Actions

Difference between revisions of "Data Access"

m
m
Line 1: Line 1:
'''Data Access''' refers to a user's ability to access or retrieve [[Data|data]] stored within a [[Database (DB)|database]] or other repository. Users who have data access can store, retrieve, move or manipulate stored data, which can be stored on a wide range of [[Hard Disk Drive (HDD)|hard drives]] and external devices.<ref>Defining Data Access [https://www.techopedia.com/definition/26929/data-access Techopedia]</ref>
+
== What is Data Access? ==
  
Data access is one of the main outputs of effective [[Data Governance|data governance]] programs. [[Organization|Organizations]] should ideally have well thought out, structured means of granting data access to different users. This is reinforced by various permissions and levels of security required for data access. Frequently, these permissions are based on organizational roles or responsibilities, which are structured according to data [[governance]] policies. When data is at rest in a repository, there are two basic ways of accessing it: with sequential access and random access:
+
'''Data Access''' refers to a user's ability to access or retrieve data stored within a database or other repository. Users who have data access can store, retrieve, move or manipulate stored data, which can be stored on a wide range of hard drives and external devices.<ref>Defining Data Access [https://www.techopedia.com/definition/26929/data-access Techopedia]</ref>
*Sequential access uses a seek operation to move the different data on a disk until the requested data is found. However, each data segment is read (in sequential order) until the sought after data is found, which can tax computational resources. Still, this method is often faster than random access because it requires fewer seek procedures than random access does.
+
 
 +
Data access is one of the main outputs of effective [[Data Governance|data governance]] programs. Organizations should ideally have well thought out, structured means of granting data access to different users. This is reinforced by various permissions and levels of security required for data access. Frequently, these permissions are based on organizational roles or responsibilities, which are structured according to data governance policies. When data is at rest in a repository, there are two basic ways of accessing it: with sequential access and random access:
 +
*Sequential access uses a seek operation to move the different data on a disk until the requested data is found. However, each data segment is read (in sequential order) until the sought-after data is found, which can tax computational resources. Still, this method is often faster than random access because it requires fewer seek procedures than random access does.
 
*Random access stores or retrieves data from anywhere on the disk. The advantage of this approach is that not all data has to be read in sequential order to find what a user’s looking for. Also, the data is located in constant time, which means there’s an upper limit to how long it will take for it to be retrieved. When that limit is less than how long it could take to sequentially read and retrieve data, random access is preferable.<ref>The Two Basic Types of Data Access [https://www.talend.com/resources/what-is-data-access/ Talend]</ref>
 
*Random access stores or retrieves data from anywhere on the disk. The advantage of this approach is that not all data has to be read in sequential order to find what a user’s looking for. Also, the data is located in constant time, which means there’s an upper limit to how long it will take for it to be retrieved. When that limit is less than how long it could take to sequentially read and retrieve data, random access is preferable.<ref>The Two Basic Types of Data Access [https://www.talend.com/resources/what-is-data-access/ Talend]</ref>
  
Line 8: Line 10:
 
===See Also===
 
===See Also===
 
<div style="column-count:2;-moz-column-count:4;-webkit-column-count:4">
 
<div style="column-count:2;-moz-column-count:4;-webkit-column-count:4">
*[[Data]]
+
 
*[[Data Access]]
 
*[[Data Analysis]]
 
*[[Data Analytics]]
 
*[[Data Architecture]]
 
*[[Data Asset Framework (DAF)]]
 
*[[Data Buffer]]
 
*[[Data Center]]
 
*[[Data Center Infrastructure]]
 
*[[Data Center Infrastructure Management (DCIM)]]
 
*[[Data Cleansing]]
 
*[[Data Compatibility]]
 
*[[Data Governance]]
 
*[[Data Integration]]
 
*[[Data Management]]
 
*[[Data Mining]]
 
*[[Data Monitoring]]
 
*[[Data Munging]]
 
*[[Data Portability]]
 
*[[Data Quality]]
 
*[[Data Reference Model (DRM)]]
 
*[[Data Security]]
 
*[[Data Transformation]]
 
*[[Data Visualization]]
 
*[[Data Warehouse]]
 
 
</div>
 
</div>
  

Revision as of 17:48, 12 January 2023

What is Data Access?

Data Access refers to a user's ability to access or retrieve data stored within a database or other repository. Users who have data access can store, retrieve, move or manipulate stored data, which can be stored on a wide range of hard drives and external devices.[1]

Data access is one of the main outputs of effective data governance programs. Organizations should ideally have well thought out, structured means of granting data access to different users. This is reinforced by various permissions and levels of security required for data access. Frequently, these permissions are based on organizational roles or responsibilities, which are structured according to data governance policies. When data is at rest in a repository, there are two basic ways of accessing it: with sequential access and random access:

  • Sequential access uses a seek operation to move the different data on a disk until the requested data is found. However, each data segment is read (in sequential order) until the sought-after data is found, which can tax computational resources. Still, this method is often faster than random access because it requires fewer seek procedures than random access does.
  • Random access stores or retrieves data from anywhere on the disk. The advantage of this approach is that not all data has to be read in sequential order to find what a user’s looking for. Also, the data is located in constant time, which means there’s an upper limit to how long it will take for it to be retrieved. When that limit is less than how long it could take to sequentially read and retrieve data, random access is preferable.[2]


See Also


References

  1. Defining Data Access Techopedia
  2. The Two Basic Types of Data Access Talend