You are on page 1of 12

KEYWORDS 9608 – SECTION 1

CHAPTER 1

BINARY
A number expressed in base-2 numeral system which represents numeric values using two different symbols:
typically 0 and 1.
DENARY
Also known as "decimal" or "base 10," is the standard number system used around the world. It uses ten digits
(0, 1, 2, 3, 4, 5, 6, 7, 8, and 9) to represent all numbers.
HEXADECIMAL
Also base 16, or hex, is a positional numeral system with a base of 16. It uses 16 distinct symbols, most often
the symbols 0–9 to represent values 0 to 9, and A, B, C, D, E, F (or alternatively a, b, c, d, e, f) to represent
values 10 to 15.
BCD
Binary-Coded Decimal (BCD) is a class of binary encodings of decimal numbers where each decimal digit is
represented by a fixed number of bits, usually 4.
ASCII
American Standard Code for Information Interchange. Is a code for representing English characters as
numbers, with each letter assigned a number from 0 to 127. For example, the ASCII code for uppercase M is 77
UNICODE
A standard for representing characters as integers. Unlike ASCII, which uses 7 bits for each character, Unicode
uses 16 bits, which means that it can represent more than 65,000 unique characters.
2’s COMPLEMENT
The negative of a binary number represented by switching all ones to zeros and all zeros to ones and then
adding one to the result.
BITMAPPED IMAGE
A bitmap is a type of memory organization or image file format used to store digital images.
PIXEL
An area on a display screen, one of many from which an image is composed. "The camera scans photographs
and encodes the image into pixels".
FILE HEADER
The bitmap-file header contains information about the type, size, and layout of a device-independent bitmap
file.
IMAGE RESOLUTION
Image resolution is the detail an image holds. Higher resolution means more image detail.
SCREEN RESOLUTION
Screen resolution is the number of pixels. The image on your computer screen is built up from thousands or
millions of pixels. The screen creates the image you see by changing the colours of these tiny square elements.
The screen resolution tells you how many pixels your screen can display horizontally and vertically.
FILE SIZE
File size measures the size of a computer file. Typically it is measured in bytes or bits. The actual amount of
disk space consumed by the file depends on the file system.
VECTOR GRAPHIC
Vector graphics are not made up of a grid of pixels. Instead, vector graphics are comprised of paths, which are
defined by a start and end point, along with other points, curves, and angles along the way. A path can be a
line, a square, a triangle, or a curvy shape. These paths can be used to create simple drawings or complex
diagrams.
DRAWING OBJECT
Vector graphics are made up of objects and their properties. An object is a mathematical or geometrically
defined construct such as a rectangle, line or circle.
PROPERTY
Each of these objects has properties to tell you the size, colour, position, etc.
DRAWING LIST
A set of commands used to define a vector image.
SOUND
Vibrations that travel through a medium and can be heard when they reach a person's ear.
SAMPLING
Sampling is a method of converting an analogue sound signal into a digital file containing binary numbers.

1
KEYWORDS 9608 – SECTION 1

SAMPLING RATE
The numbers of samples taken per second.
SAMPLING RESOLUTION
The sampling resolution is the representation (or size of the numbers) used to write samples in digital sound
recording. The sampling resolutions used regularly in current digital music practice are: 8-bit, 16-bit, 24-bit,
and 32-bit.
FILE SIZE
File Size = Sample Rate * Sample Resolution * Length of Sound
SOUND-EDITING SOFTWARE
Sound-editing software is software which allows editing and generating of audio data.
VIDEO STREAMS
A proper definition of streaming is transmitting a continuous flow of audio and/or video data while earlier
parts are being used. The term refers to the delivery method of the data rather than the data itself.
FRAME RATE
Frame rate, also known as frame frequency, is the frequency (rate) at which an imaging device displays
consecutive images called frames. The term applies equally to film and video cameras, computer graphics, and
motion capture systems.
INTERLACED ENCODING
Interlaced Video Encoding. Video data intended for use with computers is typically progressive, meaning that
each frame is encoded as a single image.
PROGRESSIVE ENCODING
There are two basic formats for video, progressive and interlaced. Film is a progressive source because each
picture fills the entire frame. That means the frame rate is the number of individual pictures. Analog video, on
the other hand, uses interlaced, or field based, video. Interlacing uses two different pictures to fill an entire
frame. One field (picture) is drawn using every other line on a television screen, followed by a second field
that's drawn on the lines skipped by the first. The fields are said to be interleaved together or interlaced. Like
with film, each picture is from a different moment in time. Unlike film, the rate of individual pictures is twice
the frame rate.
While film only has progressive frames, and analog video only interlaced fields, digital video may have either or
both. In the digital domain displaying progressively is a property separate from the contents of the frame.
VIDEO INTERFRAME COMPRESSION
An inter frame is a frame in a video compression stream which is expressed in terms of one or more
neighboring frames. The "inter" part of the term refers to the use of Inter frame prediction. This kind of
prediction tries to take advantage from temporal redundancy between neighboring frames allowing to achieve
higher compression rates.
SPATIAL REDUNDANCY
Elements that are duplicated within a structure, such as pixels in a still image and bit patterns in a file.
Exploiting spatial redundancy is how compression is performed.
TEMPORAL REDUNDANCY
Pixels in two video frames that have the same values in the same location. Exploiting temporal redundancy is
one of the primary techniques in video compression
MULTIMEDIA CONTAINER FORMATS
A container format is a computer file format that can contain various types of data, compressed by means of
standardized audio/video codecs. The container file is used to identify and interleave the different data types.
Simpler container formats can contain different types of audio codecs, while more advanced container formats
can support multiple audio and video streams, subtitles, chapter-information, and meta-data (tags) - along
with the synchronization information needed to play back the various streams together.”
LOSSLESS
Data compression without loss of information.
LOSSY
Data compression in which unnecessary information is discarded.

2
KEYWORDS 9608 – SECTION 1

CHAPTER 2

CLIENT-SERVER MODEL
The client–server model of computing is a distributed application structure that partitions tasks or workloads
between the providers of a resource or service, called servers, and service requesters, called clients.
WWW
The World Wide Web (WWW) is a network of online content that is formatted in HTML and accessed via HTTP.
The term refers to all the interlinked HTML pages that can be accessed over the Internet.
INTERNET
A global computer network providing a variety of information and communication facilities, consisting of
interconnected networks using standardized communication protocols.
HARDWARE
Networking hardware are physical devices which are required for communication and interaction between
devices on a computer network. Specifically, they mediate data in a computer network.
NETWORKS
A computer network is a set of computers connected together for the purpose of sharing resources. The most
common resource shared today is connection to the Internet. Other shared resources can include a printer or
a file server.
ROUTERS
In packet-switched networks such as the Internet, a router is a device or, in some cases, software in a
computer, that determines the next network point to which a packet should be forwarded toward its
destination. A router is located at any gateway (where one network meets
GATEWAYS
A gateway is a hardware device that acts as a "gate" between two different networks. It may be a router,
firewall, server, or other device that enables traffic to flow in and out of the network.
SERVERS
A server is a software program, or the computer on which that program runs, that provides a specific kind of
service to client software running on the same computer or other computers on a network.
COMMUNICATION SYSTEMS
In telecommunication, a communications system is a collection of individual communications networks,
transmission systems, relay stations, tributary stations, and data terminal equipment (DTE) usually capable of
interconnection and interoperation to form an integrated whole.
PSTN
The public switched telephone network (PSTN) is the aggregate of the world's circuit-switched telephone
networks that are operated by national, regional, or local telephony operators, providing infrastructure and
services for public telecommunication
DEDICATED LINES
In computer networks and telecommunications, a dedicated line is a communications cable or other
facility dedicated to a specific application.
CELL PHONE NETWORKS
A cellular network or mobile network is a communication network where the last link is wireless.
The network is distributed over land areas called cells, each served by at least one fixed-location transceiver,
known as a cell site or base station.
COPPER CABLE
FIBRE-OPTIC CABLING
A fiber optic cable consists of a bundle of glass threads, each of which is capable of transmitting messages
modulated onto light waves.
RADIO WAVES
An electromagnetic wave of a frequency used for long-distance communication.
MICROWAVES
Microwave transmission is the transmission of information or energy by electromagnetic waves whose
wavelengths are measured in small numbers of centimeter.
SATELLITES
A satellite is an artificial object which has been intentionally placed into orbit.
BIT STREAMING
A bit stream is a sequence of bits.
REAL-TIME
Streaming a video that is happening at that exact moment. (e.g. football match, concert)
3
KEYWORDS 9608 – SECTION 1

VIDEO ON-DEMAND
Is a system that may allow users to select and watch video when they choose to.
BIT RATES/BROADBAND
Is a term used to describe the amount of data that is being passed within a given amount of time. Common
measurements of bit rate include Kbps and Mbps. The higher number indicates high speed or high quality.
IP ADDRESS
Is an exclusive number that all IT devices (printers, routers, modems, etc.) use which identifies and allows the
ability to communicate with each other on a computer network.
PUBLIC IP ADDRESS
Is assigned to every computer that connects to the Internet, where each IP is unique.
PRIVATE IP ADDRESS
The IP number falls within one of the IP address ranges reserved for private networks such as a LAN. Used for
numbering the computers in a private network including home, school and business LANs.
URL
Uniform Resource Locator: used to locate a resource on the Web.
DNS
Domain Name System: Is a standard technology for managing public names of Websites and other Internet
domains. A key element of the DNS is a worldwide collection of DNS servers.
CLIENT COMPUTER
A client computer is an individual computer that accesses the information and programs stored on a server as
part of a network environment.
WEB SERVER
A web server is an information technology that processes requests via HTTP, the basic network protocol used
to distribute information on the World Wide Web.
HTML TAGS
HTML is a structured hierarchical language that requires you to follow its rules if you wish your documents to
appear correctly. For example, certain elements and tags are required to fit within other elements and tags
and will not work unless they are properly placed.
<HTML>...</HTML>, <HEAD>...</HEAD>, <BODY>...</BODY>
BROWSER
A computer program with a graphical user interface for displaying HTML files, used to navigate the World Wide
Web.
CLIENT-SIDE
The client is the system on which the Web browser is running.
JAVASCRIPT CODE
JavaScript is the main client-side scripting language for the Web. Client-side scripts are interpreted by the
browser.
EMBEDDED CLIENT-SIDE CODE
Client-side scripts are often embedded within an HTML document. but they may also be contained in a
separate file, to which the document (or documents) that use it make reference.
SERVER-SIDE
Is where the Web page and other contents lives. The server sends pages to the client on request.
PHP CODE
Common scripting language for Server.
SERVER-SIDE SCRIPTING
Server-side scripting is often used to provide a customized interface for the user. These scripts may assemble
client characteristics for use in customizing the response based on those characteristics, the user's
requirements, access rights.

4
KEYWORDS 9608 – SECTION 1

CHAPTER 3

INPUT DEVICES
Used to enter data into the computer.
OUTPUT DEVICES
Show results of the process.
STORAGE DEVICES
Store data and programs.
KEYBOARD
TRACKERBALL MOUSE
LASER MOUSE
SCANNER
INKJET PRINTER
LASER PRINTER
SPEAKERS
HARD DISK
FLASH MEMORY
OPTICAL DISKS
SENSORS
A sensor measures a specific property data and sends a signal to the computer. They can produce a stream of
input data automatically without any human intervention.
ACTUATORS
An actuator is a type of motor that is responsible for moving or controlling a mechanism or system.
PRIMARY MEMORY
Is computer memory that a processor or computer accesses first or directly. It allows a processor to access
running execution applications and services that are temporarily stored in a specific memory location. Primary
memory is also known as primary storage or main memory.
SECONDARY MEMORY
Secondary memory (or secondary storage) is the slowest and cheapest form of memory. It cannot be
processed directly by the CPU. It must first be copied into primary storage (also known as RAM).
MAIN MEMORY
See Primary Memory.
RAM
Random Access Memory, a type of computer memory that can be accessed randomly. RAM is the most
common type of memory found in computers and other devices, such as printers.
ROM
Read-Only Memory is a type of storage medium that permanently stores data on personal computers (PCs)
and other electronic devices. It contains the programming needed to start a PC, which is essential for boot-up;
it performs major input/output tasks and holds programs or software instructions.
STATIC RAM (SRAM)
SRAM (static RAM) is random access memory (RAM) that retains data bits in its memory as long as power is
being supplied. Static RAM provides faster access to data and is more expensive than DRAM.
DYNAMIC RAM (DRAM)
Dynamic random access memory (DRAM) is a type of memory that is typically used for data or program code
that a computer processor needs to function. DRAM is a common type of random access memory (RAM) used
in personal computers (PCs), workstations and servers.
LOGIC GATES
An integrated circuit or other device whose inputs and outputs represent Boolean or binary values as voltages.

5
KEYWORDS 9608 – SECTION 1

CHAPTER 4

CPU ARCHITECTURE
Computer architecture is a specification detailing how a set of software and hardware technology standards
interact to form a computer system or platform. In short, computer architecture refers to how a computer
system is designed and what technologies it is compatible with.
VON NEUMANN MODEL
Introduced the idea of the Stored Program. Data and programs use the same memory.
STORED PROGRAM CONCEPT
Is one that keeps the programmed instructions, as well as its data, in read-write RAM.
REGISTER
Is one of a small set of data holding places that are part of a computer processor.
GENERAL PURPOSE REGISTERS
General purpose registers (GPR) are not used for storing any specific type of information. Instead operands as
well as addresses are stored at the time of program execution.
SPECIAL PURPOSE REGISTERS
A special purpose register is one that has a specific control or data handling task to carry out.
PC REGISTER
MDR REGISTER
MAR REGISTER
IR REGISTER
CIR REGISTER
SR REGISTER
FETCH-EXECUTE CYCLE
An instruction cycle (sometimes called fetch-decode-execute cycle) is the basic operation cycle of a computer.
It is the process by which a computer retrieves a program instruction from its memory, determines what
actions the instruction requires, and carries out those actions.
REGISTER TRANSFER NOTATION
INTERRUPTS
Stop the continuous progress of an activity or process.
PROCESSOR’S INSTRUCTION SET
An instruction set, or instruction set architecture (ISA), is the part of the computer architecture related to
programming, including the native data types, instructions, registers, addressing modes, memory architecture,
interrupt and exception handling, and external I/O.
DATA MOVEMENT
Data movement instructions move data from one location to another. The source and destination locations are
determined by the addressing modes, and can be registers or memory.
INPUT AND OUTPUT OF DATA
An input is data that a computer receives. An output is data that a computer sends.
ARITHMETIC OPERATIONS
An arithmetic operator is a mathematical function that takes two operands and performs a calculation on
them. They are used in common arithmetic and most computer languages contain a set of such operators that
can be used within equations to perform a number of types of sequential calculation.
UNCONDITIONAL JUMP INSTRUCTIONS
An unconditional jump always occurs. There is no conditions to check.
CONDITIONAL JUMP INSTRUCTIONS
When a conditional jump occurs, a condition is checked. If the condition is true, then the jump occurs. A jump
means updating the PC with the instruction to execute, which in turn causes that instruction to be fetched and
run.
MODES OF PROCESSING
Data processing modes or computing modes are classifications of different types of computer processing
IMMEDIATE
DIRECT
INDIRECT
INDEXED
RELATIVE

6
KEYWORDS 9608 – SECTION 1

ASSEMBLY LANGUAGE
A low-level symbolic code converted by an assembler.
MACHINE CODE
Machine code or machine language is a set of instructions executed directly by a computer's central processing
unit (CPU). Each instruction performs a very specific task, such as a load, a jump, or an ALU operation on a unit
of data in a CPU register or memory.
SYMBOLIC ADDRESSING
An addressing scheme whereby reference to an address is made by some convenient symbol that has some
relationship to the meaning of the data expected to be located at that address. It serves as an aid to the
programmer.
ABSOLUTE ADDRESSING
An explicit identification of hardware, such as a memory location, peripheral device, or location within a
device.
MACROS
A macro is a fragment of code which has been given a name. Whenever the name is used, it is replaced by the
contents of the macro.
TWO-PASS ASSEMBLER
This is known as a two-pass assembler. Each pass scans the program, the first passgenerates the symbol table
and the second pass generates the machine code.

7
KEYWORDS 9608 – SECTION 1

CHAPTER 5

OPERATING SYSTEM
An operating system (OS) is system software that manages computer hardware and software resources and
provides common services for computer programs.
UTILITY PROGRAMS
Is system software designed to help analyze, configure, optimize or maintain a computer.
DISK FORMATTER
Is the process of preparing a data storage device such as a hard disk drive, solid-state drive, floppy disk or USB
flash drive for initial use.
VIRUS CHECKER
Is computer software used to prevent, detect and remove malicious software.
DEFRAGMENTER SOFTWARE
Disk defragmentation is the process of consolidating fragmented data on a volume (such as a hard disk or a
storage device) so it will work more efficiently. Fragmentation happens to a volume over time as you save,
change, or delete files.
FILE COMPRESSION
File compression is a data compression method in which the logical size of a file is reduced to save disk space
for easier and faster transmission over a network or the Internet. It enables the creation of a version of one or
more files with the same data at a size substantially smaller than the original file.
BACKUP SOFTWARE
Backup software are computer programs used to perform backup; they create supplementary exact copies of
files, databases or entire computers. These programs may later use the supplementary copies to restore the
original contents in the event of data loss.
LIBRARY PROGRAMS
A collection of standard programs and subroutines that are stored and available for immediate use
DYNAMIC LINK LIBRARY (DLL)
A dynamic-link library (DLL) file is an executable file that allows programs to share code and other resources
necessary to perform particular tasks. Microsoft Windows provides DLL files that contain functions and
resources that allow Windows-based programs to operate in the Windows environment.
LANGUAGE TRANSLATORS
A translator is a computer program that performs the translation of a program written in a given
programming language into a functionally equivalent program in a different computer language, without losing
the functional or logical structure of the original code
ASSEMBLER
A program for converting instructions written in low-level symbolic code into machine code.
COMPILER
A compiler is a computer program (or a set of programs) that transforms source code written in a
programming language (the source language) into another computer language (the target language), with the
latter often having a binary form known as object code.
INTERPRETER
Computer language processor that translates a program line-by-line (statement-by-statement) and carries out
the specified actions in sequence.

8
KEYWORDS 9608 – SECTION 1

CHAPTER 6

DATA SECURITY
Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to
computers, databases and websites. Data security also protects data from corruption.
SECURITY
Is the protection of information systems from theft or damage to the hardware, the software, and to the
information on them, as well as from disruption or misdirection of the services they provide.
PRIVACY
Information privacy is the privacy of personal information and usually relates to personal data stored on
computer systems. The need to maintain information privacy is applicable to collected personal information,
such as medical records, financial data, criminal records.
INTEGRITY
Refers to the overall completeness, accuracy and consistency of data.
USER ACCOUNTS
A user account is a collection of information that tells Windows which files and folders you can access, what
changes you can make to the computer, and your personal preferences, such as your desktop background or
screen saver.
FIREWALLS
Protect a network or system from unauthorized access with a firewall.
AUTHENTICATION
Authentication is any process by which a system verifies the identity of a User who wishes to access it. Since
Access Control is normally based on the identity of the User who requests access to a resource,
Authentication is essential to effective Security.
PASSWORDS
a string of characters that allows access to a computer, interface, or system.
DIGITAL SIGNATURES
A digital code (generated and authenticated by public key encryption) which is attached to an electronically
transmitted document to verify its contents and the sender's identity.
DATA BACKUP
A data backup is the result of copying or archiving files and folders for the purpose of being able to restore
them in case of data loss. Data loss can be caused by many things ranging from computer viruses to hardware
failures to file corruption to fire, flood, or theft (etc).
DISK-MIRRORING SYSTEM
Disk mirroring is the replication of logical disk volumes onto separate physical hard disks in real time to ensure
continuous availability.
ENCRYPTION
Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access
to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted
data is referred to as cipher text.
ACCESS RIGHTS
The permissions that are granted to a user, or to an application, to read, write and erase files in the computer.
DATA INTEGRITY
Data integrity refers to the overall completeness, accuracy and consistency of data.
DATA VALIDATION
Is the process of ensuring that a program operates on clean, correct and useful data. It uses routines, often
called "validation rules" "validation constraints" or "check routines", that check for correctness,
meaningfulness, and security of data that are input to the system.
DATA VERIFICATION
Is a process in which different types of data are checked for accuracy and inconsistencies after data migration
is done. It helps to determine whether data was accurately translated when data is transferred from one
source to another, is complete, and supports processes in the new system.
PARITY CHECK
A parity bit, or check bit is a bit added to the end of a string of binary code that indicates whether the number
of bits in the string with the value one is even or odd. Parity bits are used as the simplest form of error
detecting code. There are two variants of parity bits: even parity bit and odd parity bit.
CHECKSUM CHECK
Is a simple type of redundancy check that is used to detect errors in data, when transmitted across a network.
9
KEYWORDS 9608 – SECTION 1

CHAPTER 7

ETHICS
ACM/IEEE SOFTWARE ENGINEERING CODE
According to IEEE's definition software engineering can be defined as the application of a systematic,
disciplined, quantifiable approach to the development, operation, and maintenance of software, and the study
of these approaches; that is, the application of engineering to software.
OWNERSHIP
the act, state, or right of possessing something
COPYRIGHT OF SOFTWARE
Software copyright is used by proprietary software companies to prevent the unauthorized copying of
their software.
LEGISLATION
FREE SOFTWARE FOUNDATION
Is a non-profit organization to support the free software movement, which promotes the universal freedom to
study, distribute, create, and modify computer software,[4]
OPEN SOURCE INITIATIVE
The Open Source Initiative (OSI) is an organization dedicated to promoting open-source software.
SHAREWARE SOFTWARE
Shareware is a type of proprietary software which is provided (initially) free of charge to users, who are
allowed and encouraged to make and share copies of the program, which helps to distribute it. Shareware is
often offered as a download from an Internet website or as a compact disc included with a magazine.
COMMERCIAL SOFTWARE
Commercial software is any software or program that is designed and developed for licensing or sale to end
users or that serves a commercial purpose. Commercial software was once considered to be proprietary
software, but now a number of free and open-source software applications are licensed or sold to end users.

10
KEYWORDS 9608 – SECTION 1

CHAPTER 8

DBMS
A database management system (DBMS) is a computer software application that interacts with the user, other
applications, and the database itself to capture and analyze data. A general-purpose DBMS is designed to allow
the definition, creation, querying, update, and administration of databases.
FILE-BASED APPROACH
A collection of application programs that perform services for the end-users such as the production of reports.
Each program defines and manages its own data.File-Based Approach
RELATIONAL DATABASE
A database structured to recognize relations between stored items of information.
DATA MANAGEMENT
Data management is the process of controlling the information generated during a research project.
DATA DICTIONARY
A set of information describing the contents, format, and structure of a database and the relationship between
its elements, used to control access to and manipulation of the database.
DATA MODELLING
Data modeling is often the first step in database design and object-oriented programming as the designers first
create a conceptual model of how data items relate to each other.
LOGICAL SCHEMA
A logical schema is a data model of a specific problem domain expressed in terms of a particular data
management technology.
DATA INTEGRITY
Data integrity refers to the overall completeness, accuracy and consistency of data.
DATA SECURITY (BACKUP, ACCESS RIGHTS)
SOFTWARE TOOLS:
DEVELOPER INTERFACE
Is a program enabling a programmer to communicate with a computer.
QUERY PROCESSOR
The query processor is the subcomponent of the data server that processes SQL requests. The SQL requests
can access a single database or file system or reference multiple types of databases or file systems.
ENTITY
Is a person, thing, place, object, event.
TABLE
Contains group of entities that is an entity set.
TUPLE
A table row.
ATTRIBUTE
A table column.
PRIMARY KEY
A primary key is a special relational database table column (or combination of columns) designated to uniquely
identify all table records. A primary key's main features are: It must contain a unique value for each row of
data. It cannot contain null values.
CANDIDATE KEY
A candidate key is a column, or set of columns, in a table that can uniquely identify any database record
without referring to any other data. Each table may have one or more candidate keys, but one candidate key is
special, and it is called the primary key.
FOREIGN KEY
A foreign key is a field (or collection of fields) in one table that uniquely identifies a row of another table. In
simpler words, the foreign key is defined in a second table, but it refers to the primary key in the first table.
RELATIONSHIP
A relationship, in the context of databases, is a situation that exists between two relational database tables
when one table has a foreign key that references the primary key of the other table. Relationships allow
relational databases to split and store data in different tables, while linking disparate data items.
REFERENTIAL INTEGRITY
Referential integrity is a relational database concept, which states that table relationships must always be
consistent. In other words, any foreign key field must agree with the primary key that is referenced by the
foreign key.
11
KEYWORDS 9608 – SECTION 1

SECONDARY KEY
A maximum of 20 distinct fields can be used to define a primary key. The number of fields used in the
primary key limits the number of fields in the secondary keys. Fields used by one key can also be used in
another key; however, no more than 20 unique fields can be used to create primary or secondary keys.
E-R DIAGRAM
An entity-relationship diagram (ERD) is a data modeling technique that graphically illustrates an information
system's entities and the relationships between those entities.
1NF
First normal form (1NF) is a property of a relation in a relational database. A relation is in first normal form if
and only if the domain of each attribute contains only atomic (indivisible) values, and the value of each
attribute contains only a single value from that domain.
2NF
Second normal form (2NF) is a normal form used in database normalization. 2NF was originally defined by E.F.
Codd in 1971. A table that is in first normal form (1NF) must meet additional criteria if it is to qualify for second
normal form.
3NF
The third normal form (3NF) is a normal form used in database normalization. 3NF was originally defined by
E.F. Codd in 1971. Codd's definition states that a table is in 3NF if and only if both of the following conditions
hold: The relation R (table) is in second normal form (2NF)
DLL
A data definition language (DDL) is a computer language used to create and modify the structure of database
objects in a database. These database objects include views, schemas, tables, indexes, etc.
DML
A data manipulation language (DML) is a family of syntax elements similar to a computer programming
language used for selecting, inserting, deleting and updating data in a database. Performing read-only queries
of data is sometimes also considered a component of DML.
SQL
Structured Query Language (SQL) is a standard computer language for relational database management and
data manipulation. SQL is used to query, insert, update and modify data.

12

You might also like