Skip to main content

标 题: 数据仓库(Data Warehouse)与数据库(Database)的区别

数据库已经在信息技术领域有了广泛的应用,我们社会生活的各个部门,几乎都有各种
各样的数据库保存着与我们的生活息息相关的各种数据。而数据仓库的建立,是为企业
所有级别的决策制定过程,提供所有类型数据支持的战略集合。它是为了巨量数据存储
、分析性报告、和决策支持等目的而创建,提供指导业务流程改进,构建商务智能。

数据仓库与数据库的区别主要在于:
1、出发点不同:数据库是面向事务的设计;数据仓库是面向主题设计的。
2、存储的数据不同:数据库通常存储在线数据;数据仓库通常存储历史数据。
3、设计规则不同:数据库设计的目的是尽量避免冗余,一般采用符合范式(
Normalization)的规则来设计;数据仓库在设计时有意引入冗余,采用反范式(De-
Normalization)的方式来设计。
4、提供的功能不同:数据库是为了记录数据而设计,数据仓库是为了分析数据而设计。
5、容量不同:数据库在基本容量上要比数据仓库小的多。
6、服务对象不同:数据库是为了高效的事务处理而设计的,服务对象为业务处理方面
的工作人员;数据仓库是为了分析数据进行决策而设计的,服务对象为高层决策人员。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...