Atomicity, Consistency, Isolation, and Durability. Properties considered compulsory in relational database theory to ensure transactions are executed correctly by an RDBMS.
Access Control List. A list maintained by the Windows operating system that is used to control which permissions users and groups have to a resource.
A component of the SQL Server Management Studio that shows what processes are currently connected to the SQL Server instance, what objects they are accessing, what locks have been acquired, and related information.
Active Directory. Information stored and used by a Windows 2003 network. Used by administrators to manage security accounts and control security.
A report in SQL Server Reporting Services that is generated by users through the Report Builder application.
A SQL Server trigger that fires after the DML operation.
A function that performs a calculation at the column level on a set of rows to return a single value. Examples of T-SQL aggregate functions include AVG, MIN, and SUM.
An adaptive, iterative method or framework for developing software.
A user-defined response to a SQL Server event.
A data type built on a system data type as a common method for referring to a particular type of data.
A SQL Server role used by the application, instead of the user, to authenticate against a database solution.
A component of a publication used in replication. Represents a table or a subset of data from the table you want to replicate.
A managed application module, composed of class metadata and managed code, that can be embedded in a database solution as a database object in SQL Server 2005.
Requires a pair of keys to encode and decode information. One key is used to encrypt the plain text, and a second key, which is part of the matched pair, is used to decrypt that cipher text.
An encryption key that is used to encrypt and decrypt data when there is no shared encryption key (secret). Implemented through a private key and public key system where the keys are related mathematically. The private key is kept secret, while the public key might be widely distributed. One key “locks” the data, and the other is required to unlock it.
See Field.
A challenge/response mechanism that ensures that a user connecting to SQL Server is authorized to do so.
A process that verifies the set of permissions granted to a user and consequently what they can do.