2023年全國(guó)碩士研究生考試考研英語(yǔ)一試題真題(含答案詳解+作文范文)_第1頁(yè)
已閱讀1頁(yè),還剩10頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、<p><b>  外文資料</b></p><p>  Database Management Systems</p><p>  A database (sometimes spelled data base) is also called an electronic database , referring to any collection of

2、data, or information, that is specially organized for rapid search and retrieval by a computer. Databases are structured to facilitate the storage, retrieval , modification, and deletion of data in conjunction with vario

3、us data-processing operations .Databases can be stored on magnetic disk or tape, optical disk, or some other secondary storage device.</p><p>  A database consists of a file or a set of files. The informatio

4、n in these files may be broken down into records, each of which consists of one or more fields. Fields are the basic units of data storage , and each field typically contains information pertaining to one aspect or attr

5、ibute of the entity described by the database . Using keywords and various sorting commands, users can rapidly search , rearrange, group, and select the fields in many records to retrieve or create reports on particu<

6、;/p><p>  Complex data relationships and linkages may be found in all but the simplest databases .The system software package that handles the difficult tasks associated with creating ,accessing, and maintainin

7、g database records is called a database management system(DBMS).The programs in a DBMS package establish an interface between the database itself and the users of the database.. (These users may be applications programme

8、rs, managers and others with information needs, and various OS programs.)</p><p>  A DBMS can organize, process, and present selected data elements form the database. This capability enables decision makers

9、 to search, probe, and query database contents in order to extract answers to nonrecurring and unplanned questions that aren’t available in regular reports. These questions might initially be vague and/or poorly defined

10、 ,but people can “browse” through the database until they have the needed information. In short, the DBMS will “manage” the stored data items and assemble t</p><p>  A database management system (DBMS) is co

11、mposed of three major parts:(1)a storage subsystem that stores and retrieves data in files;(2) a modeling and manipulation subsystem that provides the means with which to organize the data and to add , delete, maintain,

12、and update the data;(3)and an interface between the DBMS and its users. Several major trends are emerging that enhance the value and usefulness of database management systems;</p><p>  Managers: who require

13、more up-to-data information to make effective decision</p><p>  Customers: who demand increasingly sophisticated information services and more current information about the status of their orders, invoices,

14、and accounts.</p><p>  Users: who find that they can develop custom applications with database systems in a fraction of the time it takes to use traditional programming languages.</p><p>  Organ

15、izations : that discover information has a strategic value; they utilize their database systems to gain an edge over their competitors.</p><p>  The Database Model</p><p>  A data model describe

16、s a way to structure and manipulate the data in a database. The structural part of the model specifies how data should be represented(such as tree, tables, and so on ).The manipulative part of the model specifies the op

17、eration with which to add, delete, display, maintain, print, search, select, sort and update the data.</p><p>  Hierarchical Model </p><p>  The first database management systems used a hierarch

18、ical model-that is-they arranged records into a tree structure. Some records are root records and all others have unique parent records. The structure of the tree is designed to reflect the order in which the data will b

19、e used that is ,the record at the root of a tree will be accessed first, then records one level below the root ,and so on.</p><p>  The hierarchical model was developed because hierarchical relationships are

20、 commonly found in business applications. As you have known, an organization char often describes a hierarchical relationship: top management is at the highest level, middle management at lower levels, and operational em

21、ployees at the lowest levels. Note that within a strict hierarchy, each level of management may have many employees or levels of employees beneath it, but each employee has only one manager. Hierarchical d</p><

22、;p>  In the hierarchical approach, each relationship must be explicitly defined when the database is created. Each record in a hierarchical database can contain only one key field and only one relationship is allowed

23、between any two fields. This can create a problem because data do not always conform to such a strict hierarchy.</p><p>  Relational Model </p><p>  A major breakthrough in database research occ

24、urred in 1970 when E. F. Codd proposed a fundamentally different approach to database management called relational model ,which uses a table as its data structure.</p><p>  The relational database is the mo

25、st widely used database structure. Data is organized into related tables. Each table is made up of rows called and columns called fields. Each record contains fields of data about some specific item. For example, in a ta

26、ble containing information on employees, a record would contain fields of data such as a person’s last name ,first name ,and street address.</p><p>  Structured query language(SQL)is a query language for man

27、ipulating data in a relational database .It is nonprocedural or declarative, in which the user need only specify an English-like description that specifies the operation and the described record or combination of records

28、. A query optimizer translates the description into a procedure to perform the database manipulation.</p><p>  Network Model</p><p>  The network model creates relationships among data through a

29、 linked-list structure in which subordinate records can be linked to more than one parent record. This approach combines records with links, which are called pointers. The pointers are addresses that indicate the locatio

30、n of a record. With the network approach, a subordinate record can be linked to a key record and at the same time itself be a key record linked to other sets of subordinate records. The network mode historically has had

31、</p><p>  Both hierarchical and network databases are application specific. If a new application is developed ,maintaining the consistency of databases in different applications can be very difficult. For e

32、xample, suppose a new pension application is developed .The data are the same, but a new database must be created.</p><p>  Object Model </p><p>  The newest approach to database management uses

33、 an object model , in which records are represented by entities called objects that can both store data and provide methods or procedures to perform specific tasks.</p><p>  The query language used for the o

34、bject model is the same object-oriented programming language used to develop the database application .This can create problems because there is no simple , uniform query language such as SQL . The object model is relati

35、vely new, and only a few examples of object-oriented database exist. It has attracted attention because developers who choose an object-oriented programming language want a database based on an object-oriented model.<

36、/p><p>  Distributed Database</p><p>  Similarly , a distributed database is one in which different parts of the database reside on physically separated computers . One goal of distributed database

37、s is the access of information without regard to where the data might be stored. Keeping in mind that once the users and their data are separated , the communication and networking concepts come into play .</p>

38、<p>  Distributed databases require software that resides partially in the larger computer. This software bridges the gap between personal and large computers and resolves the problems of incompatible data formats.

39、 Ideally, it would make the mainframe databases appear to be large libraries of information, with most of the processing accomplished on the personal computer.</p><p>  A drawback to some distributed systems

40、 is that they are often based on what is called a mainframe-entire model , in which the larger host computer is seen as the master and the terminal or personal computer is seen as a slave. There are some advantages to th

41、is approach . With databases under centralized control , many of the problems of data integrity that we mentioned earlier are solved . But today’s personal computers, departmental computers, and distributed processing r

42、equire computers and t</p><p>  One way to take advantage of many connected computers running database applications is to distribute the application into cooperating parts that are independent of one anther

43、. A client is an end user or computer program that requests resources across a network. A server is a computer running software that fulfills those requests across a network . When the resources are data in a database ,t

44、he client/server model provides the framework for distributing database.</p><p>  A file serve is software that provides access to files across a network. A dedicated file server is a single computer dedicat

45、ed to being a file server. This is useful ,for example ,if the files are large and require fast access .In such cases, a minicomputer or mainframe would be used as a file server. A distributed file server spreads the fil

46、es around on individual computers instead of placing them on one dedicated computer.</p><p>  Advantages of the latter server include the ability to store and retrieve files on other computers and the elimin

47、ation of duplicate files on each computer. A major disadvantage , however, is that individual read/write requests are being moved across the network and problems can arise when updating files. Suppose a user requests a

48、record from a file and changes it while another user requests the same record and changes it too. The solution to this problems called record locking, which means that</p><p>  A database server is software

49、that services requests to a database across a network. For example, suppose a user types in a query for data on his or her personal computer . If the application is designed with the client/server model in mind ,the que

50、ry language part on the personal computer simple sends the query across the network to the database server and requests to be notified when the data are found.</p><p>  Examples of distributed database syste

51、ms can be found in the engineering world. Sun’s Network Filing System(NFS),for example, is used in computer-aided engineering applications to distribute data among the hard disks in a network of Sun workstation.</p>

52、;<p>  Distributing databases is an evolutionary step because it is logical that data should exist at the location where they are being used . Departmental computers within a large corporation ,for example, should

53、 have data reside locally , yet those data should be accessible by authorized corporate management when they want to consolidate departmental data . DBMS software will protect the security and integrity of the database ,

54、 and the distributed database will appear to its users as no different fro</p><p>  In this information age, the data server has become the heart of a company. This one piece of software controls the rhythm

55、of most organizations and is used to pump information lifeblood through the arteries of the network. Because of the critical nature of this application, the data server is also the one of the most popular targets for hac

56、kers. If a hacker owns this application, he can cause the company's "heart" to suffer a fatal arrest.</p><p>  Ironically, although most users are now aware of hackers, they still do not realiz

57、e how susceptible their database servers are to hack attacks. Thus, this article presents a description of the primary methods of attacking database servers (also known as SQL servers) and shows you how to protect yourse

58、lf from these attacks. </p><p>  You should note this information is not new. Many technical white papers go into great detail about how to perform SQL attacks, and numerous vulnerabilities have been posted

59、to security lists that describe exactly how certain database applications can be exploited. This article was written for the curious non-SQL experts who do not care to know the details, and as a review to those who do us

60、e SQL regularly. </p><p>  What Is a SQL Server?</p><p>  A database application is a program that provides clients with access to data. There are many variations of this type of application, ra

61、nging from the expensive enterprise-level Microsoft SQL Server to the free and open source mySQL. Regardless of the flavor, most database server applications have several things in common. </p><p>  First, d

62、atabase applications use the same general programming language known as SQL, or Structured Query Language. This language, also known as a fourth-level language due to its simplistic syntax, is at the core of how a client

63、 communicates its requests to the server. Using SQL in its simplest form, a programmer can select, add, update, and delete information in a database. However, SQL can also be used to create and design entire databases, p

64、erform various functions on the returned information</p><p>  To illustrate how SQL can be used, the following is an example of a simple standard SQL query and a more powerful SQL query: </p><p>

65、;  Simple: "Select * from dbFurniture.tblChair"</p><p>  This returns all information in the table tblChair from the database dbFurniture.</p><p>  Complex: "EXEC master..xp_cmdsh

66、ell 'dir c:\'"</p><p>  This short SQL command returns to the client the list of files and folders under the c:\ directory of the SQL server. Note that this example uses an extended stored proce

67、dure that is exclusive to MS SQL Server. </p><p>  The second function that database server applications share is that they all require some form of authenticated connection between client and host. Although

68、 the SQL language is fairly easy to use, at least in its basic form, any client that wants to perform queries must first provide some form of credentials that will authorize the client; the client also must define the fo

69、rmat of the request and response.</p><p>  This connection is defined by several attributes, depending on the relative location of the client and what operating systems are in use. We could spend a whole art

70、icle discussing various technologies such as DSN connections, DSN-less connections, RDO, ADO, and more, but these subjects are outside the scope of this article. If you want to learn more about them, a little Google'

71、ing will provide you with more than enough information. However, the following is a list of the more common items includ</p><p>  Database source </p><p>  Request type </p><p><

72、b>  Database </b></p><p><b>  User ID </b></p><p><b>  Password</b></p><p>  Before any connection can be made, the client must define what type of

73、database server it is connecting to. This is handled by a software component that provides the client with the instructions needed to create the request in the correct format. In addition to the type of database, the req

74、uest type can be used to further define how the client's request will be handled by the server. Next comes the database name and finally the authentication information.</p><p>  All the connection inform

75、ation is important, but by far the weakest link is the authentication information—or lack thereof. In a properly managed server, each database has its own users with specifically designated permissions that control what

76、type of activity they can perform. For example, a user account would be set up as read only for applications that need to only access information. Another account should be used for inserts or updates, and maybe even a t

77、hird account would be used for dele</p><p><b>  譯文</b></p><p><b>  數(shù)據(jù)庫(kù)管理系統(tǒng)介紹</b></p><p>  數(shù)據(jù)庫(kù)(database,有時(shí)拼作data base)又稱為電子數(shù)據(jù)庫(kù),是專門組織起來(lái)的一組數(shù)據(jù)或信息,其目的是為了便于計(jì)算機(jī)快速查詢

78、及檢索。數(shù)據(jù)庫(kù)的結(jié)構(gòu)是專門設(shè)計(jì)的,在各種數(shù)據(jù)處理操作命令的支持下,可以簡(jiǎn)化數(shù)據(jù)的存儲(chǔ),檢索,修改和刪除。數(shù)據(jù)庫(kù)可以存儲(chǔ)在磁盤,磁帶,光盤或其他輔助存儲(chǔ)設(shè)備上。</p><p>  數(shù)據(jù)庫(kù)由一個(gè)或一套文件組成,其中的信息可以分解為記錄,每一記錄又包含一個(gè)或多個(gè)字段(或稱為域)。字段是數(shù)據(jù)存取的基本單位。數(shù)據(jù)庫(kù)用于描述實(shí)體,其中的一個(gè)字段通常表示與實(shí)體的某一屬性相關(guān)的信息。通過(guò)關(guān)鍵字以及各種分類(排序)命令,用戶可以

79、對(duì)多條記錄的字段進(jìn)行查詢,重新整理,分組或選擇,以實(shí)體對(duì)某一類數(shù)據(jù)的檢索,也可以生成報(bào)表。</p><p>  所有數(shù)據(jù)庫(kù)(最簡(jiǎn)單的除外)中都有復(fù)雜的數(shù)據(jù)關(guān)系及其鏈接。處理與創(chuàng)建,訪問(wèn)以及維護(hù)數(shù)據(jù)庫(kù)記錄有關(guān)的復(fù)雜任務(wù)的系統(tǒng)軟件包叫做數(shù)據(jù)庫(kù)管理系統(tǒng)(DBMS)。DBMS軟件包中的程序在數(shù)據(jù)庫(kù)與其用戶間建立接口。(這些用戶可以是應(yīng)用程序員,管理員及其他需要信息的人員和各種操作系統(tǒng)程序)。</p><

80、;p>  DBMS可組織,處理和表示從數(shù)據(jù)庫(kù)中選出的數(shù)據(jù)元。該功能使決策者能搜索,探查和查詢數(shù)據(jù)庫(kù)的內(nèi)容,從而對(duì)在正規(guī)報(bào)告中沒(méi)有的,不再出現(xiàn)的且無(wú)法預(yù)料的問(wèn)題做出回答。這些問(wèn)題最初可能是模糊的并且(或者)是定義不恰當(dāng)?shù)?,但是人們可以瀏覽數(shù)據(jù)庫(kù)直到獲得所需的信息。簡(jiǎn)言之,DBMS將“管理”存儲(chǔ)的數(shù)據(jù)項(xiàng),并從公共數(shù)據(jù)庫(kù)中匯集所需的數(shù)據(jù)項(xiàng)以回答非程序員的詢問(wèn)。</p><p>  DBMS由3個(gè)主要部分組成:(1

81、)存儲(chǔ)子系統(tǒng),用來(lái)存儲(chǔ)和檢索文件中的數(shù)據(jù);(2)建模和操作子系統(tǒng),提供組織數(shù)據(jù)以及添加,刪除,維護(hù),更新數(shù)據(jù)的方法;(3)用戶和DBMS之間的接口。在提高數(shù)據(jù)庫(kù)管理系統(tǒng)的價(jià)值和有效性方面正在展現(xiàn)以下一些重要發(fā)展趨勢(shì);</p><p>  1.管理人員需要最新的信息以做出有效的決策。</p><p>  2.客戶需要越來(lái)越復(fù)雜的信息服務(wù)以及更多的有關(guān)其訂單,發(fā)票和賬號(hào)的當(dāng)前信息。</p

82、><p>  3.用戶發(fā)現(xiàn)他們可以使用傳統(tǒng)的程序設(shè)計(jì)語(yǔ)言,在很短的一段時(shí)間內(nèi)用數(shù)據(jù)庫(kù)系統(tǒng)開(kāi)發(fā)客戶應(yīng)用程序。</p><p>  4.商業(yè)公司發(fā)現(xiàn)了信息的戰(zhàn)略價(jià)值,他們利用數(shù)據(jù)庫(kù)系統(tǒng)領(lǐng)先于競(jìng)爭(zhēng)對(duì)手。</p><p><b>  數(shù)據(jù)庫(kù)模型</b></p><p>  數(shù)據(jù)庫(kù)模型描述了在數(shù)據(jù)庫(kù)中結(jié)構(gòu)化和操縱數(shù)據(jù)的方法,模型的結(jié)構(gòu)

83、部分規(guī)定了數(shù)據(jù)如何被描述(例如樹(shù),表等):模型的操縱部分規(guī)定了數(shù)據(jù)添加,刪除,顯示,維護(hù),打印,查找,選擇,排序和更新等操作。</p><p><b>  分層模型</b></p><p>  第一個(gè)數(shù)據(jù)庫(kù)管理系統(tǒng)使用的是分層模型,也就是說(shuō),將數(shù)據(jù)記錄排列成樹(shù)形結(jié)構(gòu)。一些記錄時(shí)根目錄,在其他所有記錄都有獨(dú)立的父記錄。樹(shù)形結(jié)構(gòu)的設(shè)計(jì)反映了數(shù)據(jù)被使用的順序,也就是首先訪問(wèn)

84、處于樹(shù)根位置的記錄,接下來(lái)是跟下面的記錄,等等。</p><p>  分層模型的開(kāi)發(fā)是因?yàn)榉謱雨P(guān)系在商業(yè)應(yīng)用中普遍存在,眾所周知,一個(gè)組織結(jié)構(gòu)圖表就描述了一種分層關(guān)系:高層管理人員在最高層,中層管理人員在較低的層次,負(fù)責(zé)具體事務(wù)的雇員在最底層。值得注意的是,在一個(gè)嚴(yán)格的分層結(jié)構(gòu)體系中,在每個(gè)管理層下可能有多個(gè)雇員或多個(gè)層次的雇員,但每個(gè)雇員只有一個(gè)管理者。分層結(jié)構(gòu)數(shù)據(jù)的典型特征是數(shù)據(jù)之間的一對(duì)多關(guān)系。</p

85、><p>  在分層方法中,當(dāng)數(shù)據(jù)庫(kù)建立時(shí),每一關(guān)系即被明確地定義。在分層數(shù)據(jù)庫(kù)中的每一記錄只能包含一個(gè)關(guān)鍵字段,任意兩個(gè)字段之間只能有一種關(guān)系。由于數(shù)據(jù)并不總是遵循這種嚴(yán)格的分層關(guān)系,所以這樣可能會(huì)出現(xiàn)一些問(wèn)題。</p><p><b>  關(guān)系模型</b></p><p>  在1970年,數(shù)據(jù)庫(kù)研究取得了重大突破。E.F.Codd提出了一種截

86、然不同的數(shù)據(jù)庫(kù)管理方法,使用表作為數(shù)據(jù)結(jié)構(gòu),稱之為關(guān)系模型.</p><p>  關(guān)系數(shù)據(jù)庫(kù)是使用最廣的數(shù)據(jù)結(jié)構(gòu),數(shù)據(jù)被組織成關(guān)系表,每個(gè)表由稱作記錄的行和稱作字段的列組成。每個(gè)記錄包含了專用項(xiàng)目的字段值。例如,在一個(gè)包含雇員信息的表中,一個(gè)記錄包含了像一個(gè)人姓名和地址這樣的字段的值。</p><p>  結(jié)構(gòu)化查詢語(yǔ)言(SQL)是一種在關(guān)系型數(shù)據(jù)庫(kù)中用于處理數(shù)據(jù)的查詢語(yǔ)言。它是非過(guò)程化語(yǔ)

87、言或者說(shuō)是描述性的,用戶只須指定一種類似于英語(yǔ)的描述,用來(lái)確定操作,記錄或描述記錄組合。查詢優(yōu)化器將這種描述翻譯為過(guò)程執(zhí)行數(shù)據(jù)庫(kù)操作。</p><p><b>  網(wǎng)狀模型</b></p><p>  網(wǎng)狀模型在數(shù)據(jù)之間通過(guò)鏈接表結(jié)構(gòu)創(chuàng)建關(guān)系,子記錄可以鏈接到多個(gè)父記錄。這種將記錄和鏈接捆綁到一起的方法叫做指針,他是指向一個(gè)記錄存儲(chǔ)位置的存儲(chǔ)地址。使用網(wǎng)狀方法,一個(gè)子

88、記錄可以鏈接到一個(gè)關(guān)鍵記錄,同時(shí),它本身也可以作為一個(gè)關(guān)鍵記錄。鏈接到其他一系列子記錄。在早期,網(wǎng)狀模型比其他模型更有性能優(yōu)勢(shì);但是在今天,這種優(yōu)勢(shì)的特點(diǎn)只有在自動(dòng)柜員機(jī)網(wǎng)絡(luò),航空預(yù)定系統(tǒng)等大容量和高速處理過(guò)程中才是最重要的。</p><p>  分層和網(wǎng)狀數(shù)據(jù)庫(kù)都是專用程序,如果開(kāi)發(fā)一個(gè)新的應(yīng)用程序,那么在不同的應(yīng)用程序中保持?jǐn)?shù)據(jù)庫(kù)的一致性是非常困難的。例如開(kāi)發(fā)一個(gè)退休金程序,需要訪問(wèn)雇員數(shù)據(jù),這一數(shù)據(jù)同時(shí)也被

89、工資單程序訪問(wèn)。雖然數(shù)據(jù)是相同的,但是也必須建立新的數(shù)據(jù)庫(kù)。</p><p><b>  對(duì)象模型</b></p><p>  最新的數(shù)據(jù)庫(kù)管理方法是使用對(duì)象模型,記錄由被稱作對(duì)象的實(shí)體來(lái)描述,可以在對(duì)象中存儲(chǔ)數(shù)據(jù),同時(shí)提供方法或程序執(zhí)行特定的任務(wù)。</p><p>  對(duì)象模型使用的查詢語(yǔ)言與開(kāi)發(fā)數(shù)據(jù)庫(kù)程序所使用的面向?qū)ο蟮某绦蛟O(shè)計(jì)語(yǔ)言是相同

90、的,因?yàn)闆](méi)有像SQL這樣簡(jiǎn)單統(tǒng)一的查詢語(yǔ)言,所以會(huì)產(chǎn)生一些問(wèn)題。對(duì)象模型相對(duì)較新,僅有少數(shù)幾個(gè)面向?qū)ο蟮臄?shù)據(jù)庫(kù)實(shí)例。它引起了人們的關(guān)注,因?yàn)檫x擇面向?qū)ο蟪绦蛟O(shè)計(jì)語(yǔ)言的開(kāi)發(fā)人員希望有一個(gè)基于在對(duì)象模型基礎(chǔ)上的數(shù)據(jù)庫(kù)。</p><p><b>  分布式數(shù)據(jù)庫(kù)</b></p><p>  類似的,分布式數(shù)據(jù)庫(kù)指的是數(shù)據(jù)庫(kù)的各個(gè)部分分別存儲(chǔ)在物理上相互分開(kāi)的計(jì)算機(jī)上。分布式

91、數(shù)據(jù)庫(kù)的一個(gè)目的是訪問(wèn)數(shù)據(jù)信息時(shí)不必考慮其他位置。注意,一旦用戶和數(shù)據(jù)分開(kāi),通信和網(wǎng)絡(luò)則開(kāi)始扮演重要角色。</p><p>  分布式數(shù)據(jù)庫(kù)需要部分常駐于大型主機(jī)上的軟件,這些軟件在大型機(jī)和個(gè)人計(jì)算機(jī)之間建立橋梁,并解決數(shù)據(jù)格式不兼容的問(wèn)題。在理想情況下,大型主機(jī)上的數(shù)據(jù)庫(kù)看起來(lái)像是一個(gè)大的信息倉(cāng)庫(kù),而大部分處理則在個(gè)人計(jì)算機(jī)上完成。</p><p>  分布式數(shù)據(jù)庫(kù)系統(tǒng)的一個(gè)缺點(diǎn)是它們常

92、以主機(jī)中心模型為基礎(chǔ),在這種模型中,大型主機(jī)看起來(lái)好像是雇主,而終端和個(gè)人計(jì)算機(jī)看起來(lái)好像是奴隸。但是這種方法也有許多優(yōu)點(diǎn):由于數(shù)據(jù)庫(kù)的集中控制,前面提到的數(shù)據(jù)完整性和安全性的問(wèn)題就迎刃而解了。當(dāng)今的個(gè)人計(jì)算機(jī),部門級(jí)計(jì)算機(jī)和分布式處理都需要計(jì)算機(jī)之間以及應(yīng)用程序之間在相等或?qū)Φ鹊幕A(chǔ)上相互通信,在數(shù)據(jù)庫(kù)中客戶機(jī)/服務(wù)器模型為分布式數(shù)據(jù)庫(kù)提供了框架結(jié)構(gòu)。</p><p>  利用相互連接的計(jì)算機(jī)上運(yùn)行的數(shù)據(jù)庫(kù)應(yīng)用

93、程序的一種方法是將程序分解為相互獨(dú)立的部分??蛻舳耸且粋€(gè)最終用戶或通過(guò)網(wǎng)絡(luò)申請(qǐng)資源的計(jì)算機(jī)程序,服務(wù)器是一個(gè)運(yùn)行著的計(jì)算機(jī)軟件,存儲(chǔ)著那些通過(guò)網(wǎng)絡(luò)傳輸?shù)纳暾?qǐng)。當(dāng)申請(qǐng)的資源是數(shù)據(jù)庫(kù)中的數(shù)據(jù)時(shí),客戶機(jī)/服務(wù)器模型則為分布式數(shù)據(jù)庫(kù)提供了框架結(jié)構(gòu)。</p><p>  文件服務(wù)器指的是一個(gè)通過(guò)網(wǎng)絡(luò)提供文件訪問(wèn)的軟件,專門的文件服務(wù)器是一臺(tái)被指定為文件服務(wù)器的計(jì)算機(jī)。這是非常有用的,例如,如果文件比較大而且需要快速訪問(wèn),在

94、這種情況下,一臺(tái)微型計(jì)算機(jī)或大型主機(jī)將被用作文件服務(wù)器。分布式文件服務(wù)器將文件分散到不同的計(jì)算機(jī)上,而不是將它們集中存放到專門的文件服務(wù)器上。</p><p>  后一種文件服務(wù)器的優(yōu)點(diǎn)包括在其他計(jì)算機(jī)上存儲(chǔ)和檢索文件的能力,并可以在每一臺(tái)計(jì)算機(jī)上消除重復(fù)文件。然而,一個(gè)重要的缺點(diǎn)是每個(gè)讀寫請(qǐng)求需要在網(wǎng)絡(luò)上傳播,在刷新文件時(shí)可能出現(xiàn)問(wèn)題。假設(shè)一個(gè)用戶申請(qǐng)文件中的一個(gè)數(shù)據(jù)并修改它,同時(shí)另外一個(gè)用戶也申請(qǐng)這個(gè)數(shù)據(jù)并修

95、改它,解決這種問(wèn)題的方法叫做數(shù)據(jù)鎖定,即第一個(gè)申請(qǐng)使其他申請(qǐng)?zhí)幱诘却隣顟B(tài),直到完成第一個(gè)申請(qǐng),其他用戶可以讀取這個(gè)數(shù)據(jù),但不能修改。</p><p>  數(shù)據(jù)庫(kù)服務(wù)器是一個(gè)通過(guò)網(wǎng)絡(luò)為數(shù)據(jù)庫(kù)申請(qǐng)?zhí)峁┓?wù)的軟件,例如,假設(shè)某個(gè)用戶在他的個(gè)人計(jì)算機(jī)上輸入了一個(gè)數(shù)據(jù)查詢命令,如果應(yīng)用程序按照客戶機(jī)/服務(wù)器模型設(shè)計(jì),那么這個(gè)人計(jì)算機(jī)上的查詢語(yǔ)言通過(guò)網(wǎng)絡(luò)傳送數(shù)據(jù)庫(kù)服務(wù)器上,當(dāng)發(fā)現(xiàn)數(shù)據(jù)時(shí)發(fā)出通知。</p><

96、;p>  在工程界也有許多分布式數(shù)據(jù)庫(kù)的例子,如SUN公司的網(wǎng)絡(luò)文件系統(tǒng)(NFS)被應(yīng)用到計(jì)算機(jī)輔助工程應(yīng)用程序中,將數(shù)據(jù)分散到由SUN工作站組成的網(wǎng)絡(luò)上的不同硬盤之間。</p><p>  分布式數(shù)據(jù)庫(kù)是革命性的進(jìn)步,因?yàn)榘褦?shù)據(jù)存放在被使用位置上是很合乎常理的。例如一個(gè)大公司不同部門之間的計(jì)算機(jī),應(yīng)該將數(shù)據(jù)存儲(chǔ)在本地,然而,當(dāng)被授權(quán)的管理人員需要整理部門數(shù)據(jù)時(shí),數(shù)據(jù)應(yīng)該能夠被訪問(wèn)。數(shù)據(jù)庫(kù)信息系統(tǒng)軟件將保護(hù)

97、數(shù)據(jù)庫(kù)的安全性和完整性,對(duì)用戶而言,分布式數(shù)據(jù)庫(kù)和非分布式數(shù)據(jù)庫(kù)看起來(lái)沒(méi)有什么差別。</p><p>  在這個(gè)信息時(shí)代,數(shù)據(jù)管理服務(wù)器已經(jīng)成為公司的核心。這一個(gè)軟件的模塊控制整個(gè)組織的順利運(yùn)行就如同人身體動(dòng)脈使得鮮血在身體中流通順暢。因?yàn)檫@個(gè)所以就要把好身份申請(qǐng)這一關(guān),數(shù)據(jù)管理服務(wù)器也是黑客最為關(guān)心的目標(biāo)之一。如果一旦自己的身份驗(yàn)證被黑客攻克,他將能引起公司的 "心臟" 遭受致命的破壞。&l

98、t;/p><p>  雖然大多數(shù)的使用者現(xiàn)在知道黑客,但是他們?nèi)匀徊涣私馑麄兊臄?shù)據(jù)庫(kù)伺候器是多么的易受影響黑客的攻擊。因此,這篇文章介紹是如何攻擊數(shù)據(jù)庫(kù)伺候器 (比如 SQL 伺候器) 和講述你在受攻擊時(shí)該如何保護(hù)你自己的數(shù)據(jù)。 </p><p>  我們應(yīng)該注意信息不斷更新。許多技術(shù)上的空白導(dǎo)致了 SQL 在運(yùn)行時(shí)很多細(xì)節(jié)被攻擊的事,而且很多的易受攻擊的地方被寄到完全地描述數(shù)據(jù)庫(kù)申請(qǐng)能是多么

99、的某開(kāi)發(fā)的安全目錄。 這個(gè)文章對(duì)那些好奇的非 SQL 專家是書面的不關(guān)心知道細(xì)節(jié),而且如檢討到那些做的人有規(guī)則地使用 SQL。 </p><p>  一個(gè) SQL 伺候器是做什么的?</p><p>  一個(gè)數(shù)據(jù)庫(kù)身份驗(yàn)證是一個(gè)提供給有權(quán)限客戶訪問(wèn)數(shù)據(jù)通道。申請(qǐng)的類型有許多變化,從大企業(yè)的微軟 SQL 伺候器到自由的和開(kāi)放來(lái)源 mySQL 排列。不管是什么,大多數(shù)的數(shù)據(jù)庫(kù)伺候器申請(qǐng)都有共同

100、的一些功能。</p><p>  首先,數(shù)據(jù)庫(kù)申請(qǐng)使用都使用相同的 SQL 的語(yǔ)言,或結(jié)構(gòu)查詢語(yǔ)言。這些語(yǔ)言,也屬于第四代語(yǔ)言,由于它單純化的語(yǔ)法,是在一位客戶如何向伺候器傳達(dá)它的請(qǐng)求核心。使用它最簡(jiǎn)單的形式語(yǔ)言 SQL ,一個(gè)程序師能選擇,增加,更新,而且在一個(gè)數(shù)據(jù)庫(kù)中能劃分各種數(shù)據(jù)。然而, SQL 也能用來(lái)產(chǎn)生并且設(shè)計(jì)整個(gè)的數(shù)據(jù)庫(kù),運(yùn)行被送回的數(shù)據(jù)上的各種不同的功能,甚至運(yùn)行其他的程序。</p>

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 眾賞文庫(kù)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論