From the course: CompTIA Data Systems (DS0-001) Cert Prep
Unlock this course with a free trial
Join today to access over 24,200 courses taught by industry experts.
Data mapping
From the course: CompTIA Data Systems (DS0-001) Cert Prep
Data mapping
- As you conclude functional and performance testing, validating the database configuration is essential to ensure operational stability. Data mapping is one of the important activities that you should undertake during your database validation process. Data mapping ensures that data elements consistently map to similar data types as data flows between the database and the systems that it interacts with. Databases are both sources of and destinations for data, and no database exists in isolation. It's essential to map data correctly when you're integrating multiple systems. Data mapping is also vital when you're migrating data from an existing database to a new one. For example, suppose you have an address table that stores postal codes as numeric data types. If you discover addresses from a legacy system have alphanumeric postal codes, validating that mapping of postal codes would cause you to change the data type of the postal code column from numeric to alphanumeric. By…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Structured Query Language3m 41s
-
(Locked)
SELECT statement2m 27s
-
(Locked)
Sorting results4m 3s
-
(Locked)
Filtering data4m 1s
-
(Locked)
Aggregating data3m 8s
-
(Locked)
String manipulation2m 43s
-
(Locked)
Working with dates2m 14s
-
(Locked)
Derived values3m 16s
-
(Locked)
Set operations5m 37s
-
(Locked)
Join operations1m 58s
-
(Locked)
Inner joins7m 7s
-
(Locked)
Joining multiple tables6m 34s
-
(Locked)
Outer joins2m 55s
-
(Locked)
Transactions and the ACID model3m 48s
-
(Locked)
-
-
(Locked)
Query optimization2m 11s
-
(Locked)
Index optimization2m 5s
-
(Locked)
Patch management1m 33s
-
(Locked)
Database integrity checks2m 38s
-
(Locked)
Data corruption checks2m 21s
-
(Locked)
Audit log review2m 6s
-
(Locked)
Performance tuning3m 23s
-
(Locked)
Load balancing2m 58s
-
(Locked)
Change management3m
-
(Locked)
-
-
(Locked)
Legal and compliance risks2m 19s
-
(Locked)
Data privacy4m
-
(Locked)
General Data Protection Regulation (GDPR)7m 12s
-
(Locked)
California Consumer Privacy Act (CCPA)5m 56s
-
(Locked)
Data types1m 42s
-
(Locked)
Data classification2m 44s
-
(Locked)
Data loss prevention5m 17s
-
(Locked)
Security policies5m 7s
-
(Locked)
-
-
(Locked)
Identity and access management2m 58s
-
(Locked)
Usernames and access cards3m 23s
-
(Locked)
Biometrics2m 42s
-
(Locked)
Authentication factors3m 26s
-
(Locked)
Multifactor authentication2m 35s
-
(Locked)
Password policies4m 19s
-
(Locked)
Need to know and least privilege2m 34s
-
(Locked)
Privileged account management2m 31s
-
(Locked)