数据库设计词汇对照表 1.Accessmethod( 2.Alias( 3.Alternatekeys( 4.Anomalies( 5.Applicationdesign( 6.Attribute( 7.Attribute( 8.Attributeinheritance( 9.Basetable( 10.Binaryrelationship( 11.Bottom-upapproach( 12.Businessrules( 13.Candidatekey(
数据库设计词汇对照表
1. Access method(
2. Alias(
3. Alternate keys(
4. Anomalies(
5. Application design(
6. Attribute(
7. Attribute(
8. Attribute inheritance(
9. Base table(
10. Binary relationship(
11. Bottom-up approach(
12. Business rules(
13. Candidate key(
14. Cardinality(
15. Centralized approach(
16. Chasm trap(
17. Client(
18. Clustering field(
19. Clustering index(
20. Column(
21. Complex relationship(
22. Composite attribute(
23. Composite key(
24. Concurrency control(
25. Constraint(
26. Data conversion and loading(
27. Data dictionary(
28. Data independence(
29. Data model(
31. Data security(
32. Database(
33. Database design(
34. Database integrity(
35. Database Management System,DBMS(
36. Database planning(
37. Database server(
38. DBMS engine(DBMS
39. DBMS selection(DBMS
40. Degree of a relationship(
41. Denormalization(
42. Derived attribute(
43. Design methodology(
44. Disjoint constraint(
45. Domain(
46. Entity(
47. Entity integrity(
48. Entity occurrence(
49. Entity-Relationship model(
50. Fact-finding(
51. Fan trap(
52. Field(
53. File(
54. File-based system(
55. File organization(
56. First normal form(1NF,
57. Foreign key(
58. 4GL, Fourth-Generation Language(
59. Full functional dependency(
60. Functional dependency(
61. Generalization(
62. Generalization hierarchy(
63. Global data model(
64. Implementation(
65. Index(
66. Infomation system(
67. Inheritance(
68. Integrity constaints(
69. IS-A hierarchy(IS-A
70. Local logical data model(
71. Logical database design(
72. Meta-data(
73. Mision objective(
74. Mission statement(
75. Multiplicity(
76. Multi-valued attribute(
77. Nonkey attribute/column(
78. Normal forms(
79. Normalization(
80. Null(
82. Participation constraint(
83. Participation constraint(
84. Physical database design(
85. Primary index(
86. Primary key(
87. Primary key(
88. Privileges(
89. Prototyping(
90. Query-by-Example(QBE):
91. RDBMS:
93. Recovery control(
94. Rcursive relationship(
95. redundant data(
96. Referential integrity(
97. Relation(
98. Relational model(
99. Relational database(
100. Relation(
101. Relationship occurrence(
103. Row(
104. Second normal form(
105. Secondary index(
107. Server(
108. Simple attribute(
109. Single-valued attribute(
110. Specialization(
111. Specialization hierarchy(
112. SQL(Structured Query Language,
113. Strong entity(
114. Subclass(
115. Superclass(
116. Superkey(
117. Superkey(
118. System catalog(
119. System definition(
120. System security(
122. Ternary relationship(
123. Testing(
125. 3GL, Third-Generation Language(
127. Top-down approach(
128. Transaction(
129. Transaction Processing Monitor,TPM(
130. Transitive dependency(
131. Tuple(
132. Two-tier client-server architecture(
133. Type hierarchy(
134. UML(Unified Modeling Language,
135. Update anomalies(
136. User view(
137. View(
138. View integration approach(