Actions

Difference between revisions of "Data Access"

m (The LinkTitles extension automatically added links to existing pages (https://github.com/bovender/LinkTitles).)
m
Line 8: Line 8:
 
===See Also===
 
===See Also===
 
<div style="column-count:2;-moz-column-count:4;-webkit-column-count:4">
 
<div style="column-count:2;-moz-column-count:4;-webkit-column-count:4">
[[Data]]<br />
+
*[[Data]]
[[Data Access]]<br />
+
*[[Data Access]]
[[Data Analysis]]<br />
+
*[[Data Analysis]]
[[Data Analytics]]<br />
+
*[[Data Analytics]]
[[Data Architecture]]<br />
+
*[[Data Architecture]]
[[Data Asset Framework (DAF)]]<br />
+
*[[Data Asset Framework (DAF)]]
[[Data Buffer]]<br />
+
*[[Data Buffer]]
[[Data Center]]<br />
+
*[[Data Center]]
[[Data Center Infrastructure]]<br />
+
*[[Data Center Infrastructure]]
[[Data Center Infrastructure Management (DCIM)]]<br />
+
*[[Data Center Infrastructure Management (DCIM)]]
[[Data Cleansing]]<br />
+
*[[Data Cleansing]]
[[Data Collection]]<br />
+
*[[Data Compatibility]]
[[Data Compatibility]]<br />
+
*[[Data Governance]]
[[Data Consolidation]]<br />
+
*[[Data Integration]]
[[Data Deduplication]]<br />
+
*[[Data Management]]
[[Data Delivery Platform (DDP)]]<br />
+
*[[Data Mining]]
[[Data Description (Definition) Language (DDL)]]<br />
+
*[[Data Monitoring]]
[[Data Dictionary]]<br />
+
*[[Data Munging]]
[[Data Discovery]]<br />
+
*[[Data Portability]]
[[Data Driven Organization]]<br />
+
*[[Data Quality]]
[[Data Element]]<br />
+
*[[Data Reference Model (DRM)]]
[[Data Enrichment]]<br />
+
*[[Data Security]]
[[Data Entry]]<br />
+
*[[Data Transformation]]
[[Data Federation]]<br />
+
*[[Data Visualization]]
[[Data Flow Diagram]]<br />
+
*[[Data Warehouse]]
[[Data Governance]]<br />
 
[[Data Health Check]]<br />
 
[[Data Hierarchy]]<br />
 
[[Data Independence]]<br />
 
[[Data Integration]]<br />
 
[[Data Integration Framework (DIF)]]<br />
 
[[Data Integrity]]<br />
 
[[Data Island]]<br />
 
[[Data Item]]<br />
 
[[Data Lake]]<br />
 
[[Data Life Cycle]]<br />
 
[[Data Lineage]]<br />
 
[[Data Loss Prevention (DLP)]]<br />
 
[[Data Management]]<br />
 
[[Data Migration]]<br />
 
[[Data Minimization]]<br />
 
[[Data Mining]]<br />
 
[[Data Model]]<br />
 
[[Data Modeling]]<br />
 
[[Data Monitoring]]<br />
 
[[Data Munging]]<br />
 
[[Data Portability]]<br />
 
[[Data Preparation]]<br />
 
[[Data Presentation Architecture]]<br />
 
[[Data Processing]]<br />
 
[[Data Profiling]]<br />
 
[[Data Proliferation]]<br />
 
[[Data Propagation]]<br />
 
[[Data Protection Act]]<br />
 
[[Data Prototyping]]<br />
 
[[Data Quality]]<br />
 
[[Data Quality Assessment (DQA)]]<br />
 
[[Data Quality Dimension]]<br />
 
[[Data Quality Standard]]<br />
 
[[Data Reconciliation]]<br />
 
[[Data Reference Model (DRM)]]<br />
 
[[Data Science]]<br />
 
[[Data Security]]<br />
 
[[Data Stewardship]]<br />
 
[[Data Structure]]<br />
 
[[Data Structure Diagram]]<br />
 
[[Data Suppression]]<br />
 
[[Data Transformation]]<br />
 
[[Data Validation]]<br />
 
[[Data Value Chain]]<br />
 
[[Data Vault Modeling]]<br />
 
[[Data Virtualization]]<br />
 
[[Data Visualization]]<br />
 
[[Data Warehouse]]<br />
 
[[Data Wrangling]]<br />
 
[[Data and Information Reference Model (DRM)]]<br />
 
[[Data as a Service (DaaS)]]<br />
 
[[Database (DB)]]<br />
 
[[Database Design]]<br />
 
[[Database Design Methodology]]<br />
 
[[Database Management System (DBMS)]]<br />
 
[[Database Marketing]]<br />
 
[[Database Schema]]<br />
 
[[Database System]]<br />
 
 
</div>
 
</div>
  

Revision as of 15:17, 26 October 2022

Data Access refers to a user's ability to access or retrieve data stored within a database or other repository. Users who have data access can store, retrieve, move or manipulate stored data, which can be stored on a wide range of hard drives and external devices.[1]

Data access is one of the main outputs of effective data governance programs. Organizations should ideally have well thought out, structured means of granting data access to different users. This is reinforced by various permissions and levels of security required for data access. Frequently, these permissions are based on organizational roles or responsibilities, which are structured according to data governance policies. When data is at rest in a repository, there are two basic ways of accessing it: with sequential access and random access:

  • Sequential access uses a seek operation to move the different data on a disk until the requested data is found. However, each data segment is read (in sequential order) until the sought after data is found, which can tax computational resources. Still, this method is often faster than random access because it requires fewer seek procedures than random access does.
  • Random access stores or retrieves data from anywhere on the disk. The advantage of this approach is that not all data has to be read in sequential order to find what a user’s looking for. Also, the data is located in constant time, which means there’s an upper limit to how long it will take for it to be retrieved. When that limit is less than how long it could take to sequentially read and retrieve data, random access is preferable.[2]


See Also


References

  1. Defining Data Access Techopedia
  2. The Two Basic Types of Data Access Talend