From the course: CompTIA Data Systems (DS0-001) Cert Prep
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Non-relational databases
From the course: CompTIA Data Systems (DS0-001) Cert Prep
Non-relational databases
- While most of the databases used by business are standard relational databases made up of tables containing rows and columns, there are other database technologies that are not relational. These non-relational databases excel at very specific tasks. We've already talked about key value stores and how they can facilitate the very fast storage and retrieval of information based upon a key index. They don't have all of the rules and overhead of a relational database, and that allows 'em to run very quickly in support of web applications and other tasks requiring a very simple database. Amazon's DynamoDB is an example of the key value store. Column oriented databases or columnar databases flip the relational model on its side and store data in columns instead of rows. This makes it easier to perform queries that retrieve a lot of data from a single column instead of entire rows. Cassandra is an example of a column oriented database. Graph databases are another type of non-relational…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Structured Query Language3m 41s
-
(Locked)
SELECT statement2m 27s
-
(Locked)
Sorting results4m 3s
-
(Locked)
Filtering data4m 1s
-
(Locked)
Aggregating data3m 8s
-
(Locked)
String manipulation2m 43s
-
(Locked)
Working with dates2m 14s
-
(Locked)
Derived values3m 16s
-
(Locked)
Set operations5m 37s
-
(Locked)
Join operations1m 58s
-
(Locked)
Inner joins7m 7s
-
(Locked)
Joining multiple tables6m 34s
-
(Locked)
Outer joins2m 55s
-
(Locked)
Transactions and the ACID model3m 48s
-
(Locked)
-
-
(Locked)
Query optimization2m 11s
-
(Locked)
Index optimization2m 5s
-
(Locked)
Patch management1m 33s
-
(Locked)
Database integrity checks2m 38s
-
(Locked)
Data corruption checks2m 21s
-
(Locked)
Audit log review2m 6s
-
(Locked)
Performance tuning3m 23s
-
(Locked)
Load balancing2m 58s
-
(Locked)
Change management3m
-
(Locked)
-
-
(Locked)
Legal and compliance risks2m 19s
-
(Locked)
Data privacy4m
-
(Locked)
General Data Protection Regulation (GDPR)7m 12s
-
(Locked)
California Consumer Privacy Act (CCPA)5m 56s
-
(Locked)
Data types1m 42s
-
(Locked)
Data classification2m 44s
-
(Locked)
Data loss prevention5m 17s
-
(Locked)
Security policies5m 7s
-
(Locked)
-
-
(Locked)
Identity and access management2m 58s
-
(Locked)
Usernames and access cards3m 23s
-
(Locked)
Biometrics2m 42s
-
(Locked)
Authentication factors3m 26s
-
(Locked)
Multifactor authentication2m 35s
-
(Locked)
Password policies4m 19s
-
(Locked)
Need to know and least privilege2m 34s
-
(Locked)
Privileged account management2m 31s
-
(Locked)