语意网络 [面向集合型语意网络] SGML (Standard Generalized Markup Language) 结构化通用标记语言shift-reduce parsing 替换简化式剖析short term memory 短程记忆sign 信号signal processing technology 信号处理技术simple word 单纯词situation 情境Situation Semantics 情境语意学situational type 情境类型social context 社会环境sociolinguistics 社会语言学software engineering 软件工程 [软件工程]sort 排序speaker-independent speech recognition 非特定语者语音识别spectrum 频谱speech 口语speech act assignment 言语行为指定speech continuum 言语连续体speech disorder 语言失序 [言语缺失]speech recognition 语音辨识speech retrieval 语音检索speech situation 言谈情境 [言语情境]speech synthesis 语音合成speech translation system 语音翻译系统speech understanding system 语音理解系统spreading activation model 扩散激发模型standard deviation 标准差Standard Generalized Markup Language 标准通用标示语言start-bound complement 接头词state of affairs algebra 事态代数state transition diagram 状态转移图statement kernel 句核static attribute list 静态属性表statistical analysis 统计分析Statistical Linguistics 统计语言学statistical significance 统计意义stem 词干stimulus-response theory 刺激反应理论stochastic approach to parsing 概率式句法剖析 [句法剖析的随机方法] stop 爆破音Stratificational Grammar 阶层语法 [层级语法]string 字符串[串;字符串]string manipulation language 字符串操作语言string matching 字符串匹配 [字符串]structural ambiguity 结构歧义Structural Linguistics 结构语言学structural relation 结构关系structural transfer 结构转换structuralism 结构主义structure 结构structure sharing representation 结构共享表征subcategorization 次类划分 [下位范畴化]subjunctive 假设的sublanguage 子语言subordinate 从属关系subordinate clause 从属子句 [从句;子句]subordination 从属substitution rule 代换规则 [置换规则]substrate 底层语言suffix 后缀superordinate 上位的superstratum 上层语言suppletion 异型[不规则词型变化] suprasegmental 超音段的syllabification 音节划分syllable 音节syllable structure constraint 音节结构限制symbolization and verbalization 符号化与字句化synchronic 同步的synonym 同义词syntactic category 句法类别syntactic constituent 句法成分syntactic rule 语法规律 [句法规则]Syntactic Semantics 句法语意学syntagm 句段syntagmatic 组合关系 [结构段的;组合的]Syntax 句法Systemic Grammar 系统语法tag 标记target language 目标语言 [目标语言]task sharing 课题分享 [任务共享]tautology 套套逻辑 [恒真式;重言式;同义反复] taxonomical hierarchy 分类阶层 [分类层次] telescopic compound 套装合并template 模板temporal inference 循序推理 [时序推理] temporal logic 时间逻辑 [时序逻辑]temporal marker 时貌标记tense 时态terminology 术语text 文本text analyzing 文本分析text coherence 文本一致性text generation 文本生成 [篇章生成]Text Linguistics 文本语言学text planning 文本规划text proofreading 文本校对text retrieval 文本检索text structure 文本结构 [篇章结构]text summarization 文本自动摘要 [篇章摘要]text understanding 文本理解text-to-speech 文本转语音thematic role 题旨角色thematic structure 题旨结构theorem 定理thesaurus 同义词辞典theta role 题旨角色theta-grid 题旨网格token 实类 [标记项]tone 音调tone language 音调语言tone sandhi 连调变换top-down 由上而下 [自顶向下]topic 主题topicalization 主题化 [话题化]trace 痕迹Trace Theory 痕迹理论training 训练transaction 异动 [处理单位]transcription 转写 [抄写;速记翻译]transducer 转换器transfer 转移transfer approach 转换方法transfer framework 转换框架transformation 变形 [转换]Transformational Grammar 变形语法 [转换语法]transitional state term set 转移状态项集合transitivity 及物性translation 翻译translation equivalence 翻译等值性translation memory 翻译记忆transparency 透明性tree 树状结构 [树]Tree Adjoining Grammar 树形加接语法 [树连接语法]treebank 树图数据库[语法关系树库]trigram 三连词t-score t-数turing machine 杜林机 [图灵机]turing test 杜林测试 [图灵试验]type 类型type/token node 标记类型/实类节点type-feature structure 类型特征结构typology 类型学ultimate constituent 终端成分unbounded dependency 无界限依存underlying form 基底型式underlying structure 基底结构unification 连并 [合一]Unification-based Grammar 连并为本的语法 [基于合一的语法] Universal Grammar 普遍性语法universal instantiation 普遍例式universal quantifier 全称范域词unknown word 未知词 [未定义词]unrestricted grammar 非限制型语法usage flag 使用旗标user interface 使用者界面 [用户界面]Valence Grammar 结合价语法Valence Theory 结合价理论valency 结合价variance 变异数 [方差]verb 动词verb phrase 动词组 [动词短语]verb resultative compound 动补复合词verbal association 词语联想verbal phrase 动词组verbal production 言语生成vernacular 本地话V-O construction (verb-object) 动宾结构vocabulary 字汇vocabulary entry 词条vocal track 声道vocative 呼格voice recognition 声音辨识 [语音识别]vowel 元音vowel harmony 元音和谐 [元音和谐]waveform 波形weak verb 弱化动词Whorfian hypothesis Whorfian 假说word 词word frequency 词频word frequency distribution 词频分布word order 词序word segmentation 分词word segmentation standard for Chinese 中文分词规范word segmentation unit 分词单位 [切词单位]word set 词集working memory 工作记忆 [工作存储区]world knowledge 世界知识writing system 书写系统X-Bar Theory X标杠理论 ["x"阶理论]Zipf's Law 利夫规律 [齐普夫定律]阅读。
英文译文数据库安全Paul MorrisonAmericaPART 1“为什么要确保数据库服务安全呢?任何人都不能访问-这是一个非军事区的保护防火墙”,当我们被建议使用一个带有安全检查机制的装置时,这是通常的反应。
事实上,在防护一个组织的信息方面,数据库的安全是至高无上的,因为它可能会间接接触比我们意识到的更广泛的用户。
这是两篇研究数据库安全文章中的第一篇。
在这篇文章中我们将讨论一般数据库安全概念和和比较普遍的问题。
在下篇文章,我们将把焦点放在特定的Microsoft SQL和Oracle的安全关注上。
近来数据库安全已成为一个热门话题。
随着越来越多的人关注计算机安全,我们发现,防火墙和网络服务器比以前都更加安全化了(虽然这并不等于说现在不再有许多不安全的网络存在)。
因此,重点是加大对技术的考虑力度,譬如以更细腻的审查态度对待数据库。
◆一般安全意识在我们讨论有关数据库安全问题之前,确保底层操作系统和支撑技术的安全是审慎而且必要的。
如果一个vanilla操作系统无法为数据库提供一个稳妥可靠的安全基础,花费太多努力去确保数据库安全是不值得的。
当安装操作系统时,有许多好的文献资料可以参考。
经常遇到的一个普遍问题,就是作为网络服务器托管Internet(or Intranet)的同一服务器上数据库的应用。
虽然这可能节省的购买一个单独的服务器费用,但这严重影响了安全问题。
如果这是确定的,当数据库开放地连接到互联网这种情况被证实了。
最近的一个例子,我记得是一个Apache网络服务器系统服务组织在互联网上提供的,与Oracle 数据库在互联网上提供有关端口1521。
在调查这个问题时进一步被发现,访问该Oracle 服务器是没有服务器加以制止之类的保护措施的(包括缺乏密码)。
从互联网发展前景看,这个数据库是不被推崇的,但默认设置的使用以及粗糙的安全措施,使服务器更加脆弱。
上面提到的问题并不是严格地数据库问题,还可以被归类为构建机制和防火墙保护问题,但最终它确是数据库,这是毫不妥协的。
Database introduction and ACCESS2000The database is the latest technology of data management, and the important branch of computer science. The database , as its name suggests, is the warehouse to preserve the data. The warehouse to store apparatus in computer only, and data to deposit according to sure forms。
The so-called database is refers to the long-term storage the data acquisition which in the computer, organized, may share。
In the database data according to the certain data model organization, the description, and the storage, has a smaller redundance, the higher data independence and the easy extension, and may altogether shine for each kind of user。
The effective management database, frequently has needed some database management systems (DBMS) is the user provides to database operation each kind of order, the tool and the method, including database establishment and recording input, revision, retrieval, demonstration, deletion and statistics。
英文原文:Information System Development and Database DevelopmentIn many organizations, database development from the beginning of enterprise data modeling, data modeling enterprises determine the scope of the database and the general content. This step usually occurs in an organization's information system planning process, it aims to help organizations create an overall data description or explanation, and not the design of a specific database. A specific database for one or more information systems provide data and the corporate data model (which may involve a number of databases) described by the organization maintaining the scope of the data. Data modeling in the enterprise, you review of the current system, the need to support analysis of the nature of the business areas, the need for further description of the abstract data, and planning one or more database development project. Figure 1 shows Pine Valley furniture company's enterprise data model of a part.1.1 Information System ArchitectureAs shown in figure 1, senior data model is only general information system architecture (ISA) or a part of an organization's information system blueprint. In the information system planning, you can build an enterprise data model as a whole information system architecture part. According to Zachman (1987), Sowa and Zachman (1992) views of an information system architecture consists of the following six key components:Data (Figure 1 shows, but there are other methods that).Manipulation of data processing (of a data flow diagram can be used, with the object model methods, or other symbols that).Networks, which organizations and in organizations with its main transmission of data between business partners (it can connect through the network topology map and to demonstrate).People who deal with the implementation of data and information and is the source and receiver (in the process model for the data shows that the sender and the receiver). Implementation of the events and time points (they can use state transition diagram and other means.)The reasons for the incident and data processing rules (often in the form of text display, but there are also a number of charts for the planning tools such as decision tables).1.2 Information EngineeringInformation systems planners in accordance with the specific information system planning methods developed information system architecture. Information engineering is a popular and formal methods. Information engineering is a data-oriented creation and maintenance of the information system. Information engineering is because the data-oriented, so when you begin to understand how the database is defined by the logo and when information engineering a concise explanation is very helpful. Information Engineering follow top-down planning approach, in which specific information systems from a wide range of informationneeds in the understanding derived from (for example, we need about customers, products, suppliers, sales and processing of the data center), rather than merging many detailed information requested ( orders such as a screen or in accordance with the importation of geographical sales summary report). Top-down planning will enable developers to plan more comprehensive information system, consider system components provide an integrated approach to enhance the information system and the relationship between the business objectives of the understanding, deepen their understanding of information systems throughout the organization in understanding the impact.Information Engineering includes four steps: planning, analysis, design and implementation. The planning stage of project information generated information system architecture, including enterprise data model.1.3 Information System Planning Information systems planning objective is to enable IT organizations and the business strategy closely integrated, such integration for the information systems and technology to make the most of the investment interest is very important. As the table as a description, information engineering approach the planning stage include three steps, we in the follow-up of three sections they discussed.1. Critical factors determining the planning Planning is the key factor that organizational objectives, critical success factors and problem areas. These factors determine the purpose of the establishment of planning and environment planning and information systems linked to strategic business planning. Table 2 shows the Pine Valley furniture company's key planning a number of possible factors, these factors contribute to the information systems manager for the new information systems and databases clubs top priority to deal with the demand. For example, given the imprecise sales forecasts this problem areas, information systems managers in the organization may be stored in the database additional historical sales data, new market research data and new product test data.2. The planning organizations set targetsOrganizations planning targets defined scope of business, and business scope will limit the subsequent analysis and information systems may change places. Five key planning targets as follows:●organizational units in the various sectors.●organizations location of the place of business operations.●functions of the business support organizations handling mission of the relevant group. Unlike business organizations function modules, in fact a function can be assigned to various organizations modules (for example, product development function is the production and sale of the common responsibility of the Ministry).●types of entities managed by the organization on the people, places and things of the major types of data.●Information System data set processing software applications and support procedures.3. To set up a business modelA comprehensive business model including the functions of each enterprisefunctional decomposition model, the enterprise data model and the various planning matrix. Functional decomposition is the function of the organization for a more detailed decomposition process, the functional decomposition is to simplify the analysis of the issue, distracted and identify components and the use of the classical approach. Pine Valley furniture company in order to function in the functional decomposition example in figure 2 below. In dealing with business functions and support functions of the full set, multiple databases, is essential to a specific database therefore likely only to support functions (as shown in Figure 2) provide a subset of support. In order to reduce data redundancy and to make data more meaningful, has a complete, high-level business view is very helpful.The use of specific enterprise data model to describe the symbol. Apart from the graphical description of this type of entity, a complete enterprise data model should also include a description of each entity type description of business operations and a summary of that business rules. Business rules determine the validity of the data.An enterprise data model includes not only the types of entities, including the link between the data entities, as well as various other objects planning links. Showed that the linkage between planning targets a common form of matrix. Because of planning matrix need not be explicit modeling database can be clearly described business needs, planning matrix is an important function. Regular planning matrix derived from the operational rules, it will help social development activities that top priority will be sorting and development activities under the top-down view through an enterprise-wide approach for the development of these activities. There are many types of planning matrix is available, their commonalities are:●locations - features show business function in which the implementation of operational locations.●unit - functions which showed that business function or business unit responsible for implementation.●Information System - data entities to explain how each information system interact with each data entity (for example, whether or not each system in each entity have the data to create, retrieve, update and delete).●support functions - data in each functional entities in the data set for the acquisition, use, update and delete.●Information System - target indication for each information system to support business objectives.Figure 3 illustrate a possible functions - data entities matrix. Such a matrix can be used for a variety of purposes, including the following three objectives:1) identify gaps in the data entities to indicate the types of entities not use any function or functions which do not use any entity.2) found that the loss of each functional entities involved in the inspection staff through the matrix to identify any possible loss of the entity.3) The distinction between development activities if the priority to the top of a system development function for a high-priority (probably because it important organizational objectives related), then this area used by entities in the development of the database has a high priority. Hoffer, George and Valacich (2002) are theworks of the matrix on how to use the planning and completion of the Information EngineeringThe planning system more complete description.2 database development processBased on information engineering information systems planning database is a source of development projects. These new database development projects is usually in order to meet the strategic needs of organizations, such as improving customer support, improve product and inventory management, or a more accurate sales forecast. However, many more database development project is the bottom-up approach emerging, such as information system user needs specific information to complete their work, thus beginning a project request, and as other information systems experts found that organizations need to improve data management and begin new projects. Bottom-up even in the circumstances, to set up an enterprise data model is also necessary to understand the existing database can provide the necessary data, otherwise, the new database, data entities and attributes can be added to the current data resources to the organization. Both the strategic needs or operational information needs of each database development projects normally concentrated in a database. Some projects only concentrated in the database definition, design and implementation of a database, as a follow-up to the basis of the development of information systems. However, in most cases, the database and associated information processing function as a complete information systems development project was part of the development. 2.1 System Development Life CycleGuide management information system development projects is the traditional process of system development life cycle (SDLC). System development life cycle is an organization of the database designers and programmers information system composed of the Panel of Experts detailed description, development, maintenance and replacement of the entire information system steps. This process is because Waterfall than for every step into the adjacent the next step, that is, the information system is a specification developed by a piece of land, every piece of the output is under an input. However shown in the figure, these steps are not purely linear, each of the steps overlap in time (and thus can manage parallel steps), but when the need to reconsider previous decisions, but also to roll back some steps ahead. (And therefore water can be put back in the waterfall!)Figure 4 on the system development life cycle and the purpose of each stage of the product can be delivered concise notes. The system development life cycle including each stage and database development-related activities, therefore, the question of database management systems throughout the entire development process. In Figure 5 we repeat of the system development life cycle stage of the seven, and outlines the common database at each stage of development activities. Please note that the systems development life cycle stages and database development steps一一对应exists between the relationship between the concept of modeling data in both systems development life cycle stages between.Enterprise ModelingDatabase development process from the enterprise modeling (system developmentlife cycle stage of the project feasibility studies, and to choose a part), Organizations set the scope and general database content. Enterprise modeling in information systems planning and other activities, these activities determine which part of information systems need to change and strengthen the entire organization and outlines the scope of data. In this step, check the current database and information systems, development of the project as the main areas of the nature of the business, with a very general description of each term in the development of information systems when needed data. Each item only when it achieved the expected goals of organizations can be when the next step.Conceptual Data ModelingOne has already begun on the Information System project, the concept of data modeling phase of the information systems needs of all the data. It is divided into two stages. First, it began the project in the planning stage and the establishment of a plan similar to Figure 1. At the same time outlining the establishment of other documents to the existing database without considering the circumstances specific development projects in the scope of the required data. This category only includes high-level data (entities), and main contact. Then in the system development life-cycle analysis stage must have a management information system set the entire organization Details of the data model definition of all data attributes, listing all data types that all data inter-entity business linkages, defining description of the full data integrity rules. In the analysis phase, but also the concept of inspection data model (also called the concept behind the model) and the goal of information systems used to explain other aspects of the model of consistency categories, such as processing steps, rules and data processing time of timing. However, even if the concept is such detailed data model is only preliminary, because follow-up information system life cycle activities in the design of services, statements, display and inquiries may find that missing element or mistakes. Therefore, the concept of data often said that modeling is a top-down manner, its areas of operation from the general understanding of the driver, rather than the specific information processing activities by the driver.3. Logical Database Design Logical database design from two perspectives database development. First, the concept of data model transform into relational database theory based on the criteria that means - between. Then, as the design of information systems, every computer procedures (including procedures for the input and output format), database support services, statements, and inquiries revealed that a detailed examination. In this so-called Bottom-up analysis, accurate verification of the need to maintain the database and the data in each affairs, statements and so on the needs of those in the nature of the data.For each separate statements, services, and so on the analysis must take into account a specific, limited but complete database view. When statements, services, and other analysis might be necessary to change the concept of data model. Especially in large-scale projects, the different analytical systems development staff and the team can work independently in different procedures or in a centralized, the details of their work until all the logic design stage may be displayed. In these circumstances, logic database design stage must be the original concept of data model and user view theseindependent or merged into a comprehensive design. In logic design information systems also identify additional information processing needs of these new demands at this time must be integrated into the logic of earlier identified in the database design.Logical database design is based on the final step for the formation of good data specifications and determine the rules, the combination, the data after consultation specifications or converted into basic atomic element. Most of today's database, these rules from the relational database theory and the process known as standardization. This step is the result of management of these data have not cited any database management system for a complete description of the database map. Logical database design completed, we began to identify in detail the logic of the computer program and maintenance, the report contents of the database for inquiries.4. Physical database design and definitionPhysical database design and definition phase decisions computer memory (usually disk) database in the organization, definition of According to the library management system for physical structure, the procedures outlined processing services, produce the desired management information and decision support statements. The objective of this stage is to design an effective and safe management of all data-processing database, the physical database design to closely integrate the information systems of other physical aspects of the design, including procedures, computer hardware, operating systems and data communications networks.5. Database ImplementationThe database prepared by the realization stage, testing and installation procedures for handling databases. Designers can use the standard programming language (such as COBOL, C or Visual Basic), the dedicated database processing languages (such as SQL), or the process of the non-exclusive language programming in order to produce a statement of the fixed format, the result will be displayed, and may also include charts. In achieving stage, but also the completion of all the database files, training users for information systems (database) user setup program. The final step is to use existing sources of information (documents legacy applications and databases and now needs new data) loading data. Loading data is often the first step in data from existing files and databases to an intermediate format (such as binary or text files) and then to turn intermediate loading data to a new database. Finally, running databases and related applications for the actual user maintenance and retrieval of data. In operation, the regular backup database and the database when damaged or affected resume database.6. Database maintenance During the database in the progressive development of database maintenance. In this step, in order to meet changing business conditions, in order to correct the erroneous database design, database applications or processing speed increase, delete or change the structure of the database. When a procedure or failure of the computer database affect or damage the database may also be reconstruction. This step usually is the longest in the database development process step, as it continued to databases and related applications throughout the life cycle, the development of each database can be seen as a brief database development processand data modeling concepts arise, logical and physical database design and database to achieve dealing with the changes.信息系统开发和数据库开发在许多组织中,从企业数据建模开始的数据库开发,企业数据建模确定数据库的范围和一般内容。
数据库中英文术语基础理论英文术语中文释义data 数据database(DB) 数据库database system(dbs) 数据库系统database management system 数据库管理系统database administrator 数据库管理员relational model 关系模型relational database 关系型数据库relation 关系table 表网columnattribute 属性IOW 行tuple 元组record 记录domain 域key 键super key 超键candidate key 候选键primary key 主键foreign key 外键DQL 数据查询语句DDL 数据定义语句DML 数据操作语句DQL英文术语中文释义select 查询(选择)from 来自(表)where 条件范围order by 排序group by 分组having 分组条件union 合集union all 合集(重复数据多次显示)intersect 交集minues 差集and 与或主ornotfunction 单行函数aggregate functions 分组函数(多行函数,聚集函数)Cartesianproduct 笛卡尔积join 连接inner join 内连接(通常意义上的有效连接)outer join 外连接left outer join 左外连接right outer join 右外连接full outer join 全外连接nested subqueries 嵌套子查询DML和事务控制英文术语中文释义insert 新增(插入)into 进入values 值update 修改(更新)set 设置delete 删除commit 提交rollback 回滚DDL英文术语中文释义create 新建table 表default 默认值alter 修改add 添加modify 编辑drop 删除rename 重命名drop 删除truncate 截取constraint 约束not null 非空约束primary key 主键约束uniq。
数据库表名中英文对照表tbl_AMBoard AM板位描述表tbl_AMBoardCks 单板本板时钟参考源表tbl_AMBoardMap AM单板主备组表tbl_AMBoardProp AM单板属性表tbl_AMCcmHwCfg CCM平面HW配置表tbl_AMCksCfg AM时钟描述表tbl_AMDParamCfg AMD板参数配置表tbl_AMFrame AM框位描述表tbl_AMFrame AM框位描述表tbl_AMInstance AM话统实例表tbl_AMModule AM模块描述表(SM)tbl_AMModule AM模块描述表tbl_AMSideLinkDes AM侧门链路配置表tbl_AMSoftParam AM软件参数表tbl_AMWarnEnviCfg AM告警环境变量配置表tbl_AMWarnMask AM告警屏蔽表tbl_AOSLPHILink AO服务器链路配置表tbl_AOUserData AO用户业务表tbl_AT0TkGrp A T0中继群表tbl_AT4TkGrp A T4中继群表tbl_AccModeAna 计费制式分析表tbl_AccStatAna 计费情况分析表tbl_AccStateIdx 计费情况索引表tbl_AddComplexMode 附加费组合方式分析表tbl_AddMode 附加费制式分析表tbl_AddPayMode 附加费收费方式表tbl_AnalogConfig 模拟量配置表tbl_AreaCode 国内长途区号表tbl_AtuCellCfg A TU单板信元配置表tbl_AtuPvcCfg A TU单板PVC配置表tbl_AuxSig 补充信令表tbl_BiPoint 计费点分析表tbl_BoardDes 单板描述表tbl_BoardLoadInfo 单板加载信息表tbl_CDBFuncCfg 中央数据库功能配置表tbl_CDBFuncCfg 中央数据库功能配置表tbl_CFData 呼叫前转表tbl_CallDivReg 呼叫转接业务登记表tbl_CallPreProc 号首特殊处理表tbl_CallSrcCode 呼叫源表tbl_CalleeAna 被叫号码分析表tbl_CalleeGrpAcc 被叫分组计费表tbl_CalleeLimitGroup 被叫号码限呼组表tbl_CallerAna 主叫号码分析表tbl_CallerDistGroupISP 主叫号码甄别组ISP表tbl_CallerDistGroupSM 主叫号码甄别组SM表tbl_CdbFieldDef CDB/ISP字段定义表tbl_CdbTableDef CDB/ISP关系定义表tbl_CentrexCard ISP卡号数据表tbl_CentrexConsole CENTREX话务台表tbl_CentrexGrp CENTREX群数据表tbl_CentrexGrpAcc CENTREX群内计费表tbl_CentrexGrpInfo CENTREX长短号对照表tbl_CentrexNewService CENTREX号码分析表tbl_CentrexOutRight CENTREX出群权限表tbl_ChgDN 改号对照表tbl_CicModule CIC模块表tbl_CirSort 电路工程编号模块分布表tbl_ClockCfg 时钟配置表tbl_CountryCode 国家及地区代码表tbl_CugAttr CUG属性表tbl_CugData CUG数据表tbl_DBChange 号码变换表tbl_DChParam D通路参数表tbl_DateTypeAna 日期类别分析表tbl_DestLimit 目的码限呼表tbl_DnAllow 目的码允许表tbl_DvMethod 信息量计费制式表tbl_E16Base 单板时钟参考源输出选择表tbl_E1PortCfg E1端口配置表(SM)tbl_E1PortCfg E1端口配置表tbl_EMTkGrp EM中继群表tbl_ESLDev ESL设备数据表tbl_ESLUserData ESL用户数据表tbl_ESMBoardCks ESM单板本板时钟参考源表tbl_ESME16Base ESM单板时钟参考源输出选择表tbl_ETSUserData ETS用户数据表tbl_EcDevParaCfg EC参数配置表tbl_EcpBoardSrcCfg ECP资源配置表tbl_EcpBoardSrcCfg ECP资源配置表tbl_EmCallWatch 紧急呼叫观察表tbl_EsmE1Des ESM中继E1配置表tbl_FailProc 呼叫建立失败处理表tbl_FskV oltIndex FSK电平参数表tbl_GWHInfo 运营商信息表tbl_GrpLimit 组间呼叫指示表tbl_HWGrpDes HW描述表tbl_HslPortCfg HSL配置表tbl_IFMCardCfg SoftX IP配置表tbl_IFMCardCfg SoftX IP配置表tbl_IFMFuncCfg IFM功能配置表tbl_IFMFuncCfg IFM功能配置表tbl_INChargeRounding 计费舍入表tbl_INChargeSpecialty 业务计费特性表tbl_INChargeType 计费类别表tbl_INConfine IN业务制约关系表tbl_INDPCTable 远端信令点表tbl_INDPNewService DP点与新业务对应关系表tbl_INDPPrinciple 双IN业务在DP点的处理原则表tbl_INGTTranslation 全局码翻译表tbl_INHolidayDiscount 节假日折扣表tbl_INIPAddress IP物理地址表tbl_INIPCapacity IP业务能力数据表tbl_INIPConfig IP配置状态数据表tbl_INKeyNumber IN业务键值与序号对应表tbl_INLocalAssistRes 智能资源分配表tbl_INLocalCallerNumber IN业务本地呼叫主叫号码描述表tbl_INLongCallerNumber IN业务长途呼叫主叫号码描述表tbl_INMEMCardConfig MEM单板配置表tbl_INMEMParaConfig MEM参数配置表tbl_INModuleLogic 模块逻辑描述表tbl_INMsgIDToneID MessageID与信号音映射表tbl_INNewGT 新全局码表tbl_INNewServiceName 新业务名称与序号对应表tbl_INNormalDiscount 日常折扣表tbl_INNoteIndex 语音种类索引表tbl_INOffice 局TDP配置数据表tbl_INSCPAddress SCP物理地址表tbl_INSCPConfig SCP配置表tbl_INSPTStartCode SPT单板起始语音编码表tbl_INSRMModule SRM模块资源搜索表tbl_INSSPAddress SSP物理地址表tbl_INSSPCapacity SSP业务专用资源能力数据表tbl_INSSPModuleState SSP模块配置状态数据表tbl_INScfIDtoSCP SCP映射表tbl_INServNewRestrice IN业务与新业务制约关系表tbl_INSptSound SPT语音编码表tbl_INSspSpecialSig 业务特殊信令表tbl_INSubsystem 子系统表tbl_INTelephoneConfig 电话号码连续方案配置表tbl_INTimeDiscount 通话时长折扣表tbl_INWeekDiscount 星期折扣表tbl_ISPFuncCfg ISP功能配置表(SM)tbl_ISPFuncCfg ISP功能配置表tbl_ITCCardCfg ITC单板配置表tbl_InternetCfg IAU数据配置表tbl_IsdnData ISDN数据表tbl_JoinFrameOptCfg 接口框输出光路配置表tbl_LCCCardCfg LCC单板配置表tbl_LimitCallTime 按时间限呼组表tbl_LocalGrpAcc 本局分组计费表tbl_LocalOfficeInfo 本局信息表tbl_MGDev MG接入设备表tbl_MGDev MG接入设备表tbl_MTADesc MTA描述表tbl_MTKTkGrp MTK中继群表tbl_MTPDestSigPoint MTP目的信令点表tbl_MTPLink MTP链路表tbl_MTPLinks MTP链路集表tbl_MTPRoute MTP路由表tbl_MemInfo MEM查询表tbl_MeterRate 计次表费率表tbl_MeterType 计次制式表tbl_NMCallGap 网管呼叫间隙表tbl_NMCancelDeRoute 网管取消迂回路由表tbl_NMCircuitDirect 网管电路定向表tbl_NMCircuitReject 网管电路拒绝表tbl_NMCircuitReserved 网管中继预留控制表tbl_NMFlowCtlCircuit 流控电路控制表tbl_NMFlowCtlDest 流控目的码表tbl_NMHTRDes 网管HTR描述表tbl_NMInTkDest 网管发端目的码表tbl_NMLimDirectRoute 网管限制直达路由表tbl_NMOutTkDest 网管出局目的码表tbl_NMSkipSubRoute 网管跳跃子路由表tbl_NMSpecialTone 网管特殊通知音表tbl_NMTempRoute 网管临时路由表tbl_NewSerBill 新业务计费表tbl_No1Info 中继一号数据表tbl_No7Info 中继七号数据表tbl_NodeDes 主节点描述表tbl_Office 局向表tbl_OutCentrexPre 出群字冠描述表tbl_OutRight 号首呼出权限表tbl_PCMAttr PCM物理属性表tbl_PRA TkCircuit PRA信令链路表tbl_PRAUserData PRA用户数据表tbl_PbxUserGrp 小交用户群表tbl_PbxUserGrpDev 小交用户设备表tbl_PcmPulse PCM脉冲表tbl_PhoneSeg 号段表tbl_PostInfo 营业厅数据表tbl_PriorDef 优先级定义表tbl_PulseMod 脉冲参数表tbl_RSADesc RSA描述表tbl_RSAESCCfg ESC配置表tbl_RSMIIModuleSigLink RSMII模块信令链路表(SM)tbl_RSMIIModuleSigLink RSMII模块信令链路表tbl_ReleaseCtrlType 释放控制方式表tbl_Route 路由表tbl_RouteAna 路由分析表tbl_SMBoardProp SM单板扩展属性表tbl_SMCksCfg SMCKS时钟配置表tbl_SMClockDes 时钟描述表tbl_SMFrameDes 机框描述表tbl_SMIISigRoute SMII信令链路配置表(SM)tbl_SMIISigRoute SMII信令链路配置表tbl_SMInstance SM话统实例表tbl_SMModule SM模块描述表tbl_SMOptCfg SM模块光路链路配置表(SM)tbl_SMOptCfg SM模块光路链路配置表tbl_SMSideLinkDes SM侧门链路配置表tbl_SMThreshold SM话统阈值表tbl_SMWarnMask SM告警屏蔽表tbl_STDev ST设备数据表tbl_STUserData ST用户数据表tbl_Second 时刻数据表tbl_SemiPerm 半永久性连接表tbl_ServiceTrigger 超级触发业务登记表tbl_ServiceTriggerIdx 业务触发索引表tbl_ShelfDes 槽位描述表tbl_SigChange 信号变换表tbl_SigSetting 放音配置表tbl_SigSlot 信号音板时隙描述表tbl_SmFieldDef SM字段定义表tbl_SmTableDef SM关系定义表tbl_SoftParam 软件参数表tbl_SpDBChange 特殊号码变换表tbl_SpmBoardModule AM各板模块配置表tbl_SpmBoardModule AM各板模块配置表tbl_SpmCpcBoardCfg CPC板配置表tbl_SpmCpcBoardCfg CPC板配置表tbl_SpmE1Des SPM中继E1配置表tbl_SpmE1Des SPM中继E1配置表tbl_SpmHn7BoardCfg HN7板配置表tbl_SpmHn7BoardCfg HN7板配置表tbl_SpmMHIBoardCfg MHI板配置表tbl_SpmMHILinkTsCfg MHI链路时隙配置表tbl_SpmSptBoardCfg SPD板配置表tbl_SpmSptBoardCfg SPD板配置表tbl_SpmSrcBoardCfg SRC板单元配置表tbl_SpmSrcBoardCfg SRC板单元配置表tbl_SpmStaticSigDes SPM静态信号音描述表tbl_SrvCtrlLcs 业务权限控制表tbl_SubRoute 子路由表tbl_SubTrkGrp 中继群/子路由表tbl_TCIUserData TCI用户数据表tbl_Tandem 汇接信息表tbl_TestDevGrp 测试设备组表tbl_TimeIdx 时间索引表tbl_TimeSection 时间段描述表tbl_Timer 定时器数据表tbl_TkCircuit 中继电路表tbl_TkGrpLoad 中继群承载表tbl_TkGrpLoadIdx 中继群呼叫承载索引表tbl_TollCode 长途字冠描述表tbl_TrfTask 话统任务表(SM)tbl_TrfTask 话统任务表tbl_TrunkGroup 中继群表tbl_UserDataIdx 用户数据索引表tbl_UserDataIdxBAM 用户数据索引表(BAM)tbl_UserName 用户姓名表tbl_V5CChannel 物理C通道设定表tbl_V5CPath C路径配置表tbl_V5InterfaceData V5接口数据表tbl_V5PRADev V5PRA设备数据表tbl_V5PRATkCircuit V5PRA中继电路表tbl_V5STDev V5ST设备数据表tbl_V5STUserData V5ST用户数据表tbl_V5Var V5协议变量设定表tbl_WarnEnviCfg 告警环境变量配置表(SM)tbl_WarnParamCfg 告警信息参数配置表(SM)tbl_WarnParamCfg 告警信息参数配置表tbl_WeekTypeAna 星期类别分析表。
数据库概论A database consists of a file or a set of files. The information in these files may be broken down into records, each of which consists of one or more fields. Fields are the basic units of data storage, and each field typically contains information pertaining to one aspect or attribute of the entity described by the database. Using keywords and various sorting commands, users can rapidly search, rearrange, group, and select the fields in many records to retrieve or create reports on particular aggregates of data.一个数据库由一个文件或文件集合组成。
这些文件中的信息可分解成一个个记录,每个记录有一个或多个域。
域是数据存储的基本单位,每个域一般含有由数据库描述的属于实体的一个方面或一个特性的信息。
用户使用键盘和各种排序命令,能够快速查找、重排、分组并在查找的许多记录中选择相应的域,建立特定集上的报表。
Database records and files must be organized to allow retrieval of the information. Early systems were arranged sequentially (i.e., alphabetically, numerically, or chronologically); the development of direct-access storage devices made possible random access to data via indexes. Queries are the main way users retrieve database information. Typically, the user provides a string of characters, and the computer searches the database for a corresponding sequence and provides the source materials in which those characters appear. A user can request, for example, all records in which the content of the field for a pe rson’s last name is the word Smith.数据库记录和文件的组织必须确保能对信息进行检索。
JDBC (Java Data Base Connectivity)JDBC (Java Data Base Connectivity,) is a SQL statement for the implementation of the Java API, for a variety of relational databases to provide a unified visit by a group, it’s using Java language preparation classes and interface. JDBC for tools / database development provides a standard API, which can build more sophisticated tools and interfaces to database developers. Pure Java API can be used to prepare database applications, at the same time, JDBC is also a brand name. With JDBC, data sent to the various relationships SQL statement is a very easy matter. In other words with JDBC API, we do not have to visit a Sybase database to write specialized procedures, visit the Oracle database specifically to write a program, or visit Informix database and the preparation of another procedure, programmers should use the JDBC API to write a procedure enough, it can be sent to the corresponding SQL database calls. Meanwhile, the Java language and JDBC to integrate non-programmers do not have to, with a platform for the preparation of different applications, just write it again in the process can be run on any platform, which is the Java language "Write once, run everywhere" advantage. Java database Connect Architecture for Java application of the standard method of connecting to the database. JDBC is the case of Java programmers API, and the realization of the database connection is the case of service providers interface model.As API, JDBC program development for the provision of standard interfaces, and database vendors and third-party middleware vendors to achieve connectivity and database provides a standard method. JDBC use the existing SQL standard - Support and other databases and connectivity standards, such as bridge between ODBC. JDBC achieve all these objectives and standards for a simple, high-performance and strict definition of achieving type interface. Java with a solid, safe, easy to use, easy to understand and can be automatically downloaded from the Internet and other characteristics of the preparation of the outstanding database application language. Need is a Java application Database with a variety of different procedures for a dialogue between the methods. The JDBC is the mechanism for such purposes. Java JDBC expanded functionality. For example, with Java and JDBC API Applet can be issued containing the page, and the applet may use the information from remote databases enterprises can also use JDBC to all staff through the Intranet will be connected to one or more Internal database (even if those staff computers are used by Windows, Macintosh, and UNIX, and other various operating systems). As more and more programmers using Java Programming language, Java from the convenient access to the database requirements areincreasing. MIS administrators like the combination of Java and JDBC, because it makes it easy to disseminate information and Economy. Enterprises can continue to use their installed database, and can easily access information, even if this information is stored in the different database management systems. The development of new procedures is a very short period. An Equipment and version control will be greatly simplified. Programmers can prepare only what applications or updated only once, and then put it on the server, and then on any person can get the latest version of the application. Sales for the business information services, Java and JDBC for external customers with better access to information update method.First, the use of JDBCSimply put, JDBC to do three things: establish a connection with the database, send SQL statements and the results. The following codes are the basic examples:Connection con = DriverManager.getConnection ( "jdbc: odbc: wombat," "login""Password");Statement stmt = con.createStatement ();ResultSet rs = stmt.executeQuery ( "SELECT a, b, c FROM Table1");While (rs.next ()) {Int x = rs.getInt ( "a");String s = rs.getString ( "b");Float f = rs.getFloat ( "c");}Based on the above code JDBC database access to a summary of the classic, of course, in this part of the follow-up section we will do a detailed analysis.Second, JDBC APIJDBC is a "low-level" interface, that is, it calls for direct SQL commands. In this respect it functions very good, and other than the easy-to-use database connectivity API, but it also has been designed as a basis interface, it can be established on the High interface and tools. High interface is "user-friendly" interface, which uses a more comprehensible and more convenient API. This API is converted in the behind-the-scenes such as JDBC such a low-level interface. In the relational database "object / relationship" mapping, each row in the table corresponding to the category of an example, the value of each column the examples should be an attribute. Therefore, programmers can directly operate on the Java objects; SQL for data access call will be "under the guise of" automatically generated. They can also be more complex mapping, for example, a number of rows in the table integrated into a Java class. With the interest of the people of JDBC the growing, and more and more developers have been using JDBC-based tools So that the preparation process more easily. Programmers has been trying to make in the preparation of end-user database access has become moresimple applications. For example, applications can provide a choice of According to the mandate of the menu. Task was chosen, the application will be given tips and blank selected for the task of completing the implementation of the necessary information. Application procedures for the importation of the required information will automatically call for SQL Order. In such a process with the assistance, even if they do not understand the fundamental SQL syntax, but also can perform database tasks.Third, JDBC and ODBC compared with other APICurrently, Microsoft's ODBC API is the most widely used for the visit of the relational database programming interface. It can connect almost all platforms almost all databases. For What Java does not use ODBC? The answer to this question is: Java can use ODBC, but preferably with the help of the JDBC to JDBC-ODBC Bridge in the form of use of this point, we later say. The problem now has become: "Why do we need JDBC?" The answer is clear: ODBC not suitable for direct use in Java, because it uses C language interface. Transferred from Java C code in the local security, achieved solid and procedural aspects of the automatic transplantation has many shortcomings. From ODBC C API Java API to the literal translation is not advisable. For example, Java does not guide, and it has ODBC indicators used very widely (including very error-prone Guidelines "void *"). You can imagine JDBC will be converted into the object-oriented interface to the ODBC, and the object-oriented interface to make it easier for Java programmers to receive. ODBC is difficult to learn. It simple and advanced features of the mix, and even the simple query, the options are extremely complex. On the contrary, JDBC to guarantee simple function of simplicity, At the same time, if necessary, to allow the use of advanced features. The opening of "pure Java" mechanism needs such as JDBC Java API. If you use ODBC, it is necessary to manually will be ODBC driver management and driver installation in each client machines. If completely written in Java JDBC Driver in all the JDBC code on the Java platform (from the computer network to the mainframe) can be Automatic installation, and guarantee the safety of transplantation.In short, JDBC API for SQL abstract and basic concepts of Java is a natural interface. It is built on ODBC rather than starting from scratch. Therefore, programmers will be familiar with ODBC JDBC found very easy to use. ODBC JDBC retains the basic design features; In fact, the two interfaces are based on the X / Open SQL CLI (call-level interface). Among them the largest district, another is: Java JDBC to style and based on the merits and optimization, more easy to use.At present, Microsoft has introduced a new addition to ODBC API: RDO, ADO and OLE DB. These design in many ways and JDBC is the same, that is, they are the object-oriented Based on the database interface and can be achieved on ODBC in the category.But the interface, we did not see any special features that make their choice we need to turn to alternative ODBC, especially in the ODBC Flooding Has been established procedure for better market conditions. They also is the largest in the ODBC add a decoration only. Forth, JDBC on the B / S and C / S mode supportJDBC API supports both the two-tier model of database access (C / S), but has also supported the three-tier model (B / S). In the two-tier model, Java applet or application will be directly into the database to dialogue. This will require a JDBC driver to visit with the specific database management systems to communicate. Users of SQL statements sent to the database, and its results will be returned to user. Database can be located on another computer, users connected to the above network. This is called client / server configuration, user's computer for the client, providing database computing Machines for servers. Intranet network can be (it can be linked to company staff), it can also be an internet.In the three-tier model, the order was first sent to the "middle layer", and then by the SQL statement it sent to the database. Database on SQL statement processed and the results sent back to the middle Layer, the middle layer then the results returned to users. MIS managers have discovered the three-tier model is very attractive, because the middle layer can be used to control access to company data and can be used for the newer types. In Another advantage of inter-layer, the user can use the easy-to-use high-level API, and the middle layer will be converted to its corresponding low-level calls. Finally, in many cases under the three-tier structure can provide some performance on the benefits.So far, the middle layer are usually in C or C + + language to prepare such, the implementation of these languages faster. However, with the most optimized compiler (it to switch to Java byte code Efficient in the specific machine code) the introduction, use Java to achieve middle layer will be more practical. This will be a big step forward, it enables people to take full advantage of the many Java Advantages (such as robust, multi-threaded, and security features). For Java JDBC from the middle layer to access a database is very important.Fifth, SQL consistencyStructured Query Language (SQL) relational database access is the standard language. The tricky part is: Although most of the DBMS (database management system) to use the basic functions Standard forms of SQL, but they are not consistent with the recent higher standard definition of the functions of SQL syntax or semantics. For example, not all databases support stored procedures or external connections, it More support this function in the database and mutually inconsistent. It is hoped that the SQL standard that the real part to expanding to include more and more functions. But at the same time it must support JDBCAPI With the existing SQL.JDBC API solution to this problem is to allow a way for any string has been reached by the driver on the DBMS. This means that applications can use any number of SQL Functional, but it must take the risk: it is possible in some DBMS errors. In fact, applications for SQL even if not, or that it may be for a specific DBMS Design SQL dedicated derivatives (for example, documents or images enquiries). JDBC deal with the issue of consistency SQL second method is to provide ODBC-style escape clause, which will in the follow-up Part of the discussion. Escape for a few common grammatical differences SQL provides a standard syntax JDBC. For example, the date has been stored text and the process of calling all escaped grammar. For complex Miscellaneous applications, JDBC third method used to deal with the issue of consistency in its SQL Database Meta Data interface to use DBMS on the description of information, thus enabling application - Each DBMS order to adapt to the requirements and functional. As JDBC API will be used to develop advanced tools and database access API, API basis, it must also pay attention to all of its superstructure consistency. "TM with JDBC standards," representatives of the JDBC users can rely on the standard-level functions. To use this statement, the driver must be at least support the ANSI SQL-2 Entry Level (ANSI SQL-2 represent the United States National Bureau of Standards in 1992, the standards adopted. Entry Level SQL functions on behalf of a specific list). Driver developers can be carried by the JDBC API Testing kits to determine whether the driver of their compliance with these standards. "TM with JDBC standards," said the JDBC providers have been adopted to achieve the Java Soft the conformance testing. These tests will check the consistency of the definition of JDBC API all the classes and methods exist, as far as possible, to check whether the procedures SQL Entry Level function. Of course, these tests not entirely, but now has no intention of Java Soft the various providers to the realization of superscript level. However, this definition of consistency can indeed achieve the JDBC provide a certain degree of credibility. As more and more Database providers, connecting providers, Internet providers and application programming Members of the JDBC API acceptance, JDBC is also rapidly becoming the standard Java database access.Sixth, JDBC entrance - Establishment of connectionYou need to do the first thing is you want to use the DBMS and the establishment of a connection. This includes two steps: loading drivers and establish a connection.Loading driversLoading drivers need only a very simple line code. For example, you want to use JDBC-ODBC Bridge Driver, loading it with the following code:Class.forName ( "sun.jdbc.odbc.JdbcOdbcDriver");Document your driver will tell you should use the class name. For example, if the category were jdbc.DriverXYZ, you will be used to code the following code loading drivers: Class.forName ( "jdbc.DriverXYZ");You do not need to create an instance of the class driver and register it with DriverManager, because calls will be automatically loaded Class.forName Driver category. If you had to create their own examples, you will create an unnecessary copy, but it will not do any harm.Loading Driver category, they can be used to connect with the database.ConnectionThe second step is to use the appropriate driver of the establishment of a connection with the DBMS. The following code is the general practice:Connection con = DriverManager.getConnection (url, "myLogin", "myPassword");This step is very simple and the most difficult is how to provide url. If you are using JDBC-ODBC Bridge, JDBC URL will be jdbc: odbc beginning: the remaining URL is usually your data source name, or database system. Therefore, assuming that you are using ODBC access to a man named "Fred" ODBC data source, your JDBC URL is jdbc: odbc: Fred. "MyLogin" and "myPassword" landing DBMS are the replacement for your user name and password. If you landing database system are the user name "Fernanda" Password "J8", only the following two lines of code can establish a connection:String url = "jdbc: odbc: Fred";Connection con = DriverManager.getConnection (url, "Fernanda," "J8");If you are using the third-party developers of the JDBC driver, the documents will tell you what subprotocol use is in the JDBC URL on the back of some jdbc. For example, if a driver developers registered as a subprotocol acme, JDBC URL in the first and second part will be jdbc: acme. Drivers will tell you the remaining documents JDBC URL format. JDBC URL last part of the positioning is to provide the information in the database.If you load the driver identification provided to the JDBC URL DriverManager.getConnection, that driver will be the establishment of a JDBC URL link to a specific DBMS. As the name indicates, DriverManager class management behind the scenes for you to connect all the details. Unless you are writing drivers, you may not use any other method such, the general programmers need to use such a direct approach is the only DriverManager.getConnection.DriverManager.getConnection method returns an open connection, you can use this link to create JDBC statements and send SQL statements to the database. In the preceding example, the object is a con opened connection, and we will in the future example, use it.外文翻译JDBC(数据库连接)JDBC(Java Data Base Connectivity,java数据库连接)是一种用于执行SQL语句的Java API,可以为多种关系数据库提供统一访问,它由一组用Java语言编写的类和接口组成。
原文:Planning the DatabaseIt is important to plan how the logical storage structure of the database will affect system performance and various database management operations. For example, before creating any tablespaces for your database, you should know how many data files will make up the tablespace,what type of information will be stored in each tablespace, and on which disk drives the datafiles will be physically stored. When planning the overall logical storage of the database structure, take into account the effects that this structure will have when the database is actually created and running.You may have database objects that have special storage requirements dueto type or size.In distributed database environments, this planning stage is extremely important. The physical location of frequently accessed data dramatically affects application performance.During the planning stage, develop a backup strategy for the database. You can alter the logical storage structure or design of the database to improve backup efficiency. Backup strategies are introduced in a later lesson.These are the types of questions and considerations, which you will encounter as a DBA, and this course (in its entirety) is designed to help you answer them.Databases: ExamplesDifferent types of databases have their own specific instance and storage requirements. YourOracle database software includes templates for the creation of these different types of databases.Characteristics of these examples are the following:• Data Warehouse: Store data for long periods and retrieve them in read operations.• Transaction Processing: Accommodate many, but usually small, transactions.• General Purpose: Work with transactions and store them for a medium length of time.Database Configuration Assistant (DBCA)You can use the Database Configuration Assistant (DBCA) to create, change the configuration of, or delete a database. You can also create a database from a list of predefined templates or use an existing database as a sample to create a new database or template. This is sometimes referred to as “database cloning.”You can invoke the DBCA by performing the following steps:1. Log on to your computer as a member of the administrative group that is authorized to install the Oracle software.2. If required, set environment variables.3. Enter dbca to invoke the DBCA.4. Click Next to continue.DBCA offers you a choice of assisting with several operations, for example, creating a database.Using the DBCA to Create a DatabaseYou can use the DBCA to create a database as follows:1. Select Create a Database on the DBCA Operations page to invoke a wizard that enables you to configure and create a database.The wizard prompts you to provide configuration information as outlined in the steps that follow. On most pages, the wizard provides a default setting that you can accept.2. Select the type of database template to be used in creating the database. There aretemplates for Data Warehouse, General Purpose, and Transaction Processing databases that copy a preconfigured database, including data files. These data files include control files,redo log files, and data files for various included tablespaces.Click Show Details to see the configuration for each type of database.For more complex environments, you may want to select the Custom Database option. Password ManagementAfter the DBCA finishes, note the following information for future reference:• Location of installation log files (see A)• Global database name (see B)• System identifier (SID) (see B)• Server parameter file name and location (see B)• Enterpr ise Manager URL (see C)Click Password Management to unlock database accounts that you plan to use.Provide apassword when you unlock an account.Creating a Database Design TemplateA template is a predefined database definition that you use as a starting point for a new database.If you do not create a template as part of the database creation process, you can do it anytime by invoking the DBCA. You have three ways to create a template: • From an existing template• From an existing database (structure only)• From an existing database (structure as well as data)The DBCA guides you through the steps to create a database design template.Using the DBCA to Delete a DatabaseTo delete (or configure) a database in UNIX or Linux, you must set ORACLE_SID in the shell from which DBCA is launched. Start the DBCA by entering dbca in a terminal window, and click Next on the Welcome page. To delete the database, perform the following steps:1. On the Operations page, select Delete a Database, and click Next.2. Select the database that you want to delete (in class, hist), and click Finish.3. Click Yes to confirm your deletion.Using the DBCA to Delete a Database (continued)Dropping a database involves removing its data files, redo log files, control files, and initialization parameter files. The DROP DATABASE statement deletes all control files and all other database files listed in the control file. To use the DROP DATABASE statement successfully,all the following conditions must apply:The database must be mounted and closed.The database must be mounted exclusively—not in shared mode.The database must be mounted as RESTRICTED.An example of this statement is:DROP DATABASE;The DROP DATABASE statement has no effect on archived log files nor does it have any effect on copies or backups of the database. It is best to use Recovery Manager (RMAN) to delete such files. If the database is on raw disks, then the actual raw disk special files are not deleted.Management FrameworkThere are three major components of the Oracle database management framework: • The database instance that is being managed• A listener that allows connections to the database• The management interface. This may be either a management agent running onthe database server (which connects it to Oracle Enterprise Manager Grid Control) or the stand-alone Oracle Enterprise Manager Database Control. This is also referred to as Database Console.Each of these components must be explicitly started before you can use the services of the component and must be shut down cleanly when shutting down the server hosting the Oracle database.The first component to be started is the management interface. After this is activated, the management interface can be used to start the other components. Starting and Stopping Database ControlOracle provides a stand-alone management console called Database Control for databases that are not connected to the Grid Control framework. Each database that is managed with Database Control has a separate Database Control installation, and from any one Database Control, you can manage only one database. Before using Database Control, ensure that a dbconsole process is started.To start the dbconsole process, use the following command:emctl start dbconsole To stop the dbconsole process, use the following command:emctl stop dbconsole To view the status of the dbconsole process, use the following command:emctl status dbconsole.Note: You may need to navigate to your $ORACLE_HOME/bin directory if this directory is not in your operating system (OS) path.Database Control uses a server-side agent process. This agent process automatically starts and stops when the dbconsole process is started or stopped.译文:规划数据库规划如何对数据库的逻辑存储结构将影响系统的性能和各种数据库管理操作是非常重要的。