Glossary

 

Applies To: SQL Server 2016

TermDefinition
actionAn end-user-initiated operation on a selected cube or portion of a cube.
ActiveX Data ObjectsA data access interface that communicates with OLE DB-compliant data sources to connect to, retrieve, manipulate, and update data.
ActiveX Data Objects (Multidimensional)A high-level, language-independent set of object-based data access interfaces optimized for multidimensional data applications.
adapter hostThe root abstract class Adapter, which defines the handshake between the adapter and the StreamInsight server in the ENQUEUE interaction point. It provides all the required adapter services such as memory management, and exception handling.
ADOA data access interface that communicates with OLE DB-compliant data sources to connect to, retrieve, manipulate, and update data.
ADO MDA high-level, language-independent set of object-based data access interfaces optimized for multidimensional data applications.
ADOMD.NETA .NET managed data provider that provides access to multidimensional data sources, such as Microsoft SQL Server Analysis Services.
aggregate functionA function that performs a calculation on multiple values and returns a single value.
aggregate queryA query (SQL statement) that summarizes information from multiple rows by including an aggregate function such as Sum or Avg.
aggregationA table or structure containing pre-calculated data for an online analytical processing (OLAP) cube. Aggregations support the rapid and efficient querying of a multidimensional database.
aggregation prefixA string that is combined with a system-defined ID to create a unique name for a partition's aggregation table.
aggregation wrapperA wrapper that encapsulates a COM object within another COM object.
aliasAn alternative label for some object, such as a file or data collection.
alias typeA user-defined data type based on one of the SQL Server system data types that can specify a certain data type, length, and nullability.
alignmentA condition whereby an index is built on the same partition scheme as that of its corresponding table.
allocation unitA set of pages that can be operated on as a whole. Pages belonging to an allocation unit are tracked by Index Allocation Map (IAM) pages. An allocation unit consists of the IAM page chain and all pages marked allocated in that IAM page chain. An allocation unit can contain at most a single IAM chain, and an IAM chain must belong to one, and only one, allocation unit.
AMOA collection of .NET namespaces included with Analysis Services, used to provide administrative functionality for client applications.
Analysis Management ObjectsA collection of .NET namespaces included with Analysis Services, used to provide administrative functionality for client applications.
analytical dataData that provides the values that are associated with spatial data. For example, spatial data defines the locations of cities in an area whereas analytical data provides the population for each city.
ancestorIn a tree structure, the element of which a given element is a child. Equivalent to a parent element.
ancestor elementIn a tree structure, the element of which a given element is a child. Equivalent to a parent element.
anchor capA line cap where the width of the cap is bigger than the width of the line.
anchor memberThe first invocation of a recursive CTE consists of one or more CTE_query_definition joined by UNION ALL, UNION, EXCEPT or INTERSECT operators. Because these query definitions form the base result set of the CTE structure, they are referred to as anchor members.
animation managerA core component of an animation application and the central programmatic interface for managing (creating, scheduling, and controlling) animations.
anonymous subscriptionA type of pull subscription for which detailed information about the subscription and the Subscriber is not stored.
ANSI to OEM conversionThe conversion of characters that must occur when data is transferred from a database that stores character data using a specific code page to a client application on a computer that uses a different code page. Typically, Windows-based client computers use ANSI/ISO code pages, and some databases (for compatibility reasons) might use OEM code pages.
API server cursorA server cursor that is built to support the cursor functions of an API, such as ODBC, OLE DB, ADO, and DB-Library.
API supportA set of routines that an application uses to request and carry out lower-level services performed by a computer's operating system. These routines usually carry out maintenance tasks such as managing files and displaying information.
application roleA SQL Server role created to support the security needs of an application.
application timeThe clock time supplied by applications which must communicate their application time to the StreamInsight server so that all temporal operators refer to the timestamp of the events and never to the system clock of the host machine.
apply branchThe set of operations applied to an event group.
arbitration portA TCP/IP port used by the cache hosts to determine whether a cache host in the cluster has become unavailable. The port number that is used for arbitration can be different on each cache host.
ARIMAA method for determining dependencies in observations taken sequentially in time, that also supports multiplicative seasonality.
articleA component in a publication. For example, a table, a column, or a row.
assemblyA managed application module containing class metadata and managed code as an object in SQL Server, against which CLR functions, stored procedures, triggers, user-defined aggregates, and user-defined types can be created in SQL Server.
associative arrayAn array composed of a collection of keys and a collection of values, where each key is associated with one value. The keys and values can be of any type.
atom feedAn XML structure that contains metadata about content, such as the language version and the date when the content was last modified, and is sent to subscribers by using the Atom Publishing Protocol (AtomPub).
atomicPertaining to an operation where all the transaction data modifications must be performed; either all of the transaction data modifications are performed or none are performed.
attributeA single characteristic or additional piece of information (financial or non-financial) that exists in a database.
attribute hierarchyA flat hierarchy (typically having an All level and a member level) containing a single attribute. It is created from one column in a dimension table, if supported by the cube.
attribute relationshipThe hierarchy associated with an attribute containing a single level based on the corresponding column in a dimension table.
attribute typeThe type of information contained by an attribute, such as quarters or months in a time dimension, which may enable specific treatment by the server and client applications.
auditingThe process an operating system uses to detect and record security-related events, such as an attempt to create, to access, or to delete objects such as files and directories. The records of such events are stored in a file known as a security log, whose contents are available only to those with the proper clearance.
authenticationThe process of verifying the identity of a user, computer, process, or other entity by validating the credentials provided by the entity. Common forms of credentials are digital signatures, smart cards, biometric data, and a combination of user names and passwords.
authenticatorA data structure used by one party to prove that another party knows a secret key. In the Kerberos authentication protocol, authenticators include timestamps, to prevent replay attacks, and are encrypted with the session key issued by the Key Distribution Center (KDC).
authorizationThe process of granting a person, computer process, or device access to certain information, services or functionality. Authorization is derived from the identity of the person, computer process, or device requesting access, which is verified through authentication.
autocommit modeThe default transaction management mode for the Database Engine. The Database Engine automatically starts a transaction for each individual Transact-SQL statement. When the statement completes, the transaction is committed or rolled back based on the success or failure of the statement.
auto-consistency checkA feature that automatically runs a consistency check on protected data sources when it detects an inconsistent replica.
automatic failoverA failover that occurs automatically on the loss of the primary replica.
automatic recoveryRecovery that occurs every time SQL Server is restarted.
auto-protectionIn DPM, a feature that automatically identifies and adds new data sources for protection.
autoregressive integrated moving averageA method for determining dependencies in observations taken sequentially in time, that also supports multiplicative seasonality.
axisA set of tuples. Each tuple is a vector of members. A set of axes defines the coordinates of a multidimensional data set.
backup setA collection of files, folders, and other data that have been backed up and stored in a file or on one or more tapes.
balanced hierarchyA dimension hierarchy in which all leaf nodes are the same distance from the root node.
base backupA data backup of a database or files upon which a differential backup is fully or partially based. The base backup is the most recent full or file backup of the database or files.
base data typeAny system-supplied data type, for example, char , varchar , binary , and varbinary . User-defined data types are derived from base data types.
base objectThe object that a synonym references.
base tableA table stored permanently in a database. Base tables are referenced by views, cursors, SQL statements, and stored procedures.
basic marker mapA map that displays a marker at each location (for example, cities) and varies marker color, size, and type.
batchA set of requests or transactions that have been grouped together.
batch jobA set of computer processes that can be run without user interaction.
batch processingThe execution of a batch file.
blittable typeA data type that has a unique characteristic and an identical presentation in memory for both managed and unmanaged environments. It can be directly shared.
BLOBA discrete packet of binary data that has an exceptionally large size, such as pictures or audio tracks stored as digital data, or any variable or table column large enough to hold such values. The designation "binary large object" typically refers to a packet of data that is stored in a database and is treated as a sequence of uninterpreted bytes.
blockA Transact-SQL statement enclosed by BEGIN and END.
block cursorA cursor with a rowset size greater than 1.
blocking transactionA transaction that causes another transaction to fail.
Boolean expressionAn expression that yields a Boolean value (true or false). Such expressions can involve comparisons (testing values for equality or, for non-­Boolean values, the < [less than] or > [greater than] relation) and logical combination (using Boolean operators such as AND, OR, and XOR) of Boolean expressions.
Boolean operatorAn operator designed to work with Boolean values. The four most common Boolean operators in programming use are AND (logical conjunction), OR (logical inclusion), XOR (exclusive OR), and NOT (logical negation).
bound streamAn event stream that contains all the information needed to produce events. Either the information is an already instantiated data source, or the information is sufficient for the StreamInsight server to start the data source.
bounding boxThe smallest rectangular area that will surround a path, shape, or group of objects.
browse modeA function that lets you scan database rows and update their values one row at a time.
B-treeA tree structure for storing database indexes.
bubble mapA geographical map that displays a circle over specific locations, where the radius of the circle is proportional to a numeric value.
buffer poolA block of memory reserved for index and table data pages.
buffer sizeThe size of the area of memory reserved for temporary storage of data.
built-in functionsA group of predefined functions provided as part of the Transact-SQL and Multidimensional Expressions languages.
BUILTIN\AdministratorsUser account (local administrators)
bulk copyAn action of copying a large set of data.
bulk exportTo copy a large set of data rows out of a SQL Server table into a data file.
bulk importTo load a large amount of data, usually in batches, from a data file or repository to another data repository.
bulk loadAn action of inserting a large set of rows into a table.
bulk log backupA backup that includes log and data pages changed by bulk operations. Point-in-time recovery is not allowed.
bulk rowset providerA provider used for the OPENROWSET instruction to read data from a file. In SQL Server 2005, OPENROWSET can read from a data file without loading the data into a target table. This enables you to use OPENROWSET with a simple SELECT statement.
bulk-logged recovery modelA database recovery mode that minimally logs bulk operations, such as index creation and bulk imports, while fully logging other transactions. Bulk-logged recovery increases performance for bulk operations, and is intended to be used an adjunct to the full recovery model.
Business Intelligence Development StudioA project development and management tool for business intelligence solution developers. It can be used to design end-to-end business intelligence solutions that integrate projects from Microsoft SQL Server Analysis Services (SSAS), Microsoft SQL Server Integration Services (SSIS), and Microsoft SQL Server Reporting Services (SSRS).
business logicThe part of an application program that performs the required data processing of the business. It refers to the routines that perform the data entry, update, query and report processing, and more specifically to the processing that takes place behind the scenes rather than the presentation logic required to display the data on the screen.
business logic handlerA merge replication feature that allows you to run custom code during the synchronization process.
business logic handler frameworkThe business logic handler framework allows you to write a managed code assembly that is called during the merge synchronization process.
business rulesThe logical rules that are used to run a business
cache agingThe mechanism of caching that determines when a cache row is outdated and must be refreshed.
cache clientA .NET application that uses the Windows Server AppFabric client APIs to communicate with and store data to a Windows Server AppFabric distributed cache system.
cache clusterThe instantiation of the distributed cache service, made up of one or more instances of the cache host service working together to store and distribute data. Data is stored in memory to minimize response times for data requests. This clustering technology differs from Windows Clustering.
cache invalidationThe process of flagging an object in the cache so that it will no longer be used by any cache clients. This occurs when an object remains in cache longer than the cache time-out value (when it expires).
cache itemAn object that is stored in the cache and additional information associated with that object, such as tags and version. It can be extracted from the cache cluster using the GetCacheItem client API.
cache notificationAn asynchronous notification that can be triggered by a variety of cache operations on the cache cluster. Cache notifications can be used to invoke application methods or automatically invalidate locally cached objects.
cache operationAn event that occurs on regions or cached items that can trigger a cache notification.
cache portA TCP/IP port used by cache hosts to transmit data to and from the cache clients. The port number used for the cache port can be different on each cache host. These settings are maintained in the cluster configuration settings.
cache regionA container of data, within a cache, that co-locates all cached objects on a single cache host. Cache Regions enable the ability to search all cached objects in the region by using descriptive strings, called tags.
cache serviceThe distributed, in-memory caching solution that enables users to build highly scalable and responsive applications by bringing data closer to end users.
cache tagOne or more optional string-based identifiers that can be associated with each cached object stored in a region. Regions allow you to retrieve cached objects based on one or more tags.
cache-aside programming patternA programming pattern in which if the data is not present in the cache, the application, not the distributed cache system, must reload data into the cache from the original data source.
cache-enabled applicationAn application that uses the Windows Server AppFabric cache client to store data in cache on the cache cluster.
calculated columnA type of column that displays the results of mathematical or logical operations or expressions instead of stored data.
calculated fieldA field defined in a query that displays the result of an expression rather than displaying stored data. The value is recalculated each time a value in the expression changes.
calculated memberA member of a dimension whose value is calculated at run time by using an expression. Calculated member values can be derived from the values of other members.
calculation conditionA Multidimensional Expressions (MDX) logical expression that is used to determine whether a calculation formula will be applied against a cell in a calculation subcube.
calculation formulaA Multidimensional Expressions (MDX) expression used to supply a value for cells in a calculation subcube, subject to the application of a calculation condition.
calculation passA stage of calculation in a multidimensional cube in which applicable calculations are evaluated.
calculation pass numberAn ordinal position used to refer to a calculation pass.
calculation subcubeThe set of multidimensional cube cells that is used to create a calculated cells definition. The set of cells is defined by a combination of MDX set expressions.
callbackThe process used to authenticate users calling in to a network. During callback, the network validates the caller's username and password, hangs up, and then returns the call, usually to a preauthorized number. This process prevents unauthorized access to an account even if an individual's logon ID and password have been stolen.
call-level interfaceThe interface supported by ODBC for use by an application.
candidate keyA column or set of columns that have a unique value for each row in a table.
capFor paths that contain unconnected ends, such as lines, the end of a stroke. You can change the way the stroke looks at each end by applying one of four end cap styles: flat cap, round cap, square cap, and triangle cap.
cardinalityThe number of entities that can exist on each side of a relationship.
carousel viewIn Power Pivot Gallery, a specialized view where the preview area is centered and the thumbnails that immediately precede and follow the current thumbnail are adjacent to the preview area.
cascading deleteFor relationships that enforce referential integrity between tables, the deletion of all related records in the related table or tables when a record in the primary table is deleted.
cascading updateFor relationships that enforce referential integrity between tables, the updating of all related records in the related table or tables when a record in the primary table is changed.
caseAn abstract view of data characterized by attributes and relations to other cases.
case keyThe element of a case by which the case is referenced within a case set.
catalog viewsBuilt-in views that form the system catalog for SQL Server.
catastrophic errorAn error that causes the system or a program to fail abruptly with no hope of recovery. An example of a fatal error is an uncaught exception that cannot be handled.
CD sleeveA case for holding CDs.
CD-ROMA form of storage characterized by high capacity (roughly 650 MB) and the use of laser optics instead of magnetic means for reading data.
cellIn a cube, the set of properties, including a value, specified by the intersection when one member is selected from each dimension.
cellsetIn ADO MD, an object that contains a collection of cells selected from cubes or other cellsets by a multidimensional query.
centralized registration modelA registration model that removes all certificate subscriber participation from the management policy. For the workflow, a user designated as the originator will initiate the request and an enrollment agent will execute the request.
CEPThe continuous and incremental processing of event streams from multiple sources based on declarative query and pattern specifications with near-zero latency.
CEP engineThe core engine and adapter framework components of Microsoft StreamInsight. The StreamInsight server can be used to process and analyze the event streams associated with a complex event processing application.
CERNA physics research center located in Geneva, Switzerland, where the original development of the World Wide Web took place under the leadership of Tim Berners-Lee in 1989 as a method to facilitate communication among members of the scientific community.
certificateA digital document that is commonly used for authentication and to help secure information on a network. A certificate binds a public key to an entity that holds the corresponding private key. Certificates are digitally signed by the certification authority that issues them, and they can be issued for a user, a computer, or a service.
certificate enrollmentThe process of requesting, receiving, and installing a certificate.
certificate issuerThe certification authority which issued the certificate to the subject.
Certificate Lifecycle Manager ClientA suite of Certificate Lifecycle Manager (CLM) client tools that assist end users with managing their smart cards. The tools include the Smart Card Self Service Control, the Smart Card Personalization Control, and the Certificate Profile Update Control. See Smart Card Self-Service Control, Smart Card Personalization Control, Certificate Profile Update Control.
certificate managerA Certificate Lifecycle Manager (CLM) user that has the appropriate CLM permissions to either administer other CLM users or to administer the CLM application itself.
certificate manager Web portalA Web application running on the Certificate Lifecycle Manager (CLM) server. This portal allows certificate administrators to administer other users’ certificates and smart cards. The certificate subscriber and certificate manager Web portals are both accessed through the same universal resource locator (URL); however, the content displayed is based on a user's roles and permissions.
Certificate Profile Update ControlAn ActiveX control that automates the update of Certificate Lifecycle Manager (CLM) profiles on client computers.
certificate revocationThe process of revoking a digital certificate.
certificate subscriberA user that needs certificates with our without smart cards. Certificate subscribers can access a small number of functions that can only be performed for the user’s own certificates.
certificate subscriber Web portalA Web application running on the Certificate Lifecycle Manager (CLM) server. This component of the CLM server interacts directly with users in a self-service mode. The specific functionality is based upon Active Directory group memberships and permissions. The certificate subscriber and certificate manager Web portals are both accessed through the same universal resource locator (URL); however, the content displayed is based on a user's roles and permissions.
certificate templateA Windows construct that specifies the format and content of certificates based on their intended usage. When requesting a certificate from a Windows enterprise certification authority (CA), certificate requestors can select from a variety of certificate types that are based on certificate templates.
change applierAn object that performs conflict detection, conflict handling, and change application for a batch of changes.
change propagationThe process of applying changes from one replica to another.
change scriptA text file that contains SQL statements for all changes made to a database, in the order in which they were made, during an editing session.
change unitThe minimal unit of change tracking in a store. In change propagation, only the units that are changed must be sent; whereas, in conflict detection, independent changes to the same unit are considered a conflict.
changing dimensionA dimension that has a flexible member structure, and is designed to support frequent changes to structure and data.
character encodingA one-to-one mapping between a set of characters and a set of numbers.
character setA grouping of alphabetic, numeric, and other characters that have some relationship in common. For example, the standard ASCII character set includes letters, numbers, symbols, and control codes that make up the ASCII coding scheme.
chart data regionA report item on a report layout that displays data in a graphical format.
checkpointAn event in which the Database Engine writes dirty buffer pages to disk. Each checkpoint writes to disk all the pages that were dirty at the last checkpoint and still have not been written to disk.
checksumA calculated value that is used to test data for the presence of errors that can occur when data is transmitted or when it is written to disk. The checksum is calculated for a given chunk of data by sequentially combining all the bytes of data with a series of arithmetic or logical operations. After the data is transmitted or stored, a new checksum is calculated in the same way using the (possibly faulty) transmitted or stored data. If the two checksums do not match, an error has occurred, and the data should be transmitted or stored again. Checksums cannot detect all errors, and they cannot be used to correct erroneous data.
childIn a tree structure, the relationship of a node to its immediate predecessor.
chronicleA table that stores state information for a single application. An example is an event chronicle, which can store event data for use with scheduled subscriptions.
chunkA specified amount of data.
CIDER ShellA UI container with tabbed interface for hosting the TSQLEditor component and the related output from TSQL query execution.
claims identityA unique identifier that represents a specific user, application, computer, or other entity, enabling it to gain access to multiple resources, such as applications and network resources, without entering credentials multiple times. It also enables resources to validate requests from an entity.
clean shutdownA system shutdown that occurs without errors.
clear textData in its unencrypted or decrypted form.
cleartextData in its unencrypted or decrypted form.
CLIThe interface supported by ODBC for use by an application.
clickstream analysisClickstream data are information that users generate as they move from page to page and click on items within a Web site, usually stored in log files. Web site designers can use clickstream data to improve users' experiences with a site.
clickthrough reportA report that displays related report model data when you click data within a rendered Report Builder report.
clientA service, application, or device that wants to integrate into the Microsoft Sync Framework architecture.
clientA computer or program that connects to or requests the services of another computer or program.
client code generationThe action of generating code for the client project based on operations and entities exposed in the middle tier. A RIA Services link must exist between the client and server projects.
client cursorA cursor that is implemented on the client. The entire result set is first transferred to the client, and the client API software implements the cursor functionality from this cached result set.
Client Statistics paneOne of the tabs that hosts the output of the client statistics information.
client subscriptionA subscription to a merge publication that uses the priority value of the Publisher for conflict detection and resolution.
client typeInformation that determines how a cache client functions and impacts the performance of your application. There are two client types: a simple client type and a routing client type.
CLM AuditA Certificate Lifecycle Manager (CLM) extended permission in Active Directory that allows the generation and display of CLM policy templates, defining management policies within a profile template, and generating CLM reports.
CLM credentialsUser account information that can be used to authenticate a user to Certificate Lifecycle Manager (CLM). These credentials can be in the form of domain credentials or one-time passwords.
CLM EnrollA Certificate Lifecycle Manager (CLM) extended permission in Active Directory that allows the user to specify the workflow and the data to be collected while issuing certificates using a template. This extended permission only applies to profile templates.
CLM Enrollment AgentA Certificate Lifecycle Manager (CLM) extended permission in Active Directory that allows a user or group to perform certificate requests on behalf of another user. The issued certificate’s subject will contain the target user’s name, rather than the requestor’s name.
CLM RecoverA Certificate Lifecycle Manager (CLM) extended permission in Active Directory that allows the initiation of encryption key recovery from the certification authority database.
CLM RenewA Certificate Lifecycle Manager (CLM) extended permission in Active Directory that allows the initiation, running, or completion of an enrollment request. The renew request replaces a user’s certificate that is near its expiration date with a new certificate that has a new validity period.
CLM reportsAudit information pertaining to credential management activities within Certificate Lifecycle Manager (CLM).
CLM Request EnrollA Certificate Lifecycle Manager (CLM) extended permission in Active Directory that allows the initiation, running, or completion of an enrollment request.
CLM Request RecoverA Certificate Lifecycle Manager (CLM) extended permission in Active Directory that allows the initiation of encryption key recovery from the certification authority database.
CLM Request RenewA Certificate Lifecycle Manager (CLM) extended permission in Active Directory that allows the initiation, running, or completion of an enrollment request. The renew request replaces a user’s certificate that is near its expiration date with a new certificate that has a new validity period.
CLM Request RevokeA Certificate Lifecycle Manager (CLM) extended permission in Active Directory that allows the revocation of a certificate before the expiration of the certificate’s validity period. An example of when this is necessary is if a user’s computer or smart card is compromised (stolen).
CLM Request Unblock Smart CardA Certificate Lifecycle Manager (CLM) extended permission in Active Directory that enables a smart card’s User Personal Identification Number (PIN) to be reset, allowing access to the key material on a smart card and for that material to be re-established.
CLM RevokeA Certificate Lifecycle Manager (CLM) extended permission in Active Directory that allows the revocation of a certificate before the expiration of the certificate’s validity period. An example of when this is necessary is if a user’s computer or smart card is compromised (stolen).
clock vectorA collection of clock vector elements that represents updates to a replica. Any change that occurs between 0 and the tick count is contained in the vector.
clock vector elementA pair of values, consisting of a replica key and a tick count, that represents a change to a replica.
CLR functionA function created against a SQL Server assembly whose implementation is defined in an assembly created in the .NET Framework common language runtime (CLR).
CLR stored procedureA stored procedure created against a SQL Server assembly whose implementation is defined in an assembly created in the .NET Framework common language runtime (CLR).
CLR triggerA trigger created against a SQL Server assembly whose implementation is defined in an assembly created in the .NET Framework common language runtime (CLR).
CLR user-defined typeA user-defined data type created against a SQL Server assembly whose implementation is defined in an assembly created in the .NET Framework common language runtime (CLR).
cluster configuration storage locationThe shared location (or shared storage location) where cluster configuration information is persisted. It can be a shared file or a database.
cluster disk resourceA disk on a cluster storage device.
cluster nodeAn individual computer in a server cluster.
cluster portA TCP/IP port used by the cache hosts to manage the cache cluster. The port number used for the cluster ports can be different on each cache host. These settings are maintained in the cluster configuration settings.
cluster repairA repair operation in which all missing or corrupt files are replaced, all missing or corrupt registry keys are replaced and all missing or invalid configuration values are set to default values.
clustered indexA B-tree-based index in which the logical order of the key values determines the physical order of the corresponding rows in a table.
clustered serverA server that belongs to a server cluster.
clusteringA data mining technique that analyzes data to group records together according to their location within the multidimensional attribute space.
coarse-grained lockA lock that applies to a large amount of code or data.
code access securityA mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform.
code elementThe minimum bit combination that can represent a unit of encoded text for processing or exchange.
code pageA table that relates the character codes (code point values) used by a program to keys on the keyboard or to characters on the display. This provides support for character sets and keyboard layouts for different countries or regions.
code pointThe minimum bit combination that can represent a unit of encoded text for processing or exchange.
cold latencyThe time that elapses when the workflow is being used for the first time and the XOML or XAML needs to be compiled.
cold standbyA second data center that can provide availability within hours or days.
collationA set of rules that determines how data is compared, ordered, and presented.
collectionAn object that contains a set of related objects. An object's position in the collection can change whenever a change occurs in the collection; therefore, the position of any specific object in a collection may vary.
collection itemAn instance of a collector type that is created with a specific set of input properties and collection frequency, and that is used to gather specific types of data.
collection modeThe frequency at which data is collected and uploaded to the management data warehouse.
collection setA group of collection items with which a user can interact through the user interface.
collector typeA logical wrapper around the SQL Server Integration Services packages that provide the actual mechanism for collecting data and uploading it to the management data warehouse.
collocateTo select a partitioned table that contains related data and join with this table on the partitioning column.
collocationA condition whereby partitioned tables and indexes are partitioned according to equivalent partition functions.
color rangeThe range of colors available to a display device.
color ruleA rule that applies to fill colors for polygons, lines, and markers that represent points or polygon center points.
color scaleA scale that displays the results of color rules only.
columnThe area in each row of a database table that stores the data value for some attribute of the object modeled by the table.
column bindingThe binding of an Analysis Services object to a column in a data source view.
column delimiterA character which separates columns from each other in the CSV file being imported/exported.
column filterA filter that restricts columns that are to be included as part of a snapshot, transactional, or merge publication.
Column Pattern ProfileA report containing a set of regular expressions that cover the specified percentage of values in a string column.
column setAn untyped XML representation that combines all the sparse columns of a table into a structured output.
column-level collationSupporting multiple collations in a single instance.
column-level constraintA constraint definition that is specified within a column definition when a table is created or altered.
Columns GridAn editable grid structure in the Table Designer that lists the columns of a table and additional information about each column.
columnstore indexStores each column in a separate set of disk pages rather than storing multiple rows per page.
COMAn object-based programming model designed to promote software interoperability; it allows two or more applications or components to easily cooperate with one another, even if they were written by different vendors, at different times, in different programming languages, or if they are running on different computers running different operating systems.
command bufferAn area in memory in which commands entered by the user are kept. A command buffer can enable the user to repeat commands without retyping them completely, edit past commands to change some argument or correct a mistake, undo commands, or obtain a list of past commands.
command promptAn interface between the operating system and the user in which the user types command language strings of text that are passed to the command interpreter for execution.
command relationshipProvides instructions to hardware based on natural-language questions or commands.
commitAn operation that saves all changes to databases, cubes, or dimensions made since the start of a transaction.
Commit PreviewThe title of a window that displays actions to be taken during the commit operation.
committedCharacteristic of a transaction that is logged and cannot be rolled back.
commodity channel index formulaA formula that calculates the mean deviation of the daily average price of a commodity from the moving average. A value above 100 indicates that the commodity is overbought, and a value below -100 indicates that the commodity is oversold.
comparatorA device for comparing two items to determine whether they are equal. In electronics, for example, a comparator is a circuit that compares two input voltages and indicates which is higher.
compilation errorAn error which occurs while compiling an application. These compilation errors typically occur because syntax was entered incorrectly.
compile timeThe amount of time required to perform a compilation of a program. Compile time can range from a fraction of a second to many hours, depending on the size and complexity of the program, the speed of the compiler, and the performance of the hardware.
complete database restoreA restore of a full database backup, the most recent differential database backup (if any), and the log backups (if any) taken since the full database backup.
complex event processingThe continuous and incremental processing of event streams from multiple sources based on declarative query and pattern specifications with near-zero latency.
Component Object ModelAn object-based programming model designed to promote software interoperability; it allows two or more applications or components to easily cooperate with one another, even if they were written by different vendors, at different times, in different programming languages, or if they are running on different computers running different operating systems.
composablePertaining to the ability to form complex queries by using query components (objects or operators) as reusable building blocks. This is done by linking query components together or encapsulating query components within each other.
composed environmentA virtual environment that was created from virtual machines. Those virtual machines were created outside of Microsoft Test Manager and are already deployed on a host group.
composite indexAn index that uses more than one column in a table to index data.
composite keyA key whose definition consists of two or more fields in a file, columns in a table, or attributes in a relation.
compositional hierarchyA set of entities that are conceptually part of a hierarchy, such as a parent entity and a child entity. Data operations require that the entities be treated as a single unit.
computed columnA virtual column in a table whose value is computed at run time.
computed fieldA value in a formatted notification that has been computed by using a Transact-SQL expression.
COM-structured storage fileA component object model (COM) compound file used by Data Transformation Services (DTS) to store the version history of a saved DTS package.
concatenationThe process of combining two or more character strings or expressions into a single character string or expression, or combining two or more binary strings or expressions into a single binary string or expression.
concurrencyA process that allows multiple users to access and change shared data at the same time. The Entity Framework implements an optimistic concurrency model.
concurrency conflictA conflict that occurs when the same item or change unit is changed on two different replicas that are later synchronized.
concurrency modelA way in which an application can be designed to account for concurrent operations that use the same cached data. Windows Server AppFabric supports optimistic and pessimistic concurrency models.
concurrent operationA computer operation in which two or more processes (programs) have access to the microprocessor's time and are therefore carried out nearly simultaneously. Because a microprocessor can work with much smaller units of time than people can perceive, concurrent processes appear to be occurring simultaneously but in reality are not.
conditional expressionAn expression that yields a Boolean value (true or false). Such expressions can involve comparisons (testing values for equality or, for non-­Boolean values, the < [less than] or > [greater than] relation) and logical combination (using Boolean operators such as AND, OR, and XOR) of Boolean expressions.
conditional splitA restore of a full database backup, the most recent differential database backup (if any), and the log backups (if any) taken since the full database backup.
config fileA file that contains machine-readable operating specifications for a piece of hardware or software or that contains information on another file or on a specific user, such as the user's logon ID.
configurationIn reference to a single microcomputer, the sum of a system's internal and external components, including memory, disk drives, keyboard, video, and generally less critical add-on hardware, such as a mouse, modem, or printer. Software (the operating system and various device drivers), the user's choices established through configuration files such as the AUTOEXEC.BAT and CONFIG.SYS files on IBM PCs and compatibles, and sometimes hardware (switches and jumpers) are needed to "configure the configuration" to work correctly. Although system configuration can be changed, as by adding more memory or disk capacity, the basic structure of the system--its architecture--remains the same.
configuration fileA file that contains machine-readable operating specifications for a piece of hardware or software or that contains information on another file or on a specific user, such as the user's logon ID.
Configuration ToolsIn SQL Server, a menu item which allows the user to enable, disable, start, or stop the features, services, and remote connectivity of the SQL Server installations.
conflict detectionThe process of determining which operations were made by one replica without knowledge of the other, such as when two replicas make local updates to the same item.
conflict resolution methodThe method that is used to determine which change is written to the store in the event of a conflict. Typical conflict resolution methods are as follows: last writer wins, source wins, destination wins, custom, or deferred. For custom resolution, the resolving application reads the conflict from the conflict log and selects a resolution. For deferred resolution, the conflict is logged together with the conflicting change data and the made-with knowledge of the change.
conflict resolverA special mechanism which handles resolving of conflict situations.
Connection DirectorA connectivity technology where applications based on different data access technologies (.NET or native Win32) can share the same connection information. Connection information can be centrally managed for such client applications.
connection managerA logical representation of a run-time connection to a data source.
connection stringA series of arguments that define the location of a resource and how to connect to it.
consistency unitThe minimal unit of data synchronization. Because all changes that have the same consistency unit are sent together, synchronization can never be interrupted with part of a consistency unit applied.
constantA numeric or string value that is not calculated and, therefore, does not change.
constraint conflictA conflict that violates constraints that are put on items or change units, such as the relationship of folders or the location of identically-named data within a file system.
constraint violationA violation that occurs when the restriction criteria are not satisfied.
contained databaseA SQL Server database that includes all of the user authentication, database settings, and metadata required to define and access the database, and has no configuration dependencies on the instance of the SQL Server Database Engine where the database is installed.
containerA control flow element that provides package structure.
content formatterThe part of the distributor that turns raw notification data into readable messages.
content keyThe cryptographic key used to both encrypt and decrypt protected content during publishing and consumption.
contentionOn a network, competition among stations for the opportunity to use a communications line or network resource.
Context paneA tree view included in the Table Designer that lists objects related to a table.
context switchThe changing of the identity against which permissions to execute statements or perform actions are checked.
continuation mediaThe series of removable backup media used after the initial medium becomes full, allowing continuation of the backup operation.
continuation tapeA tape that is used after the initial tape in a media family fills, allowing continuation of a media family.
contractA Service Broker object that defines the message types that can be exchanged within a given conversation.
control flowA group of connected control flow elements that perform tasks.
control-break reportA report that summarizes data in user-defined groups or breaks. A new group is triggered when different data is encountered.
control-of-flow languageTransact-SQL keywords that control the flow of execution of SQL statements and statement blocks in triggers, stored procedures, and batches.
conversation endpointThe object which represents a party participating in the conversation.
conversation groupA group of related Service Broker conversations. Messages in the same conversation group can only be processed by one service program at a time.
conversation handleAn handle which uniquely defines a conversation.
convex hullThe smallest convex set that contains X in the Euclidean plane or Euclidean space.
coordinate systemIn n-dimensional space, a set of n linearly independent vectors anchored to a point (called the origin). A group of coordinates specifies a point in space (or a vector from the origin) by indicating how far to travel along each vector to reach the point (or tip of the vector).
correlated subqueryA subquery that references a column in the outer statement. The inner query is run for each candidate row in the outer statement.
count windowA window with a variable window size that moves along a timeline with each distinct event start time.
countersignTo sign a document already signed by the other party.
CPU busyA SQL Server statistic that reports the time, in milliseconds, that the central processing unit (CPU) spent on SQL Server work.
crawlThe process of scanning content to compile and maintain an index.
credentialsInformation that includes identification and proof of identification that is used to gain access to local and network resources. Examples of credentials are user names and passwords, smart cards, and certificates.
cross-database ownership chainingAn ownership chain that spans more than one database.
cross-validationA method for evaluating the accuracy of a data mining model.
CTI eventA special punctuation event that indicates the completeness of the existing events.
cubeA set of data that is organized and summarized into a multidimensional structure that is defined by a set of dimensions and measures.
cube roleA collection of users and groups with the same access to a cube. A cube role is created when you assign a database role to a cube, and it applies only to that cube.
current time increment eventA special punctuation event that indicates the completeness of the existing events.
cursorAn entity that maps over a result set and establishes a position on a single row within the result set.
cursor degradationThe return of a different type of cursor than the user had declared.
cursor libraryA part of the ODBC and DB-Library application programming interfaces (APIs) that implements client cursors
custom rollupAn aggregation calculation that is customized for a dimension level or member, and that overrides the aggregate functions of a cube's measures.
custom ruleIn a role, a specification that limits the dimension members or cube cells that users in the role are permitted to access.
custom variableA variable provided by package developers.
custom volumeA volume that is not in the DPM storage pool and is specified to store the replica and recovery points for a protection group member.
cyclic protectionA type of protection between two DPM servers where each server protects the data on the other.
DACA application that captures the SQL Server database and instance objects used by a client-server or 3-tier application.
DAC instanceA copy of a DAC deployed on an instance of the Database Engine. There can be multiple DAC instances on the same instance of the Database Engine.
DAC packageAn XML manifest that contains all of the objects defined for the DAC; the package gets created when a developer builds a DAC project.
DAC package fileThe XML file that is the container of a DAC package.
DAC placement policyA PBM policy that comprises a set of conditions, which serve as prerequisites on the target instance of SQL Server where the DAC can be deployed.
DAC projectA Visual Studio project used by database developers to create and develop a DAC. DAC projects get full support from Visual Studio and VSTS source code control, versioning, and development project management.
data adapterAn object used to submit data to and retrieve data from databases, Web services, and Extensible Markup Language (XML) files.
data backupAny backup that includes the full image of one or more data files.
data binningThe process of grouping data into specific bins or groups according to defined criteria.
data blockIn text, ntext, and image data, a data block is the unit of data transferred at one time between an application and an instance of SQL Server. The term is also applied to the units of storage for these data types.
data co-locationIn DPM, a feature that enables protection of multiple data sources on a single volume or on the same tape. This allows you to store more data on each volume or tape.
data connectionA connection that specifies the name, type, location, and, optionally, other information about a database file or server.
Data Control LanguageThe subset of SQL statements used to control permissions on database objects.
data convergenceData at the Publisher and the Subscriber that matches.
data corruptionA process wherein data in memory or on disk is unintentionally changed, with its meaning thereby altered or obliterated.
data definitionThe attributes, properties, and objects in a database.
data definition languageA language that defines all attributes and properties of a database, especially record layouts, field definitions, key fields, file locations, and storage strategy.
data description languageA language that defines all attributes and properties of a database, especially record layouts, field definitions, key fields, file locations, and storage strategy.
data dictionaryA database containing data about all the databases in a database system. Data dictionaries store all the various schema and file specifications and their locations. They also contain information about which programs use which data and which users are interested in which reports.
data elementA single unit of data.
data explosionThe exponential growth in size of a multidimensional structure, such as a cube, due to the storage of aggregated data.
data extensionA plug-in that processes data for a specific kind of data source. For example, Microsoft OLE DB Provider for DB2.
data feedAn XML data stream in Atom 1.0 format.
data flowThe movement of data through a group of connected elements that extract, transform, and load data.
data flow componentA component of SQL Server 2005 Integration Services that manipulates data.
data flow engineAn engine that executes the data flow in a package.
data flow taskThe task that encapsulates the data flow engine that moves data between sources and destinations, providing the facility to transform, clean, and modify data as it is moved.
data integrityThe accuracy of data and its conformity to its expected value, especially after being transmitted or processed.
data manipulation languageThe subset of SQL statements that is used to retrieve and manipulate data. DML statements typically start with SELECT INSERT UPDATE or DELETE.
data martA subset of the contents of a data warehouse that tends to contain data focused at the department level, or on a specific business area.
data memberA child member associated with a parent member in a parent-child hierarchy. A data member contains the data value for its parent member, rather than the aggregated value for the parent's children.
data miningThe process of identifying commercially useful patterns or relationships in databases or other computer repositories through the use of advanced statistical tools.
data mining extensionIn Analysis Services, a statement that performs mining tasks programmatically.
data mining model trainingThe process a data mining model uses to estimate model parameters by evaluating a set of known and predictable data.
data processing extensionA plug-in that processes data for a specific kind of data source (similar to a database driver).
Data Processor componentA component of the report server engine that processes data.
Data Profile ViewerA stand-alone utility that displays the profile output in both summary and detail format with optional drilldown capability.
data providerA known data source specific to a target type that provides data to a collector type.
data pumpA component used in SQL Server 2000 Transformation Services (DTS) to import, export, and transform data between heterogeneous data stores.
data regionA report item that provides data manipulation and display functionality for iterative data from an underlying dataset.
data scrubbingThe process of building a data warehouse out of data coming from multiple online transaction processing (OLTP) systems.
data segmentThe portion of memory or auxiliary storage that contains the data used by a program.
data setA collection of related information made up of separate elements that can be treated as a unit in data handling.
data source viewA named selection of database objects--such as tables, views, relationships, and stored procedures, based on one or more data sources--that defines the schema referenced by OLAP and data mining objects in an Analysis Services databases. It can also be used to define sources, destinations, and lookup tables for DTS tasks, transformations, and data adapters.
data stewardThe person responsible for maintaining a data element in a metadata registry.
data tapCollecting data from a specified path in SQL Server Integration Services. Tapped data can be written to CSV files when the SSIS package executes, and customers can specify which data flow to tap.
data viewerA graphical tool that displays data as it moves between two data flow components at run time.
data warehouseThe database that stores operations data for long periods of time. This data is then used by the Operations Manager reporting server to build reports. By default, this database is named OperationsManagerDW.
Data WarehouseThe database that stores operations data for long periods of time. This data is then used by the Operations Manager reporting server to build reports. By default, this database is named OperationsManagerDW.
database administratorThe person who manages a database. The administrator determines the content, internal structure, and access strategy for a database, defines security and integrity, and monitors performance.
database catalogThe part of a database that contains the definition of all the objects in the database, as well as the definition of the database.
database diagramA graphical representation of any portion of a database schema. It can be either a whole or partial picture of the structure of the database. It includes tables, the columns they contain, and the relationships between the tables.
database engineThe program module or modules that provide access to a database management system (DBMS).
Database Engine Tuning AdvisorA tool for tuning the physical database design that helps users to select and create an optimal set of indexes, indexed views, and partitioning.
Database ExplorerA simple database administration tool that lets the user perform database operations such as creating new tables, querying and modifying existing data, and other database development functions.
database fileOne of the physical files that make up a database.
database languageThe language used for accessing, querying, updating, and managing data in relational database systems.
database management systemA layer of software between the physical database and the user. The DBMS manages all access to the database.
database managerA layer of software between the physical database and the user. The DBMS manages all access to the database.
database mirroringImmediately reproducing every update to a read-write database (the principal database) onto a read-only mirror of that database (the mirror database) residing on a separate instance of the database engine (the mirror server). In production environments, the mirror server is on another machine. The mirror database is created by restoring a full backup of the principal database (without recovery).
Database Mirroring MonitorA tool used to monitor any subset of the mirrored databases on a server instance.
database mirroring partnerOne in a pair of server instances that act as role-switching partners for a mirrored database.
database mirroring partnersA pair of server instances that act as role-switching partners for a mirrored database.
database projectA collection of one or more data connections (a database and the information needed to access that database).
database referenceA path, expression or filename that resolves to a database.
database roleA collection of users and groups with the same access to an Analysis Services database.
database schemaThe names of tables, fields, data types, and primary and foreign keys of a database.
database scriptA collection of statements used to create database objects.
database snapshotA read-only, static view of a database at the moment of snapshot creation.
database structureThe names of tables, fields, data types, and primary and foreign keys of a database.
Database viewA read-only, static snapshot of a source database at the moment of the view's creation.
data-definition queryAn SQL-specific query that contains data definition language (DDL) statements. These statements allow you to create or alter objects in the database.
data-driven subscriptionA subscription that takes generated output for subscription values (for example, a list of employee e-mail addresses).
datareaderA stream of data that is returned by an ADO.NET query.
data-tier applicationA application that captures the SQL Server database and instance objects used by a client-server or 3-tier application.
data-tier application instanceA copy of a DAC deployed on an instance of the Database Engine. There can be multiple DAC instances on the same instance of the Database Engine.
data-tier application packageAn XML manifest that contains all of the objects defined for the DAC; the package gets created when a developer builds a DAC project.
dateA SQL Server system data type that stores a date value from January 1, 1 A.D., through December 31, 9999
DBA collection of data formatted/arranged to allow for easy search and retrieval.
DBCSA character set that can use more than one byte to represent a single character. A DBCS includes some characters that consist of 1 byte and some characters that consist of 2 bytes. Languages such as Chinese, Japanese, and Korean use DBCS.
DBMSA layer of software between the physical database and the user. The DBMS manages all access to the database.
DDLA language that defines all attributes and properties of a database, especially record layouts, field definitions, key fields, file locations, and storage strategy.
DDL triggerA special kind of trigger that executes in response to Data Definition Language (DDL) statements.
deadlockA situation when two users, each having a lock on one piece of data, attempt to acquire a lock on the other's piece.
decision supportSystems designed to support the complex analytic analysis required to discover business trends.
decision treeA treelike model of data produced by certain data mining methods. Decision trees can be used for prediction.
declarationA binding of an identifier to the information that relates to it. For example, to make a declaration of a constant means to bind the name of the constant with its value. Declaration usually occurs in a program's source code; the actual binding can take place at compile time or run time.
Declarative Management FrameworkA policy based system of SQL Server management.
Declarative Management Framework FacetA set of logical pre-defined properties that model the behavior or characteristics for certain types of managed targets (such as a database, table, login, view,etc) in policy-based management.
declarative referential integrityFOREIGN KEY constraints defined as part of a table definition that enforce proper relationships between tables.
dedicated administrator connectionA dedicated connection that allows an administrator to connect to a server when the Database Engine will not respond to regular connections.
defaultA value that is automatically used by a program when the user does not specify an alternative. Defaults are built into a program when a value or option must be assumed for the program to function.
default databaseThe database the user is connected to immediately after logging in to SQL Server.
default instanceThe instance of SQL Server that uses the same name as the computer name on which it is installed.
default languageThe human language that SQL Server uses for errors and messages if a user does not specify a language.
default memberThe dimension member used in a query when no member is specified for the dimension.
default result setThe default mode that SQL Server uses to return a result set back to a client.
defectionThe removal of a server from multiserver operations.
deferred transactionA transaction that is not committed when the roll forward phase of recovery completes and that cannot be rolled back during database startup because data needed by roll back is offline. This data can reside in either a page or a file.
degenerate dimensionA relationship between a dimension and a measure group in which the dimension main table is the same as the measure group table.
DEKA bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data.
delegated registration modelA registration model in which a person other than the certificate subscriber initiates the certificate transaction. The certificate subscriber then completes the transaction by providing a supplied one-time password.
DELETE clauseA part of a DML Statement that contains the DELETE keyword and associated parameters.
delete levelIn Data Transformation Services, the amount and kind of data to remove from a data warehouse.
delimited identifierAn object in a database that requires the use of special characters (delimiters) because the object name does not comply with the formatting rules of regular identifiers.
delivery channelA pipeline between a distributor and a delivery service.
delivery channel typeThe protocol for a delivery channel, such as Simple Mail Transfer Protocol (SMTP) or File.
delivery extensionA plug-in that delivers reports to a specific target (for example, e-mail delivery).
delivery protocolThe set of communication rules used to route notification messages to external delivery systems.
denormalizeTo introduce redundancy into a table to incorporate data from a related table.
deployTo build a DAC instance, either directly from a DAC package or from a DAC previously imported to the SQL Server Utility.
deployed environmentA group of virtual machines located on a team project host group and controlled by Microsoft Test Manager. A deployed environment can be running or stopped.
dequeueTo remove from a queue.
derived columnA transformation that creates new column values by applying expressions to transformation input columns.
deserializationThe process of converting an object from a serial storage format to binary format in the form of an object that applications can use. This happens when the object is retrieved from the cache cluster with the Get client APIs.
destinationThe SSIS data flow component that loads data into data stores or creates in-memory datasets.
destinationA synchronization provider that provide its current knowledge, accept a list of changes from the source provider, detect any conflicts between that list and its own items, and apply changes to its data store.
destination adapterA data flow component that loads data into a data store.
destination providerA synchronization provider that provide its current knowledge, accept a list of changes from the source provider, detect any conflicts between that list and its own items, and apply changes to its data store.
detectTo find something.
device typeA value from a developer-defined list that specifies the types of devices that a given application will support.
diacriticA mark placed over, under, or through a character, usually to indicate a change in phonetic value from the unmarked state.
diacritical markA mark placed over, under, or through a character, usually to indicate a change in phonetic value from the unmarked state.
dialectThe syntax and general rules used to parse a string or a query statement.
diamond-shape relationshipA chain of attribute relationships that splits and rejoins but that contains no redundant relationships. For example, Day->Month->Year and Day->Quarter->Year have the same start and end points, but do not have any common relationships.
differencerAn interface to a tool that creates a DifferencingService object.
differential backupA backup containing only changes made to the database since the preceding data backup on which the differential backup is based.
differential baseThe most recent full backup of all the data in a database or in a subset of the files or filegroups of a database.
digest deliveryA method of sending notifications that combines multiple notifications within a batch and sends the resulting message to a subscriber.
digital certificateA digital document that is commonly used for authentication and to help secure information on a network. A certificate binds a public key to an entity that holds the corresponding private key. Certificates are digitally signed by the certification authority that issues them, and they can be issued for a user, a computer, or a service.
dimensionA structural attribute of a cube that organizes data into levels. For example, a Geography dimension might include the members Country, Region, State or Province, and City.
dimension expressionA valid Multidimensional Expressions (MDX) expression that returns a dimension.
dimension granularityThe lowest level available to a particular dimension in relation to a particular measure group. The "natural" or physical grain is always that of the key that joins the main dimension table to the primary fact table.
dimension hierarchyA logical tree structure that organizes the members of a dimension such that each member has one parent member and zero or more child members.
dimension levelThe name of a set of members in a dimension hierarchy such that all members of the set are at the same distance from the root of the hierarchy. For example, a time hierarchy may contain the levels Year, Month, and Day.
dimension memberA single position or item in a dimension. Dimension members can be user-defined or predefined and can have properties associated with them.
dimension member propertyA characteristic of a dimension member. Dimension member properties can be alphanumeric, Boolean, or Date/Time data types, and can be user-defined or predefined.
dimension tableA table in a data warehouse whose entries describe data in a fact table.
direct connectThe state of being connected to a back-end database, so that any changes you make to a database diagram automatically update your database when you save the diagram or selected items in it.
direct response modeThe default mode in which SQL Server statistics are gathered separately from the SQL Server Statistics display.
dirty pageA buffer page that contains modifications that have not been written to disk.
dirty readA read that contains uncommitted data.
disabled indexAny index that has been marked as disabled. A disabled index is unavailable for use by the database engine. The index definition of a disabled index remains in the system catalog with no underlying index data.
discrete signalA time series consisting of a sequence of quantities, that is a time series that is a function over a domain of discrete integers.
discretizeTo put values of a continuous set of data into groups so that there are a discrete number of possible states.
discretized columnA column that represents finite, counted data
distinct count measureA measure commonly used to determine for each member of a dimension how many distinct, lowest-level members of another dimension share rows in the fact table.
distributed partitioned viewA view that joins horizontally partitioned data from a set of member tables across more than one server, making the data appear as if from one table.
distributed queryA single query that accesses data from multiple data sources.
distributed transactionA transaction that spans multiple data sources.
distribution cleanup agentA scheduled job that runs under SQL Server Agent. After all Subscribers have received a transaction, the agent removes the transaction from the distribution database. It also cleans up snapshot files from the file system after entries corresponding to those files have been removed from the distribution database.
distribution databaseA database on the Distributor that stores data for replication including transactions, snapshot jobs, synchronization status, and replication history information.
distribution retention periodIn transactional replication, the amount of time transactions are stored in the distribution database.
distributorA database instance that acts as a store for replication-specific data associated with one or more Publishers.
DMFOne of a set of built-in functions that returns server state information about values, objects, and settings in SQL Server.
DMLThe subset of SQL statements that is used to retrieve and manipulate data. DML statements typically start with SELECT INSERT UPDATE or DELETE.
DML triggerA stored procedure that executes when data in a specified table is modified.
DMVA set of built-in views that return server state information about values, objects, and settings in SQL Server.
DMXIn Analysis Services, a statement that performs mining tasks programmatically.
domainThe set of possible values that you can specify for an independent variable in a function, or for a database attribute.
domainA collection of computers in a networked environment that share a common database, directory database, or tree. A domain is administered as a unit with common rules and procedures, which can include security policies, and each domain has a unique name.
domain contextA client-side representation of a domain service.
domain integrityThe validity of entries for a specific column of data.
domain operationA method on a domain service that is exposed to a client application. It enables client applications to perform an action on the entity such as, query, update, insert, or delete records.
domain serviceA service that encapsulates the business logic of an application. It exposes a set of related domain operations in a service layer.
dormant sessionSession in pre-login state. Sessions can be initiated or ended to modify their state, but they generally remain in either a "sleep/idle" state, such as when the session has been initiated and is open at the server for client use; or a "dormant" state, such as when the session has been ended and the session is not currently available at the server for client use.
double byte character setA character set that can use more than one byte to represent a single character. A DBCS includes some characters that consist of 1 byte and some characters that consist of 2 bytes. Languages such as Chinese, Japanese, and Korean use DBCS.
double-byte character setA character set that can use more than one byte to represent a single character. A DBCS includes some characters that consist of 1 byte and some characters that consist of 2 bytes. Languages such as Chinese, Japanese, and Korean use DBCS.
downNot functioning, in reference to computers, printers, communications lines on networks, and other such hardware.
download-only articleAn article in a merge publication that can be updated only at the Publisher or at a Subscriber that uses a server subscription.
DPM ClientThe Data Protection Manager (DPM) Client enables the user to protect and recover their data as per the company protection policy configured by their backup administrator.
DPM engineA policy-driven engine that DPM uses to protect and recover data.
DPM Management ShellThe command shell, based on Windows PowerShell (Powershell.exe), that makes available the cmdlets that perform functions in Data Protection Manager.
DPM OnlineA feature that provides an online remote backup, both for securely storing data offsite for long durations and for disaster recovery (DR).
DPM Online accountA user account that DPM uses to start the DPM Online service.
DPM Online cacheA cache volume required by DPM Online on which the DPM server stores information for faster backup and recovery from DPM Online.
DPM Online protectionThe process of using DPM online to protect data from loss or corruption by creating and maintaining replicas and recovery points of the data online.
DPM Online protection groupA collection of data sources that share the same DPM Online protection configuration.
DPM Online recoveryThe process by which an administrator recovers previous versions of protected data from online recovery points on an internet-connected DPM server.
DPM Online recovery pointThe date and time of a previous version of a data source that is available from DPM Online.
DPM Online replicaA complete copy of an online-protected data source on DPM Online. Each member of an online protection group on the DPM server is associated with a DPM Online replica.
DPM roleThe grouping of users, objects, and permissions that is used by DPM administrators to manage DPM features that are used by end users.
DPM Self-Service Recovery Configuration ToolA tool that enables DPM administrators to authorize end users to perform self-service recovery of data by creating and managing DPM roles (grouping of users, objects, and permissions).
DPM Self-Service Recovery ToolA tool that is used by end users to recover backups from DPM, without any action required from the DPM administrator.
DPM Self-Service Tool for SQL ServerA tool for SQL Server that enables backup administrators to authorize end users to recover backups of SQL Server databases from DPM, without further action from the backup administrator.
DPM SRTSoftware provided with DPM to facilitate a Windows Server 2003 bare metal recovery for the DPM server and the computers that DPM protects.
DPM SST for SQL ServerA tool for SQL Server that enables backup administrators to authorize end users to recover backups of SQL Server databases from DPM, without further action from the backup administrator.
DPM System Recovery ToolSoftware provided with DPM to facilitate a Windows Server 2003 bare metal recovery for the DPM server and the computers that DPM protects.
DQSA knowledge-based data-quality system that enables users to perform knowledge discovery and management, data cleansing, data matching, integration with reference data services, and integrated profiling.
DQS knowledge baseA repository of metadata that is used by Data Quality Services to improve the quality of data. This metadata is created either by the user interactively or by the Data Quality Services platform in an automated knowledge discovery process.
drillthroughIn Analysis Services, a technique to retrieve the detailed data from which the data in a cube cell was summarized.
drill-through reportA secondary report that is displayed when a user clicks an item in a report. Detailed data is displayed in the same report.
drop-down listA list that can be opened to reveal all choices for a given field.
DSNThe collection of information used to connect an application to a particular ODBC database.
DSN-less connectionA type of data connection that is created based on information in a data source name (DSN), but is stored as part of a project or application.
dumpA duplicate of a program, a disk, or data, made either for archiving purposes or for safeguarding files.
dump deviceA tape or disk drive containing a backup medium.
dynamic cursorA cursor that can reflect data modifications made to the underlying data while the cursor is open.
dynamic filterA row filter available with merge replication that allows you to restrict the data replicated to a Subscriber based on a system function or user-defined function (for example: SUSER_SNAME()).
dynamic lockingThe process used by SQL Server to determine the most cost-effective locks to use at any one time.
dynamic management functionOne of a set of built-in functions that returns server state information about values, objects, and settings in SQL Server.
dynamic management viewA set of built-in views that return server state information about values, objects, and settings in SQL Server.
dynamic recoveryThe process that detects and/or attempts to correct software failure or loss of data integrity within a relational database management system (RDBMS).
dynamic routingRouting that adjusts automatically to the current conditions of a network. Dynamic routing typically uses one of several dynamic-routing protocols such as Routing Information Protocol (RIP) and Border Gateway Protocol (BGP). Compare static routing.
dynamic snapshotIn merge replication, a snapshot that includes only the data from a single partition.
eager loadingA pattern of loading where a specific set of related objects are loaded along with the objects that were explicitly requested in the query.
edge eventAn event whose event payload is valid for a given interval; however, only the start time is known upon arrival to the CEP server. The valid end time of the event is provided later in a separate edge event.
effective policyThe set of enabled policies for a target.
e-mailThe exchange of text messages and computer files over a communications network, such as a local area network or the Internet.
encryptionThe process of converting readable data (plaintext) into a coded form (ciphertext) to prevent it from being read by an unauthorized party.
encryption keyA bit string that is used in conjunction with an encryption algorithm to encrypt and decrypt data.
end capFor paths that contain unconnected ends, such as lines, the end of a stroke. You can change the way the stroke looks at each end by applying one of four end cap styles: flat cap, round cap, square cap, and triangle cap.
endpointA synchronization provider and its associated replica.
endpoint mapperA service on a remote procedure call (RPC) server that maintains a database of dynamic endpoints and allows clients to map an interface/object UUID pair to a local dynamic endpoint.
enqueueTo place (an item) in a queue.
enrollTo add an instance of SQL Server to the set of SQL Server instances managed by a utility control point.
enrollmentThe process of requesting, receiving, and installing a certificate.
Enrollment AgentA user account used to request smart card certificates on behalf of another user account. A specific certificate template is applied to an Enrollment Agent.
enterprise licenseA license that authorizes protection of both file and application resources on a single computer.
entityIn Reporting Services, a logical collection of model items, including source fields, roles, folders, and expressions, presented in familiar business terms.
entity integrityA state in which every row of every table can be uniquely identified.
envelopes formulaA financial formula that calculates "envelopes" above and below a moving average using a specified percentage as the shift. The envelopes indicator is used to create signals for buying and selling. You can specify the percentage the formula uses to calculate the envelopes.
equijoinA join in which the values in the columns being joined are compared for equality, and all columns are included in the results.
equirectangular projectionIn a map report item, a very simple equidistant cylindrical projection in which the horizontal coordinate is the longitude and the vertical coordinate is the latitude.
error handlingThe process of dealing with errors (or exceptions) as they arise during the running of a program. Some programming languages, such as C++, Ada, and Eiffel, have features that aid in error handling.
Error ListThe name of a pane that shows T-SQL syntax or dependency errors.
error logA file that lists errors that were encountered during an operation.
error state numberA number associated with SQL Server messages that helps Microsoft support engineers find the specific code location that issued the message.
ETLThe act of extracting data from various sources, transforming data to consistent types, and loading the transformed data for use by applications.
ETW-based log sinkA means of capturing trace events on the cache client or cache host with the Event Tracing for Windows (ETW) framework inside Windows.
eventThe basic unit of data processed by the StreamInsight server. Each event contains a header that defines the event kind and the temporal properties of the event. An event (except the CTI event) typically contains an event payload, which is a .NET data structure that contains the data associated with the event.
eventAny significant occurrence in the system or an application that requires a user to be notified or an entry to be added to a log.
event categoryIn SQL Trace, a grouping of similar and logically related event classes.
event chronicleA table that stores event state information.
event chronicle ruleOne or more Transact-SQL statements that manage the data in the event chronicle.
event classIn SQL Trace, a collection of properties that define an event.
event classificationA means of differentiating types of events that occur on the cache client and cache host. The Windows Server AppFabric log sinks follow the classification established with the System.Diagnostics.TraceLevel enumeration.
event collection stored proceduresSystem-generated stored procedures that an application can call to submit events to the event table in the application database.
event handlerA software routine that executes in response to an event.
event headerThe portion of an event that defines the temporal properties of the event and the event kind. Temporal properties include a valid start time and end time associated with the event.
event kindEvent metadata that defines the event type.
event modelThe event metadata that defines the temporal characteristics (shape) of the event.
event notificationA special kind of trigger that sends information about database events to a service broker.
event payloadThe data portion of an event in which the data fields are defined as CLR (common language runtime) types. An event payload is a typed structure.
event providerA provider that monitors a source of events and notifies the event table when events occur.
event sourceThe point of origin of an event.
event tableA table in the application database that stores event data.
Event Tracing for Windows (ETW)-based log sinkA means of capturing trace events on the cache client or cache host with the Event Tracing for Windows (ETW) framework inside Windows.
EveryoneA type of user account.
evictionThe physical removal of a cached object from the memory of the cache host or hosts that it is stored on. This is typically done to keep the memory usage of the cache host service in check.
exclusive lockA lock that prevents any other transaction from acquiring a lock on a resource until the original lock on the resource is released at the end of the transaction.
executeTo perform an instruction.
Execution Plan paneOne of the tabs that hosts the output for an estimated or actual execution plan that SQL Server uses.
execution treeThe path of data in the data flow of a SQL Server 2005 Integration Services package from sources through transformations to destinations.
exit moduleA Certificate Services component that performs post-processing after a certificate is issued, such as the publication of an issued certificate to Active Directory.
expirationThe point at which an object has exceeded the cache time-out value. When an object expires, it is evicted.
explicit capAn explicit hierarchy used as the top level of a derived hierarchy structure.
explicit hierarchyIn Master Data Services, a hierarchy that uses consolidated members to group other consolidated and leaf members.
explicit loadingA pattern of loading where related objects are not loaded until explicitly requested by using the Load method on a navigation property.
explicit transactionA group of SQL statements enclosed within transaction delimiters that define both the start and end of the transaction.
exploded pieA pie chart that displays the contribution of each value to a total while emphasizing individual values, by showing each slice of the pie as "pulled out," or separate, from the whole.
exploded pie chartA pie chart that displays the contribution of each value to a total while emphasizing individual values, by showing each slice of the pie as "pulled out," or separate, from the whole.
exponential moving averageA moving average of data that gives more weight to the more recent data in the period and less weight to the older data in the period. The formula applies weighting factors which decrease exponentially. The weighting for each older data point decreases exponentially, giving much more importance to recent observations while still not discarding older observations entirely.
export formatUI text for subscriptions and HTML viewer. Corresponds to rendering extensions.
expressionAny combination of operators, constants, literal values, functions, and names of fields (columns), controls, and properties that evaluates to a single value.
expression host assemblyAll expressions found within a report are that are compiled into an assembly. The expression host assembly is stored as a part of the compiled report.
extended permissionA permission that is specific to an object added to the standard Active Directory object schema. The permission associated with the new object extends the existing default permission set.
Extended propertyUser-defined text (descriptive or instructional including input masks and formatting rules) specific to a database or database object. The text is stored in the database as a property of the database or object.
Extended Protection for AuthenticationA security feature that helps protect against man-in-the-middle (MITM) attacks.
extended stored procedureA function in a dynamic link library (DLL) that is coded using the SQL Server Extended Stored Procedure API. The function can then be invoked from Transact-SQL using the same statements that are used to execute Transact-SQL stored procedures.
Extensible Stylesheet LanguageAn XML vocabulary that is used to transform XML data to another form, such as HTML, by means of a style sheet that defines presentation rules.
Extensible Stylesheet Language TransformationA declarative, XML-based language that is used to present or transform XML data.
Extensible Stylesheet Language TransformationsA declarative, XML-based language that is used to present or transform XML data.
extentOn a disk or other direct-access storage device, a continuous block of storage space reserved by the operating system for a particular file or program.
external delivery systemA system, such as Microsoft Exchange Server, that delivers formatted notifications to destination devices.
extractTo build a DAC package file that contains the definitions of all the objects in an existing database, as well as instance objects that are associated with the database.
extraction, transformation, and loadingThe act of extracting data from various sources, transforming data to consistent types, and loading the transformed data for use by applications.
facetA set of logical pre-defined properties that model the behavior or characteristics for certain types of managed targets (such as a database, table, login, view,etc) in policy-based management.
FacetA set of logical pre-defined properties that model the behavior or characteristics for certain types of managed targets (such as a database, table, login, view,etc) in policy-based management.
facet propertyA predefined property that applies to a specific facet in Policy-Based Management.
factA row in a fact table in a data warehouse. A fact contains values that define a data event such as a sales transaction.
fact dimensionA relationship between a dimension and a measure group in which the dimension main table is the same as the measure group table.
fact tableA central table in a data warehouse schema that contains numerical measures and keys relating facts to dimension tables.
factory methodA method, usually defined as static, whose purpose is to return an instance of a class.
fail overTo switch processing from a failed component to its backup component.
failed transactionA transaction that encountered an error and was not able to complete.
failover clusterA group of servers that are in one location and that are networked together for the purpose of providing live backup in case one of the servers fails.
failover clusteringA high availability process in which an instance of an application or a service, running over one machine, can fail-over onto another machine in the failover cluster in the case the first one fails.
failover partnerThe server used if the connection to the partner server fails.
fail-safe operatorA user who receives the alert if the designated operator cannot be reached.
failure notificationA type of cache notification triggered when the cache client misses one or more cache notifications.
fatal errorAn error that causes the system or a program to fail abruptly with no hope of recovery. An example of a fatal error is an uncaught exception that cannot be handled.
federated database serversA set of linked servers that shares the processing load of data by hosting partitions of a distributed partitioned view.
feed consumerA software component that extracts items from a FeedSync feed and applies them to a destination replica by using a synchronization provider.
fiberA Windows NT lightweight thread scheduled within a single OS thread.
fiber modeA situation where an instance of SQL Server allocates one Windows thread per SQL scheduler, and then allocates one fiber per worker thread, up to the value set in the max worker threads option.
fieldAn area in a window or record that stores a single data value.
field lengthIn bulk copy, the maximum number of characters needed to represent a data item in a bulk copy character format data file.
field marshallerA SQL Server feature that handles marshaling for fields.
field terminatorIn bulk copy, one or more characters marking the end of a field or row, separating one field or row in the data file from the next.
file backupA backup of all the data in one or more files or filegroups.
file differential backupA backup of one or more files containing only changes made to each file since its most recent file backup. A file differential backup requires a full file backup as a base.
file DSNfile Data Source Names. File-based data sources shared among all users with the same drivers installed. These data sources are not dedicated to a user or local to a computer.
file mappingThe association of a file's contents with a portion of the virtual address space of a process.
file restoreAn operation that restores one or more files of a database.
file rolloverThe process when a program closes a file, based on a certain event, and creates a new file.
filegroupA named collection of one or more data files that forms a single unit of data allocation or for administration of a database.
file-mapping objectAn object that maintains the association of a file's contents with a portion of the virtual address space of a process.
filestreamA sequence of bytes used to hold file data.
fill factorAn attribute of an index that defines how full the SQL Server Database Engine should make each page of the index.
filter forgotten knowledgeThe knowledge that is used as the starting point for filter tracking. A filter-tracking replica can save storage space by removing ghosts and advancing the filter forgotten knowledge to contain the highest version of the ghosts that have been removed.
filter keyA 4-byte value that maps to a filter in a filter key map.
filtered replicaA replica that stores item data only for items that are in a filter, such as a media storage replica that stores only songs that are rated as three stars or better.
filter-tracking replicaA replica that can identify which items are in a filter and which have moved in or out of the filter recently.
fine-grained lockA lock that applies to a small amount of code or data.
fitOne of the criteria used for evaluating the success of a data mining algorithm. Fit is typically represented as a value between 0 and 1, and is calculated by taking the covariance between the predicted and actual values of evaluated cases and dividing by the standard deviations of the same predicted and actual values.
fixed database roleA predefined role that exists in each database. The scope of the role is limited to the database in which it is defined.
fixed server roleA predefined role that exists at the server level. The scope of the role is limited to the SQL Server instance in which it is defined.
FKA key in a database table that comes from another table (also know as the "referenced table") and whose values match the primary key (PK) or unique key in the referenced table.
flat fileA file consisting of records of a single record type in which there is no embedded structure information that governs relationships between records.
flattenTo convert a nested structure into a flat structure.
flattened interfaceAn interface created to combine members of multiple interfaces.
flattened rowsetA multidimensional data set presented as a two-dimensional rowset in which unique combinations of elements of multiple dimensions are combined on an axis.
flexible IDAn identifier that is assigned to various synchronization entities, such as replicas. The identifier can be of fixed or variable length.
flexible identifierAn identifier that is assigned to various synchronization entities, such as replicas. The identifier can be of fixed or variable length.
fold countA value that represents the number of partitions that will be created within the original data set.
folder hierarchyA bounded namespace that uniquely identifies all reports, folders, shared data source items, and resources that are stored in and managed by a report server.
forced serviceIn a database mirroring session, a failover initiated by the database owner upon the failure of the principal server that transfers service to the mirror database while it is in an unknown state. Data may be lost.
foreign keyA key in a database table that comes from another table (also know as the "referenced table") and whose values match the primary key (PK) or unique key in the referenced table.
foreign key associationAn association between entities that is managed through foreign key properties.
foreign tableA table that contains a foreign key.
format fileA file containing meta information (such as data type and column size) that is used to interpret data when being read from or written to a data file.
forward-only cursorA cursor that cannot be scrolled; rows can be read only in sequence from the first row to the last row.
free-form languageA language whose syntax is not constrained by the position of characters on a line. C and Pascal are free-form languages; FORTRAN is not.
full backupA backup of an entire database.
full differential backupA backup of all files in the database, containing only changes made to the database since the most recent full backup. A full differential backup requires a full backup as a base.
full outer joinA type of outer join in which all rows in all joined tables are included, whether they are matched or not. For example, a full outer join between titles and publishers shows all titles and all publishers, even those that have no match.
full recovery modelA database recovery mode that fully logs all transactions and retains all the log records until after they are backed up. The database can be recovered to the point of failure if the tail of the log is backed up after the failure. All forms of recovery are supported.
full-text catalogA collection of full-text index components and other files that are organized in a specific directory structure and contain the data that is needed to perform queries.
full-text enablingThe process of allowing full-text querying to occur on the current database.
full-text queryAs a SELECT statement, a query that searches for words, phrases, or multiple forms of a word or phrase in the character-based columns (of char, varchar, text, ntext, nchar, or nvarchar data types). The SELECT statement returns those rows meeting the search criteria.
full-text searchA search for one or more documents, records, or strings based on all of the actual text data rather than on an index containing a limited set of keywords.
Full-Text serviceThe SQL Server component that performs the full-text querying.
full-width characterIn a double-byte character set, a character that is represented by 2 bytes and typically has a half-width variant.
functionA piece of code that operates as a single logical unit. A function is called by name, accepts optional input parameters, and returns a status and optional output parameters. Many programming languages support functions.
fuzzy groupingIn Integration Services, a data cleaning methodology that examines values in a dataset and identifies groups of related data rows and the one data row that is the canonical representation of the group.
fuzzy matchingIn Integration Services, a lookup methodology that uses an approximate matching algorithm to locate similar data values in a reference table.
GACA computer-wide code cache that stores assemblies specifically installed to be shared by many applications on the computer.
gap depthA measure that specifies the distance between data series that are displayed along distinct rows, as a result of clustering.
garbage collectionA process for automatic recovery of heap memory. Blocks of memory that had been allocated but are no longer in use are freed, and blocks of memory still in use may be moved to consolidate the free memory into larger blocks.
garbage collectorThe part of the operating system that performs garbage collection.
gated linkA protected link between two or more objects. During execution, permissions are not checked across the object relationship once it has been established and credentials don't have to be checked several times. This type of link is useful when it is not appropriate or manageable to give permissions to many dependent objects.
gather-write operationA performance optimization where the Database Engine collects multiple modified data pages into a single write operation.
GCA process for automatic recovery of heap memory. Blocks of memory that had been allocated but are no longer in use are freed, and blocks of memory still in use may be moved to consolidate the free memory into larger blocks.
generated codeCode that is automatically generated for the client project based on operations and entities exposed in the middle tier when a RIA Services link exists between the server and client projects.
generatorThe component of Notification Services that matches events to subscriptions and produces notifications.
geographic dataA type of spatial data that stores ellipsoidal (round-earth) data, such as GPS latitude and longitude coordinates.
geometric dataA type of spatial data that supports planar, or Euclidean (flat-earth), data.
ghostAn item or change unit in a filtered replica that was in the filter and has moved out.
ghost recordRow in the leaf level of an index that has been marked for deletion, but has not yet been deleted by the database engine.
ghost rowRow in the leaf level of an index that has been marked for deletion, but has not yet been deleted by the database engine.
global assembly cacheA computer-wide code cache that stores assemblies specifically installed to be shared by many applications on the computer.
global defaultA default that is defined for a specific database and is shared by columns of different tables.
global IDA unique identifier that is assigned to a data item. The identifier must be unique across all clients. A global identifier is a flexible identifier and so can be any format, but it is typically a GUID and an 8-byte prefix.
global identifierA unique identifier that is assigned to a data item. The identifier must be unique across all clients. A global identifier is a flexible identifier and so can be any format, but it is typically a GUID and an 8-byte prefix.
global ruleA rule that is defined for a specific database and is shared by columns of different tables.
global subscriptionA subscription to a merge publication with an assigned priority value used for conflict detection and resolution.
globalizationThe process of designing and developing a software product to function in multiple locales. Globalization involves identifying the locales that must be supported, designing features that support those locales, and writing code that functions equally well in any of the supported locales.
granularityA description, from "coarse" to "fine", of a computer activity or feature (such as screen resolution, searching and sorting, or time slice allocation) in terms of the size of the units it handles (pixels, sets of data, or time slices). The larger the pieces, the coarser the granularity.
granularity attributeThe single attribute is used to specify the level of granularity for a given dimension in relation to a given measure group.
graphical query designerA query designer provided by the Reporting Services that allows the user to interactively build a query and view the results for data source types SQL Server, Oracle, OLE DB, and ODBC.
graphics primitiveA basic shape (a point, a line, circle, curve, or polygon) that a graphics adapter can manipulate as a discrete entity.
groupA collection of users, computers, contacts, and other groups that is used as security or as e-mail distribution collections. Distribution groups are used only for e-mail. Security groups are used both to grant access to resources and as e-mail distribution lists.
groupingA set of data that is grouped together in a report.
half-width characterIn a double-byte character set, a character that is represented by one byte and typically has a full-width variant.
hard diskAn inflexible platter coated with material in which data can be recorded magnetically with read/write heads.
hard page-break rendererA rendering extension that maintains the report layout and formatting so that the resulting file is optimized for a consistent printing experience, or to view the report online in a book format.
hard-codingThe process of putting string or character literals in the main body of code, instead of in external resource files.
hard-codingBasing numeric constants on the assumed length of a string; assumptions about language or culture-specific matters fixed in the code - e.g., string length, date formats, etc.
hardware security moduleA secure device that provides cryptographic capabilities, typically by providing private keys used in Public-key cryptography.
hardware tokenA secure device that provides cryptographic capabilities, typically by providing private keys used in Public-key cryptography.
hash partitioningA way of partitioning a table or index by allowing SQL Server to apply an internal hash algorithm to spread rows across partitions based on the number of partitions specified and the values of one or more partitioning columns.
heat mapA type of map presentation where the intensity of color for each polygon corresponds to the related analytical data. For example, low values in a range appear as blue (cold) and high values as red (hot).
helpdeskAn individual or team of support professionals that provide technical assistance for an organization's network, hardware devices, and software.
heterogeneous dataData stored in multiple formats.
hierarchy treeA structure in which elements are related to each other hierarchically.
high availabilityA Windows Server AppFabric feature that supports continuous availability of cached data by storing copies of that data on multiple cache hosts.
high availabilityThe ability of a system or device to be usable when it is needed. When expressed as a percentage, high availability is the actual service time divided by the required service time. Although high availability does not guarantee that a system will have no downtime, a network often is considered highly available if it achieves 99.999 percent network uptime.
high watermarkA memory consumption threshold on each cache host that specifies when objects are evicted out of memory, regardless of whether they have expired or not, until memory consumption goes back down to the low watermark.
high whiskerThe highest value that is not an outlier on a box plot chart.
hintAn option or strategy specified for enforcement by the SQL Server query processor on SELECT, INSERT, UPDATE, or DELETE statements. The hint overrides any execution plan the query optimizer might select for a query.
historyA list of the user's actions within a program, such as commands entered in an operating system shell, menus passed through using Gopher, or links followed using a Web browser.
holdabilityRefers to the possibility of leaving result sets open ("on hold") that have been processed and are normally closed after this. For instance: "SQL Server supports holdability at the connection level only."
holdoutA percentage of training data that is reserved for use in measuring the accuracy of the structure of the data mining model.
holdout dataA percentage of training data that is reserved for use in measuring the accuracy of the structure of the data mining model.
holdout storeThe data mining structure that is used to cache the holdout data. It contains references to the holdout data.
HomeRoot folder in report server folder namespace.
home pageA document that serves as a starting point in a hypertext system. On the World Wide Web, an entry page for a set of Web pages and other files in a Web site. The home page is displayed by default when a visitor navigates to the site using a Web browser.
homogeneous dataData that comes from multiple data sources that are all managed by the same software.
hopIn data communications, one segment of the path between routers on a geographically dispersed network.
hopping windowA type of window in which consecutive windows "hop" forward in time by a fixed period. The window is defined by two time spans: the period P and the window length L. For every P time unit a new window of size L is created.
horizontal partitioningTo segment a single table into multiple tables based on selected rows.
horizontal splitA horizontal orientation of the CIDER shell.
hot standbyA standby server that can support rapid failover without a loss of data from committed transactions.
hot standby serverA standby server that can support rapid failover without a loss of data from committed transactions.
HSMA secure device that provides cryptographic capabilities, typically by providing private keys used in Public-key cryptography.
HTMLAn application of the Standard Generalized Markup Language that uses tags to mark elements, such as text and graphics, in a document to indicate how Web browsers should display these elements to the user and should respond to user actions.
HTML ViewerUI element consisting of a report toolbar and other navigation elements used to work with a report.
hybrid OLAPA storage mode that uses a combination of multidimensional data structures and relational database tables to store multidimensional data.
Hypertext Markup LanguageAn application of the Standard Generalized Markup Language that uses tags to mark elements, such as text and graphics, in a document to indicate how Web browsers should display these elements to the user and should respond to user actions.
identifying fieldA field or group of fields that identify an entity as a unique object.
identifying relationshipA relationship where the primary key of the principal entity is part of the primary key of the dependent entity. In this kind of relationship, the dependent entity cannot exist without the principal entity.
identity columnA column in a table that has been assigned the identity property.
identity propertyA property that generates values that uniquely identify each row in a table.
ideographA character in an Asian writing system that represents a concept or an idea, but not a particular word or pronunciation.
ideographic characterA character in an Asian writing system that represents a concept or an idea, but not a particular word or pronunciation.
IECOne of two international standards bodies responsible for developing international data communications standards. The International Electrotechnical Commission (IEC) works closely with the International Organization for Standardization (ISO) to define standards of computing. They jointly published the ISO/IEC SQL-92 standard for SQL.
immediate updating subscriptionA subscription to a transactional publication for which the user is able to make data modifications at the Subscriber. The data modifications are then immediately propagated to the Publisher using the two-phase commit protocol (2PC).
implicit cursor conversionThe return of a different type of cursor than the user had declared.
implicit transactionA connection option in which each SQL statement executed by the connection is considered a separate transaction.
implied permissionPermission to perform an activity specific to a role.
inactive data sourceA data source that has been backed up on the DPM server but is no longer being actively protected.
included column indexA nonclustered index containing both key and nonkey columns.
incoming messageA message that has been sent across one or more messaging systems. It may have been sent only to you or to many other recipients. Incoming messages are placed in a receive folder designated to hold messages of a particular class. You can set up a different receive folder for each message class that you handle or use one folder for all of the classes.
incremental updateThe set of operations that either adds new members to an existing cube or dimension, or adds new data to a partition.
independent associationAn association between entities that is represented and tracked by an independent object.
Index Allocation MapA page that maps the extents in a 4-GB part of a database file that is used by an allocation unit.
index pageA database page containing index rows.
indexed viewA view with a unique clustered index applied on it to improve the performance of some types of queries.
inference attackA type of security threat in which a malicious user is able to derive the value of data without actually accessing it, for example by monitoring the response time to a query.
information modelAn object-oriented schema that defines metadata constructs used to specify the structure and behavior of an application, process, component, or software artifact.
information technologyThe formal name for a company's data processing department.
initial snapshotFiles that include schema and data, constraints, extended properties, indexes, triggers, and system tables that are necessary for replication.
initial synchronizationThe first synchronization for a subscription, during which system tables and other objects that are required by replication, and the schema and data for each article, are copied to the Subscriber.
initial tapeIn a media set using tape backup devices, the first tape in a media family.
inner joinAn operation that retrieves rows from multiple source tables by comparing the values from columns shared between the source tables. An inner join excludes rows from a source table that have no matching rows in the other source tables.
in-person authenticationPhysical authentication to complete a certificate request transaction. For example, an end user requesting his/her personal identification number (PIN) be unblocked will visit a certificate manager in person to provide in-person authentication with identification, such as an employee badge or drivers license.
InProcA circumstance where the COM object’s code is loaded from a DLL file and is located in the same process as the client.
input adapterAn adapter that accepts incoming event streams from external sources such as databases, files, ticker feeds, network ports, manufacturing devices and so on.
input memberA member whose value is loaded directly from the data source instead of being calculated from other data.
input setThe set of data provided to a Multidimensional Expressions (MDX) value expression upon which the expression operates.
input sourceAny table, view, or schema diagram used as an information source for a query.
input streamA flow of information used in a program as a sequence of bytes that are associated with a particular task or destination. Input streams include series of characters read from the keyboard to memory and blocks of data read from disk files.
insensitive cursorA cursor that does not reflect data modification made to the underlying data by other users while the cursor is open.
insert eventThe event kind used to signify the arrival of an event into the stream. The insert event type consists of metadata that defines the valid lifetime of the event and the payload (data) fields of the event.
Insert Into queryA query that copies specific columns and rows from one table to another or to the same table.
Insert Values queryA query (SQL statement) that creates a new row and inserts values into specified columns.
instanceA copy of SQL Server running on a computer.
instance control providerA provider that allows you to issue control commands against workflow instances in an instance store. For example, a SQL control provider lets you suspend, resume, or terminate instances stored in a SQL Server database. When you execute a cmdlet that controls a workflow instance in an instance store, the cmdlet internally uses the control provider for that instance store to send commands to the instance.
instance query providerA provider that allows you to issue queries against an instance store. For example, a SQL query provider lets you query for workflow instances stored in a SQL Server database. When you execute a cmdlet that queries for instances against an instance store, the cmdlet internally uses the query provider to retrieve instances from that store.
instance storeA set of database tables that store workflow instance state and workflow instance metadata.
instance store providerIn Windows AppFabric, a provider that allows you to create instance store objects. For example, a SQL store provider allows clients to create SQL workflow instance store objects, which in turn allows clients to save and retrieve workflow instances to and from a persistence store.
integrationIn computing, the combining of different activities, programs, or hardware components into a functional unit.
integrityThe accuracy of data and its conformity to its expected value, especially after being transmitted or processed.
integrity constraintA property defined on a table that prevents data modifications that would create invalid data.
intent lockA lock that is placed on one level of a resource hierarchy to protect shared or exclusive locks on lower-level resources.
intent shareA lock that is placed on one level of a resource hierarchy to protect shared or exclusive locks on lower-level resources.
interactive structured query languageAn interactive command prompt utility provided with SQL Server that lets users run Transact-SQL statements or batches from a server or workstation and view the results that are returned.
interfaceA defined set of properties, methods, and collections that form a logical grouping of behaviors and data.
interface implicationIf an interface implies another interface, then any class that implements the first interface must also implement the second interface. Interface implication is used in an information model to get some of the effects of multiple inheritance.
intermediate languageA computer language used as an intermediate step between the original source language, usually a high-level language, and the target language, usually machine code. Some high-level compilers use assembly language as an intermediate language.
International Electrotechnical CommissionOne of two international standards bodies responsible for developing international data communications standards. The International Electrotechnical Commission (IEC) works closely with the International Organization for Standardization (ISO) to define standards of computing. They jointly published the ISO/IEC SQL-92 standard for SQL.
Internet Protocol securityA set of industry-standard, cryptography-based services and protocols that help to protect data over a network.
interprocess communicationThe ability of one task or process to communicate with another in a multitasking operating system. Common methods include pipes, semaphores, shared memory, queues, signals, and mailboxes.
interval eventAn event whose payload is valid for a given period of time. The metadata of the interval event requires that both the start and end time of the interval be provided in the event metadata. Interval events are valid only for this specific interval.
interval event modelThe event model of an interval event.
invoke operationA domain operation that is executed without tracking or deferred execution.
IP addressA binary number that uniquely identifies a host (computer) connected to the Internet to other Internet hosts, for the purposes of communication through the transfer of packets.
IPCThe ability of one task or process to communicate with another in a multitasking operating system. Common methods include pipes, semaphores, shared memory, queues, signals, and mailboxes.
IPsecA set of industry-standard, cryptography-based services and protocols that help to protect data over a network.
isolation levelThe property of a transaction that controls the degree to which data is isolated for use by one process, and is guarded against interference from other processes.
ISQLAn interactive command prompt utility provided with SQL Server that lets users run Transact-SQL statements or batches from a server or workstation and view the results that are returned.
itemA unit of data or metadata that is being synchronized. A typical item of data might be a file or record, whereas a typical item of metadata might be a knowledge item.
item-level role assignmentA security policy that applies to an item in the report server folder namespace.
item-level role definitionA security template that defines a role used to control access to or interaction with an item in the report server folder namespace.
iterateTo execute one or more statements or instructions repeatedly. Statements or instructions so executed are said to be in a loop.
jobA specified series of operations, called steps, performed sequentially by a program to complete an action.
job historyLog that keeps a historical record of jobs.
joinTo combine the contents of two or more tables and produce a result set that incorporates rows and columns from each table. Tables are typically joined using data that they have in common.
join columnA column referenced in a join condition.
join conditionA comparison clause that specifies how tables are related by their join columns.
join filterA filter used in merge replication that extends the row filter of one table to a related table.
join operatorA comparison operator in a join condition that determines how the two sides of the condition are evaluated and which rows are returned.
join pathA series of joins indicating how two tables are related.
junction tableA table that establishes a relationship between other tables.
Kagi chartA chart, mostly independent of time, used to track price movements and to make decisions on purchasing stock.
keyA string that identifies an object in the cache. This string must be unique within a region. Objects are associated with a key when they are added and then retrieved with the same key.
keyIn encryption, authentication, and digital signatures, a value used in combination with an algorithm to encrypt or decrypt information.
keyIn an array, the field by which stored data is organized and accessed.
keyA column or group of columns that uniquely identifies a row (primary key), defines the relationship between two tables (foreign key), or is used to build an index.
key attributeThe attribute of a dimension that links the non-key attributes in the dimension to related measures.
key columnA column whose contents uniquely identify every row in a table.
key generatorA hardware or software component that is used to generate encryption key material.
key performance indicatorA predefined measure that is used to track performance of a strategic goal, objective, plan, initiative, or business process. A KPI is evaluated against a target. An explicit and measurable value taken directly from a data source. Key performance indicators (KPIs) are used to measure performance in a specific area, for example, revenue per customer.
key range lockA lock that is used to lock ranges between records in a table to prevent phantom additions to, or deletions from, a set of records. Ensures serializable transactions.
key recoveryThe process of recovering a user's private key.
Key Recovery AgentA designated user that works with a certificate administrator to recover a user’s private key. A specific certificate template is applied to a Key Recovery Agent.
keyset-driven cursorA cursor that shows the effects of updates made to its member rows by other users while the cursor is open, but does not show the effects of inserts or deletes.
knowledgeThe metadata about all the changes that a participant has seen and maintains.
KPIA predefined measure that is used to track performance of a strategic goal, objective, plan, initiative, or business process. A KPI is evaluated against a target. An explicit and measurable value taken directly from a data source. Key performance indicators (KPIs) are used to measure performance in a specific area, for example, revenue per customer.
KRAA designated user that works with a certificate administrator to recover a user’s private key. A specific certificate template is applied to a Key Recovery Agent.
Language for non-Unicode programsA Regional and Language Options setting that specifies the default code pages and associated bitmap font files for a specific computer that affects all of that computer's users. The default code pages and fonts enable a non-Unicode application written for one operating system language version to run correctly on another operating system language version.
language service parserA component that is used to describe the functions and scope of the tokens in source code.
language service scannerA component that is used to identify types of tokens in source code. This information is used for syntax highlighting and for quickly identifying token types that can trigger other operations, for example, brace matching.
latchA short-term synchronization object protecting actions that need not be locked for the life of a transaction. A latch is primarily used to protect a row that the storage engine is actively transferring from a base table or index to the relational engine.
latencyThe delay that occurs while data is processed or delivered.
lazy loadingA pattern of data loading where related objects are not loaded until a navigation property is accessed.
lazy schema validationAn option that delays checking the remote schema to validate its metadata against a query until execution in order to increase performance.
lead byteThe byte value that is the first half of a double-byte character.
lead hostA cache host that has been designated to work with other lead hosts and to keep the cluster running at all times.
leafA node with no child objects represented in the tree.
leaf levelThe bottom level of a clustered or nonclustered index, or the bottom level of a hierarchy.
leaf memberA member that has no descendents.
leaf nodeA node with no child objects represented in the tree.
learned knowledgeThe current knowledge of a source replica about a specific set of changes, and the logged conflicts of that replica.
least recently usedThe type of eviction used by the cache cluster, where least recently used objects are evicted before the most recently used objects.
left outer joinA type of outer join in which all rows from the left-most table in the JOIN clause are included. When rows in the left table are not matched by rows in the right table, all result set columns that come from the right table are assigned a value of NULL.
levelThe name of a set of members in a dimension hierarchy such that all members of the set are at the same distance from the root of the hierarchy. For example, a time hierarchy may contain the levels Year, Month, and Day.
lift chartIn Analysis Services, a chart that compares the accuracy of the predictions of each data mining model in the comparison set.
lightweight poolingAn option that provides a means of reducing the system overhead associated with the excessive context switching sometimes seen in symmetric multiprocessing (SMP) environments by performing the context switching inline, thus helping to reduce user/kernel ring transitions.
line layerThe layer in a map report that displays spatial data as lines, for example, lines that indicate paths or routes.
linked dimensionA reference in a cube to a dimension in a different cube (that is, a cube with a different data source view that exists in the same or a different Analysis Services database). A linked dimension can only be related to measure groups in the source cube, and can only be edited in the source database.
linked measure groupA reference in a cube to a measure group in a different cube (that is, a cube with a different data source view that exists in the same or a different Analysis Services database). A linked measure group can only be edited in the source database.
linked serverA definition of an OLE DB data source used by SQL Server distributed queries. The linked server definition specifies the OLE DB provider required to access the data, and includes enough addressing information for the OLE DB provider to connect to the data.
linked tableAn OLE DB rowset exposed by an OLE DB data source that has been defined as a linked server for use in SQL Server distributed queries.
linking tableA table that has associations with two other tables, and is used indirectly as an association between those two tables.
LINQA query syntax that defines a set of query operators that allow traversal, filter, and projection operations to be expressed in a direct, declarative way in any .NET-based programming language.
little endianPertaining to a processor memory architecture that stores numbers so that the least significant byte is placed first.
local cacheA feature that enables deserialized copies of cached objects to be saved in the memory of the same process that runs the cache-enabled application.
local DistributorA server that is configured as both a Publisher and a Distributor for SQL Server Replication.
local partitioned viewA view that joins horizontally partitioned data from a set of member tables across a single server, making the data appear as if from one table.
local subscriptionA subscription to a merge publication that uses the priority value of the Publisher for conflict detection and resolution.
localeA collection of rules and data specific to a language and a geographic area. Locales include information on sorting rules, date and time formatting, numeric and monetary conventions, and character classification.
localizationThe process of adapting a product and/or content (including text and non-text elements) to meet the language, cultural, and political expectations and/or requirements of a specific local market (locale).
lockA restriction on access to a resource in a multiuser environment.
lock escalationThe process of converting many fine-grain locks into fewer coarse-grain locks, thereby reducing system overhead.
log backupA backup of transaction logs that includes all log records not backed up in previous log backups. Log backups are required under the full and bulk-logged recovery models and are unavailable under the simple recovery model.
log chainA continuous sequence of transaction logs for a database. A new log chain begins with the first backup taken after the database is created, or when the database is switched from the simple to the full or bulk-logged recovery model. A log chain forks after a restore followed by a recovery, creating a new recovery branch.
log providerA provider that logs package information at run time. Integration Services includes a variety of log providers that make it possible to capture events during package execution. Logs are created and stored in formats such as XML, text, database, or in the Windows event log.
Log Reader AgentIn Replication, the executable that monitors the transaction of each database configured for transactional replication, and copies the transactions marked for replication from the transaction into the distribution database.
log sequence numberA unique number assigned to each entry in a transaction log. LSNs are assigned sequentially according to the order in which entries are created.
log shippingCopying, at regular intervals, log backup from a read-write database (the primary database) to one or more remote server instances (secondary servers). Each secondary server has a read-only database, called a secondary database, that was created by restoring a full backup of the primary database without recovery. The secondary server restores each copied log backup to the secondary database. The secondary servers are warm standbys for the primary server.
log shipping configurationA single primary server, one or more secondary servers (each with a secondary database), and a monitor server.
log shipping jobA job performing one of the following log-shipping operations: backing up the transaction log of the primary database at the primary server (the backup job), copying the transaction log file to a secondary server (the copy job), or restoring the log backup to the secondary database on a secondary server (the restore job). The backup job resides on the primary server; the copy and restore jobs reside on each of the secondary servers. See also: primary database, primary server, secondary database, secondary server.
log sinkA tracing function of the cache client and cache host. Log sinks capture trace events from the cache client or cache host and can display them in a console, write them to a log file, or report them to the Event Tracing for Windows (ETW) framework inside Windows.
logic errorAn error, such as a faulty algorithm, that causes a program to produce incorrect results but does not prevent the program from running. Consequently, a logic error is often very difficult to find.
logical nameA name used by SQL Server to identify a file.
logical recordA merge replication feature that allows you to define a relationship between related rows in different tables so that the rows are processed as a unit.
login IDA string that is used to identify a user or entity to an operating system, directory service, or distributed system. For example, in Windows® integrated authentication, a login name uses the form "DOMAIN\username."
login security modeA security mode that determines the manner in which an instance of SQL Server validates a login request.
long parsingIn the SQL system there are two typical types of threads: - short thread: it is a process that use the resources for a short time and - long thread: it is a process that use the resources for a long time. long parsing: is the analysis of the threads that lived for a long time Note: the definition of short/long is based on the system calculation/statistic for each process.
Low BoxThe lowest value of a box on a Box Plot chart.
low watermarkA memory consumption threshold on each cache host that specifies when expired objects are evicted out of memory.
low whiskerThe lowest value that is not an outlier on a box plot chart.
LRUThe type of eviction used by the cache cluster, where least recently used objects are evicted before the most recently used objects.
LSNA unique number assigned to each entry in a transaction log. LSNs are assigned sequentially according to the order in which entries are created.
luring attackAn attack in which the client is lured to voluntarily connect to the attacker.
made-with knowledgeIn synchronization processes, the current knowledge of the source replica, to be used in conflict detection.
Manage RelationshipsA UI element that enables a user to view, delete or create new relationships in a model.
managed codeCode that is executed by the common language runtime environment rather than directly by the operating system. Managed code applications gain common language runtime services such as automatic garbage collection, runtime type checking and security support, and so on. These services help provide uniform platform- and language-independent behavior of managed-code applications.
managed instanceAn instance of SQL Server monitored by a utility control point.
management data warehouseA relational database that is used to store data that is collected.
management policyA definition of the workflows used for managing certificates within a Certificate Lifecyle Manager (CLM) profile template. A management policy defines who performs specific management tasks within the workflows, and provides management details for the entire lifecycle of the certificates within the profile template.
Management StudioA suite of management tools included with Microsoft SQL Server for configuring, managing, and administering all components within Microsoft SQL Server.
manual failoverIn a database mirroring session, a failover initiated by the database owner, while the principal server is still running, that transfers service from the principal database to the mirror database while they are in a synchronized state.
many-to-many dimensionA relationship between a dimension and a measure group in which a single fact may be associated with many dimension members and a single dimension member may be associated with a many facts. To define this relationship between the dimension and the fact table, the dimension is joined to an intermediate fact table and the intermediate fact table is joined, in turn, to an intermediate dimension table that is joined to the fact table.
many-to-one relationshipA relationship between two tables in which one row in one table can relate to many rows in another table.
mapTo associate data with a specified location in memory.
map controlA JavaScript control that contains the objects, methods, and events that you need to display maps powered by Bing Maps™ on your Web site.
map galleryA gallery that contains maps from reports that are located in the map gallery folder for the report authoring environment.
map layerA child element of the map, each map layer including elements for their map members and map member attributes.
map resolutionThe accuracy at which the location and shape of map features can be depicted for a given map scale. In a large scale map (e.g. a map scale of 1:1) there is less reduction of features than those shown on a small scale map (e.g. 1:1,000,000).
map tileOne of a number of 256 x 256 pixel images that are combined to create a Bing map. A map tile contains a segment of a view of the earth in Mercator projection, with possible road and text overlays depending on the style of the Bing map.
map viewportThe area of the map to display in the map report item. For example, a map for the entire United States might be embedded in a report, but only the area for the northwestern states are displayed.
MAPIA messaging architecture that enables multiple applications to interact with multiple messaging systems across a variety of hardware platforms. MAPI is built on the Component Object Model (COM) foundation.
mapperA component that maps objects.
markerA visual indicator that identifies a data point. In a map report, a marker is the visual indicator that identifies the location of each point on the point layer.
marker mapA map that displays a marker at each location (for example, cities) and varies marker color, size, and type.
market basket analysisA standard data mining algorithm that analyzes a list of transactions to make predictions about which items are most frequently purchased together.
master dataThe critical data of a business, such as customer, product, location, employee, and asset. Master data fall generally into four groupings: people, things, places, and concepts and can be further categorized. For example, within people, there are customer, employee, and salesperson. Within things, there are product, part, store, and asset. Within concepts, there are things like contract, warrantee, and licenses. Finally, within places, there are office locations and geographic divisions.
master data managementThe technology, tools, and processes required to create and maintain consistent and accurate lists of master data of an organization.
Master Data ManagerA component of the Master Data Services application for managing and accessing master data.
Master Data ServicesA master data management application to consistently define and manage the critical data entities of an organization.
Master Data Services Configuration ManagerA SQL Server configuration manager used to create and configure Master Data Services databases, Web sites, and Web applications.
master databaseThe system database that records all the system-level information for an instance of SQL Server.
master fileThe file installed with earlier versions of SQL Server used to store the master, model, and tempdb system databases and transaction logs and the pubs sample database and transaction log.
master mergeThe process of combining shadow indexes with the current master index to form a new master index.
master serverA server that distributes jobs and receives events from multiple servers.
materialized viewA view in which the query result is cached as a concrete table that may be updated from the original base tables from time to time.
matrix data regionA report item on a report layout that displays data in a variable columnar format.
MBCSA mixed-width character set, in which some characters consist of more than 1 byte. An MBCS is used in languages such as Japanese, Chinese, and Korean, where the 256 possible values of a single-byte character set are not sufficient to represent all possible characters.
MDSA master data management application to consistently define and manage the critical data entities of an organization.
MDXA language for querying and manipulating data in multidimensional objects (OLAP cubes).
measureIn a cube, a set of values that are usually numeric and are based on a column in the fact table of the cube. Measures are the central values that are aggregated and analyzed.
measure groupA collection of related measures in an Analysis Services cube. The measures are generally from the same fact table.
media familyData written by a backup operation to a backup device used by a media set. In a media set with only a single device, only one media family exists. In a striped media set, multiple media families exist. If the striped media set is unmirrored, each device corresponds to a family. A mirrored media set contains from two to four identical copies of each media family (called mirrors). Appending backups to a media set extends its media families.
media headerA label that provides information about the backup media.
media setAn ordered collection of backup media written to by one or more backup operations using a constant number of backup devices.
medianThe middle value in a set of ordered numbers. The median value is determined by choosing the smallest value such that at least half of the values in the set are no greater than the chosen value. If the number of values within the set is odd, the median value corresponds to a single value. If the number of values within the set is even, the median value corresponds to the sum of the two middle values divided by two.
median price formulaA formula that calculates the average of the high and low prices.
median valueThe middle value in a set of ordered numbers. The median value is determined by choosing the smallest value such that at least half of the values in the set are no greater than the chosen value. If the number of values within the set is odd, the median value corresponds to a single value. If the number of values within the set is even, the median value corresponds to the sum of the two middle values divided by two.
memberA single position or item in a dimension. Dimension members can be user-defined or predefined and can have properties associated with them.
member delegationA modeling concept that describes how interface members are mapped from one interface to another.
member expressionA valid Multidimensional Expressions (MDX) expression that returns a member.
member propertyA characteristic of a dimension member. Dimension member properties can be alphanumeric, Boolean, or Date/Time data types, and can be user-defined or predefined.
memoA type of column that contains long strings, typically more than 255 characters.
memory brokerA software component that manages the distribution of memory resources in SQL Server.
memory clerkA memory management component that allocates memory.
merge replicationA type of replication that allows sites to make autonomous changes to replicated data, and at a later time, merge changes and resolve conflicts when necessary.
merge tombstoneA marker created when a constraint conflict is resolved by merging the two items in conflict.
message numberA number that identifies a SQL Server error message.
Message QueuingA Microsoft technology that enables applications running at different times to communicate across heterogeneous networks and systems that may be temporarily offline.
message typeA definition of a Service Broker message. The message type specifies the name of the message and the type of validation Service Broker performs on incoming messages of that type.
Messages paneOne of the tabs that hosts the messages returned from SQL Server after a TSQL query has been executed.
Messaging Application Programming InterfaceA messaging architecture that enables multiple applications to interact with multiple messaging systems across a variety of hardware platforms. MAPI is built on the Component Object Model (COM) foundation.
metadataInformation about the properties or structure of data that is not part of the values the data contains.
methodIn object-oriented programming, a named code block that performs a task when called.
Microsoft Message QueuingA Microsoft technology that enables applications running at different times to communicate across heterogeneous networks and systems that may be temporarily offline.
Microsoft Sequence Clustering algorithmAlgorithm that is a combination of sequence analysis and clustering, which identifies clusters of similarly ordered events in a sequence. The clusters can be used to predict the likely ordering of events in a sequence based on known characteristics.
Microsoft SharePoint Foundation Usage Data ImportThe default timer job for SharePoint Foundation that imports usage log files into the logging database.
Microsoft SharePoint ServerA family of Microsoft enterprise portal servers, built on Windows SharePoint Services, used to aggregate SharePoint sites, information, and applications into a single portal.
Microsoft SQL ServerA family of Microsoft relational database management and analysis systems for e-commerce, line-of-business, and data warehousing solutions.
Microsoft SQL Server 2008 ExpressA lightweight and embeddable version of Microsoft SQL Server 2008.
Microsoft SQL Server 2008 Express with Advanced ServicesA Microsoft relational database design and management system for e-commerce, line-of-business, and data warehousing solutions.
Microsoft SQL Server 2008 Express with ToolsA free, easy-to-use version of the SQL Server Express data platform that includes the graphical management tool: SQL Server Management Studio (SMSS) Express.
Microsoft SQL Server Books OnlineA collection of electronic documentation that includes the complete documentation that ships with Microsoft SQL Server.
Microsoft SQL Server Business IntelligenceThe Microsoft SQL Server-based data infrastructure and business intelligence platform consisting of Microsoft SQL Server Integration Services, Relational Engine, Master Data Services, Reporting Services, and Analysis Services.
Microsoft SQL Server CompactA Microsoft relational database management and analysis system for e-commerce, line-of-business, and data warehousing solutions.
Microsoft SQL Server Compact 3.5 for DevicesA file that installs the SQL Server Compact 3.5 devices runtime components.
Microsoft SQL Server Notification ServicesA Microsoft SQL Server add-in that provides a development framework and hosting server for building and deploying notification applications.
Microsoft SQL Server Playback Capture WizardA wizard that supports the capture of information about an event for later analysis.
Microsoft SQL Server Power Pivot for Microsoft ExcelA SQL Server add-in for Excel.
Microsoft SQL Server Power Pivot for Microsoft SharePointA Microsoft SQL Server technology that provides query processing and management control for Power Pivot workbooks published to SharePoint.
Microsoft SQL Server Reporting ServicesA server-based report generation environment for enterprise, Web-enabled reporting functionality so you can create reports that draw content from a variety of data sources, publish reports in various formats, and centrally manage security and subscriptions.
Microsoft SQL Server Reporting Services Report BuilderA report authoring tool that features a Microsoft Office-like authoring environment and features such as new sparkline, data bar, and indicator data visualizations, the ability to save report items as report parts, a wizard for creating maps, aggregates of aggregates, and enhanced support for expressions.
Microsoft SQL Server Service BrokerA technology that helps developers build scalable, secure database applications.
Microsoft SQL Server System CLR TypesA stand-alone package, part of SQL Server 2008 R2 Feature Pack, that contains the components implementing the geometry, geography, and hierarchy id types in SQL Server.
Microsoft Time Series algorithmAlgorithm that uses a linear regression decision tree approach to analyze time-related data, such as monthly sales data or yearly profits. The patterns it discovers can be used to predict values for future time steps.
middlewareSoftware that sits between two or more types of software and translates information between them. Middleware can cover a broad spectrum of software and generally sits between an application and an operating system, a network operating system, or a database management system.
mining modelAn object that contains the definition of a data mining process and the results of the training activity. For example, a data mining model may specify the input, output, algorithm, and other properties of the process and hold the information gathered during the training activity, such as a decision tree.
mining structureA data mining object that defines the data domain from which the mining models are built.
minor tick markA tick mark that corresponds to a minor scaling unit on an axis.
mirror databaseIn a database mirroring session, the copy of the database that is normally fully synchronized with the principal database.
mirror serverIn a database mirroring configuration, the server instance where the mirror database resides. The mirror server is the mirroring partner whose copy of the database is currently the mirror database. The mirror server is a hot standby server.
mirrored media setA media set that contains two to four identical copies (mirrors) of each media family. Restore operations require only one mirror per family, allowing a damaged media volume to be replaced by the corresponding volume from a mirror.
mirroringImmediately reproducing every update to a read-write database (the principal database) onto a read-only mirror of that database (the mirror database) residing on a separate instance of the database engine (the mirror server). In production environments, the mirror server is on another machine. The mirror database is created by restoring a full backup of the principal database (without recovery).
model databaseA database that is installed with Microsoft SQL Server and that provides the template for new user databases. SQL Server creates a database by copying in the contents of the model database and then expanding the new database to the size requested.
model dependencyA relationship between two or more models in which one model is dependent on the information of another model.
moduloAn arithmetic operation whose result is the remainder of a division operation. For example, 17 modulo 3 = 2 because 17 divided by 3 yields a remainder of 2. Modulo operations are used in programming.
monitor serverIn a log shipping configuration, a server instance on which every log shipping job in the configuration records its history and status. Each log shipping configuration has its own dedicated monitor server.
msdbA database that stores scheduled jobs, alerts, and backup/restore history information.
MSMQA Microsoft technology that enables applications running at different times to communicate across heterogeneous networks and systems that may be temporarily offline.
multibase differentialA differential backup that includes files that were last backed up in distinct base backups.
multibyte character setA mixed-width character set, in which some characters consist of more than 1 byte. An MBCS is used in languages such as Japanese, Chinese, and Korean, where the 256 possible values of a single-byte character set are not sufficient to represent all possible characters.
multicast deliveryA method for delivering notifications that formats a notification once and sends the resulting message to multiple subscribers.
multidimensional expressionA language for querying and manipulating data in multidimensional objects (OLAP cubes).
multidimensional OLAPA storage mode that uses a proprietary multidimensional structure to store a partition's facts and aggregations or a dimension.
multidimensional structureA database paradigm that treats data as cubes that contain dimensions and measures in cells.
multiplierIn arithmetic, the number that indicates how many times another number (the multiplicand) is multiplied.
multiserver administrationThe process of automating administration across multiple instances of SQL Server.
multithreaded server applicationAn application that creates multiple threads within a single process to service multiple user requests at the same time.
multiuserPertaining to any computer system that can be used by more than one person. Although a microcomputer shared by several people can be considered a multiuser system, the term is generally reserved for machines that can be accessed simultaneously by several people through communications facilities or via network terminals.
mutexA programming technique that ensures that only one program or routine at a time can access some resource, such as a memory location, an I/O port, or a file, often through the use of semaphores, which are flags used in programs to coordinate the activities of more than one program or routine.
My ReportsA personalized workspace.
My SubscriptionsA page that lists all subscriptions that a user owns.
named cacheA configurable unit of in-memory storage that has policies associated with it and that is available across all cache hosts in a cache cluster.
named instanceAn installation of SQL Server that is given a name to differentiate it from other named instances and from the default instance on the same computer.
named pipeA portion of memory that can be used by one process to pass information to another process, so that the output of one is the input of the other. The second process can be local (on the same computer as the first) or remote (on a networked computer).
named updateA custom service operation that performs an action which is different than a simple query, update, insert, or delete operation.
named update methodA custom service operation that performs an action which is different than a simple query, update, insert, or delete operation.
naming conventionAny standard used more or less universally in the naming of objects, etc.
national language support APISet of system functions in 32-bit Windows containing information that is based on language and cultural conventions.
native compilerA compiler that produces machine code for the computer on which it is running, as opposed to a cross-compiler, which produces code for another type of computer. Most compilers are native compilers.
native formatA data format that maintains the native data types of a database. Native format is recommended when you bulk transfer data between multiple instances of Microsoft SQL Server using a data file that does not contain any extended/double-byte character set (DBCS) characters.
natural hierarchyA hiearchy in which at every level there is a one-to-many relationship between members in that level and members in the next lower level.
needle capOne of the two appearance properties that can be applied to a radial gauge.
nested queryA SELECT statement that contains one or more subqueries.
Net-LibraryA SQL Server communications component that isolates the SQL Server client software and the Database Engine from the network APIs.
network softwareSoftware that enables groups of computers to communicate, including a component that facilitates connection to or participation in a network.
new line characterA control character that causes the cursor on a display or the printing mechanism on a printer to move to the beginning of the next line.
nicknameWhen used with merge replication system tables, a name for another Subscriber that is known to already have a specified generation of updated data.
niladic functionsFunctions that do not have any input parameters.
NLS APISet of system functions in 32-bit Windows containing information that is based on language and cultural conventions.
nodeA synchronization provider and its associated replica.
noise wordA word such as 'the' or 'an' that is not useful for searches, or that a crawler should ignore when creating an index.
nonclustered indexA B-tree-based index in which the logical order of the index key values is different than the physical order of the corresponding rows in a table. The index contains row locators that point to the storage location of the table data.
non-contained databaseA SQL Server database that stores database settings and metadata with the instance of SQL Server Database Engine where the database is installed, and requires logins in the master database for authentication.
Nonkey index columnColumn in a nonclustered index that does not participate as a key column. Rather, the column is stored in the leaf-level of the index and is used in conjunction with the key columns to cover one or more queries.
nonleaf memberA member with one or more descendants.
nonnullable parameterA parameter which cannot take a NULL value.
nonrepeatable readAn inconsistency that occurs when a transaction reads the same row more than once, and a separate transaction modifies that row between reads.
normalization ruleA design rule that minimizes data redundancy and results in a database in which the Database Engine and application software can easily enforce integrity.
notificationA message or announcement sent to the user or administrator of a system. The recipient may be a human or an automated notification manager.
Notification ServicesA Microsoft SQL Server add-in that provides a development framework and hosting server for building and deploying notification applications.
NSControlThe command prompt utility for administering Notification Services instances and applications.
NULA "device," recognized by the operating system, that can be addressed like a physical output device (such as a printer) but that discards any information sent to it.
nullPertaining to a value that indicates missing or unknown data.
null keyA null value that is encountered in a key column.
null pointerA pointer to nothing: usually a standardized memory address, such as 0. A null pointer usually marks the last of a linear sequence of pointers or indicates that a data search operation has come up empty.
nullabilityThe attribute of a column, parameter, or variable that specifies whether it allows null data values.
nullable propertyA property which controls if a field can have a NULL value.
NUMA nodeA group of processors with its own memory and possibly its own I/O channels.
numeric arrayAn array composed of a collection of keys and a collection of values, where each key is associated with one value. The values can be of any type, but the keys must be numeric.
numeric expressionAny expression that evaluates to a number. The expression can be any combination of variables, constants, functions, and operators.
object identifierA number that identifies an object class or attribute. Object identifiers (OIDs) are organized into an industry-wide global hierarchy. An object identifier is represented as a dotted decimal string, such as 1.2.3.4, with each dot representing a new branch in the hierarchy. National/regional registration authorities issue root object identifiers to individuals or organizations, who manage the hierarchy below their root object identifier.
object lifetimeThe span of time a cached object resides in cache and is available to be retrieved by cache clients. The object expires when its lifetime ends. Expired objects cannot be retrieved by cache clients, but remain in memory of the cache host until they are evicted. Specified as time to live (TTL).
object variableA variable that contains a reference to an object.
ODS libraryA set of C functions that makes an application a server. ODS library calls respond to requests from a client in a client/server network. Also manages the communication and data between the client and the server. ODS library follows the tabular data stream (TDS) protocol.
Office File ValidationA security feature that validates files before allowing them to be loaded by the application, in order to protect against file format vulnerabilities.
offline restoreA restore during which the database is offline.
OLAPA technology that uses multidimensional structures to provide rapid access to data for analysis. The source data for OLAP is commonly stored in data warehouses in a relational database.
OLAP cubeA set of data that is organized and summarized into a multidimensional structure that is defined by a set of dimensions and measures.
OLAP databaseA relational database system capable of handling queries more complex than those handled by standard relational databases, through multidimensional access to data (viewing the data by several different criteria), intensive calculation capability, and specialized indexing techniques.
one-time passwordPasswords produced by special password generating software or by a hardware token and that can be used only once.
online analytical processingA technology that uses multidimensional structures to provide rapid access to data for analysis. The source data for OLAP is commonly stored in data warehouses in a relational database.
online restoreA restore in which one or more secondary filegroups, files belonging to secondary filegroups, or pages are restored while the database remains online. Online restore is available only in the SQL Server 2005 Enterprise Edition (including the Evaluation and Developer Editions).
Open Data Services libraryA set of C functions that makes an application a server. ODS library calls respond to requests from a client in a client/server network. Also manages the communication and data between the client and the server. ODS library follows the tabular data stream (TDS) protocol.
operation codeThe portion of a machine language or assembly language instruction that specifies the type of instruction and the structure of the data on which it operates.
operatorAn atomic unit of a query as scheduled by the StreamInsight server to process the events on which the query is applied. Examples include SELECT, PROJECT, AGGREGATE, UNION, TOP K and JOIN. Operators are fully composable and have a specific number of inputs and outputs. See Other Terms: query, query template, composable.
operatorA sign or symbol that specifies the type of calculation to perform within an expression. There are mathematical, comparison, logical, and reference operators.
optimistic concurrencyA method of managing concurrency by using a cached object's version information. Because every update to an object changes its version number, using version information prevents the update from overwriting someone else's changes.
optimize synchronizationAn option in merge replication that allows you to minimize network traffic when determining whether recent changes have caused a row to move into or out of a partition that is published to a Subscriber.
ordered setA set of members returned in a specific order.
origin objectAn object in a repository that is the origin in a directional relationship.
OTPPasswords produced by special password generating software or by a hardware token and that can be used only once.
outer joinA join that includes all the rows from the joined tables that meet the search conditions, even rows from one table for which there is no matching row in the other join table.
output adapterAn adapter that receives events processed by the server, transforms the events into a format expected by the output device (a database, text file, PDA, or other device), and emits the data to that device.
output columnIn SQL Server Integration Services, a column that the source adds to the data flow and that is available as input column to the next data flow component in the data flow.
output streamA flow of information that leaves a computer system and is associated with a particular task or destination.
overfittingA problem in data mining when random variations in data are misclassified as important patterns. Overfitting often occurs when the data set is too small to represent the real world.
ownership chainWhen an object references other objects and the calling and the called objects are owned by the same user. SQL Server uses the ownership chain to determine how to check permissions.
packageA collection of control flow and data flow elements that runs as a unit.
packetA unit of information transmitted from one computer or device to another on a network.
Pad indexAn option that specifies the space to leave open on each page in the intermediate levels of the index.
paddingIn data storage, the addition of one or more bits, usually zeros, to a block of data in order to fill it, to force the actual data bits into a certain position, or to prevent the data from duplicating a bit pattern that has an established meaning, such as an embedded command
pageTo return the results of a query in smaller subsets of data, thus making it possible for the user to navigate through the result set by viewing 'pages' of data.
pageIn a virtual storage system, a fixed-length block of contiguous virtual addresses copied as a unit from memory to disk and back during paging operations.
page faultThe interrupt that occurs when software attempts to read from or write to a virtual memory location that is marked "not present."
page restoreAn operation that restores one or more data pages. Page restore is intended for repairing isolated damaged pages.
pagerA pocket-sized wireless electronic device that uses radio signals to record incoming phone numbers or short text messages. Some pagers allow users to send messages as well.
paging systemA system that allows users to send and receive messages when they are out of range.
PALThe primary mechanism for securing the Publisher. It contains a list of logins, accounts, and groups that are granted access to the publication.
parallel executionThe apparently simultaneous execution of two or more routines or programs. Concurrent execution can be accomplished on a single process or by using time-sharing techniques, such as dividing programs into different tasks or threads of execution, or by using multiple processors.
parallel processingA method of processing that can run only on a computer that contains two or more processors running simultaneously. Parallel processing differs from multiprocessing in the way a task is distributed over the available processors. In multiprocessing, a process might be divided up into sequential blocks, with one processor managing access to a database, another analyzing the data, and a third handling graphical output to the screen. Programmers working with systems that perform parallel processing must find ways to divide a task so that it is more or less evenly distributed among the processors available.
parameterized queryA query that accepts input values through parameters.
parameterized reportA published report that accepts input values through parameters.
parameterized row filterA row filter available with merge replication that allows you to restrict the data replicated to a Subscriber based on a system function or user-defined function (for example: SUSER_SNAME()).
partial backupA backup of all the data in the primary filegroup, every read-write filegroup, and any optionally specified files. A partial backup of a read-only database contains only the primary filegroup.
partial database restoreA restore of only a portion of a database consisting of its primary filegroup and one or more secondary filegroups. The other filegroups remain permanently offline, though they can be restored later.
partial differential backupA partial backup that is differential relative to a single, previous partial backup (the base backup). For a read-only database, a partial differential backup contains only the primary filegroup.
participantA synchronization provider and its associated replica.
particleA very small piece or part; an indivisible object.
partition functionA function that defines how the rows of a partitioned table or index are spread across a set of partitions based on the values of certain columns, called partitioning columns.
partition schemeA database object that maps the partitions of a partition function to a set of filegroups.
partitioned indexAn index built on a partition scheme, and whose data is horizontally divided into units which may be spread across more than one filegroup in a database.
partitioned snapshotIn merge replication, a snapshot that includes only the data from a single partition.
partitioned tableA table built on a partition scheme, and whose data is horizontally divided into units which may be spread across more than one filegroup in a database.
partitioned table parallelismThe parallel execution strategy for queries that select from partitioned objects. As part of the execution strategy, the query processor determines the table partitions that are required for the query and the proportion of threads to allocate to each partition. In most cases, the query processor allocates an equal or almost equal number of threads to each partition, and then executes the query in parallel across the partitions.
partitioningThe process of replacing a table with multiple smaller tables.
partitioning columnThe column of a table or index that a partition function uses to partition a table or index.
partnerIn database mirroring, refers to the principal server or the mirror server.
pass orderThe order of evaluation (from highest to lowest calculation pass number) and calculation (from lowest to highest calculation pass number) for calculated members, custom members, custom rollup formulas, and calculated cells in a multidimensional cube.
pass phraseA sequence of words or other text used to gain access to a network, program, or data. A passphrase is generally longer for added security.
pass-through queryAn SQL-specific query you use to send commands directly to an ODBC database server.
pass-through statementA SELECT statement that is passed directly to the source database without modification or delay.
password policyA collection of policy settings that define the password requirements for a Group Policy object (GPO).
password providerA one-time-password generation and validation component for user authentication.
pathA data flow element that connects the output of one data flow component to the input of another data flow component.
PBMA set of built-in functions that return server state information about values, objects, and settings in SQL Server. Policy Based Management allows a database administrator to declare the desired state of the system and checks the system for compliance with that state.
peer-to-peer replicationA type of transactional replication. In contrast to read-only transactional replication and transactional replication with updating subscriptions, the relationships between nodes in a Peer to Peer replication topology are peer relationships rather than hierarchical ones, with each node containing identical schema and data.
performance toolsTools that you can use to evaluate the performance of a solution. Performance tools can have different purposes; some are designed to evaluate end-to-end performance while others focus on evaluating performance of a particular aspect of a solution.
persisted computed columnA computed column of a table that is physically stored, and whose values are updated when any other columns that are part of its computation change. Applying the persisted property to a computed column allows for indexes to be created on it when the column is deterministic, but not precise.
persistence databaseA type of persistence store that stores workflow instance state and workflow instance metadata in a SQL Server database.
perspectiveA user-defined subset of a cube, whereas a view is a user-defined subset of tables and columns in a relational database.
pessimistic concurrencyA method of managing concurrency by using a lock technique to prevent other clients from updating the same object at the same time.
phantomPertaining to the insertion of a new row or the deletion of an existing row in a range of rows that were previously read by another task, where that task has not yet committed its transaction.
PHPAn open source scripting language that can be embedded in HTML documents to execute interactive functions on a Web server. It is generally used for Web development.
PHP:Hypertext PreprocessorAn open source scripting language that can be embedded in HTML documents to execute interactive functions on a Web server. It is generally used for Web development.
physical nameThe name of the path where a file or mirrored file is located. The default is the path of the Master.dat file followed by the first eight characters of the file's logical name.
physical storageThe amount of RAM memory in a system, as distinguished from virtual memory.
Pickup folderThe directory from which messages are picked up.
piecemeal restoreA composite restore in which a database is restored in stages, with each stage corresponding to a restore sequence. The initial sequence restores the files in the primary filegroup, and, optionally, other files, to any point in time supported by the recovery model and brings the database online. Subsequent restore sequences bring remaining files to the point consistent with the database and bring them online.
PINA unique and secret identification code similar to a password that is assigned to an authorized user and used to gain access to personal information or assets via an electronic device.
PInvokeThe functionality provided by the common language runtime to enable managed code to call unmanaged native DLL entry points.
pivotTo rotate a table-valued expression by turning the unique values from one column in the expression into multiple columns in the output, and perform aggregations where they are required on any remaining column values that are wanted in the final output.
pivot currencyThe currency against which exchange rates are entered in the rate measure group.
PivotTableAn interactive technology in Microsoft Excel or Access that can show dynamic views of the same data from a list or a database.
PL/SQLOracle's data manipulation language that allows sequenced or grouped execution of SQL statements and is commonly used to manipulate data in an Oracle database. The syntax is similar to the Ada programming language.
placeholder itemAn artificial address, instruction, or other datum fed into a computer only to fulfill prescribed conditions and not affecting operations for solving problems.
plaintextData in its unencrypted or decrypted form.
plan guideA SQL Server module that attaches query hints to queries in deployed applications, without directly modifying the query.
planarIn computer graphics, lying within a plane.
platform invokeThe functionality provided by the common language runtime to enable managed code to call unmanaged native DLL entry points.
platform layerThe layer that includes the physical servers and services that support the services layer. The platform layer consists of many instances of SQL Server, each of which is managed by the SQL Azure fabric.
PMMLAn XML-based language that enables sharing of defined predictive models between compliant vendor applications.
Point and Figure chartA chart that plots day-to-day price movements without taking into consideration the passage of time.
point depthThe depth of data points displayed in a 3D chart area.
point eventAn event occurrence as of a single point in time. Only the start time is required for the event. The CEP server infers the valid end time by adding a tick (the smallest unit of time in the underlying time data type) to the start time to set the valid time interval for the event. Point events are valid only for this single instant of time.
point event modelThe event model of a point event.
point layerThe layer in a map report that displays spatial data as points, for examples, points that indicate cities or points of interest.
pointerA needle, marker, or bar that indicates a single value displayed against a scale on a report.
point-in-time recoveryThe process of recovering only the transactions within a log backup that were committed before a specific point in time, instead of recovering the whole backup.
poison messageA message containing information that an application cannot successfully process. A poison message is not a corrupt message, and may not be an invalid request.
policy moduleA Certificate Services component that determines whether a certificate request should be automatically approved, denied, or marked as pending.
policy-based managementA set of built-in functions that return server state information about values, objects, and settings in SQL Server. Policy Based Management allows a database administrator to declare the desired state of the system and checks the system for compliance with that state.
pollerA component or interface that monitors the status of other components. It performs this function by repeatedly polling the other component to provide its current status.
pollingThe process of periodically determining the status of each device in a set so that the active program can process the events generated by each device, such as whether a mouse button was pressed or whether new data is available at a serial port. This can be contrasted with event-driven processing, in which the operating system alerts a program or routine to the occurrence of an event by means of an interrupt or message rather than having to check each device in turn.
polling queryA singleton query that returns a value Analysis Services can use to determine if changes have been made to a table or other relational object.
polygon layerThe layer in a map report that displays spatial data as areas, for example, areas that indicate geographical regions such as counties.
populationThe process of scanning content to compile and maintain an index.
positioned updateAn update, insert, or delete operation performed on a row at the current position of the cursor.
Power PivotA SQL Server add-in for Excel.
Power Pivot dataA SQL Server Analysis Services cube that is created and embedded through Microsoft SQL Server Power Pivot for Microsoft Excel.
Power Pivot for SharePointA Microsoft SQL Server technology that provides query processing and management control for Power Pivot workbooks published to SharePoint.
Power Pivot serviceA middle tier service of the Analysis Services SharePoint integration feature that allocates requests, monitors server availability and health, and communicates with other services in the farm.
Power Pivot service applicationA specific configuration of the Power Pivot service.
Power Pivot Web serviceA Web service that performs request redirection for processing requests that are directed to a Power Pivot Engine service instance that is outside the farm.
Power Pivot workbookAn Excel 2010 workbook that contains Power Pivot data.
PowerShell-based cache administration toolThe exclusive management tool for Windows Server AppFabric. With more than 130 standard command-line tools, this new administration-focused scripting language helps you achieve more control and productivity.
precedence constraintA control flow element that connects tasks and containers into a sequenced workflow.
precomputed partitionA performance optimization that can be used with filtered merge publications.
predictable columnA data mining column that the algorithm will build a model around based on values of the input columns. Besides serving as an output column, a predictable column can also be used as input for other predictable columns within the same mining structure.
predictionA data mining technique that analyzes existing data and uses the results to predict values of attributes for new records or missing attributes in existing records. For example, existing credit application data can be used to predict the credit risk for a new application.
Prediction CalculatorA new report that is based on logistic regression analysis and that presents each contributing factor together with a score calculated by the algorithm. The report is presented both as a worksheet that helps you enter data and make calculations of the probable outcomes, and as a printed report that does the same thing.
prefix charactersA set of 1 to 4 bytes that prefix each data field in a native-format bulk-copy data file.
prefix lengthThe number of prefix characters preceding each noncharacter field in a bcp native format data file.
prerequisite knowledgeThe minimum knowledge that a destination provider is required to have to process a change or change batch.
presentation modelA data model that aggregates data from multiple entities in the data access layer. It is used to avoid directly exposing an entity to the client project.
primary databaseA read-write database containing the active data of an application.
primary dimension tableIn a snowflake schema in a data warehouse, a dimension table that is directly related to, and usually joined to, the fact table.
primary DPM serverA DPM server that protects file or application data sources.
primary keyOne or more fields that uniquely identify each record in a table. In the same way that a license plate number identifies a car, the primary key uniquely identifies a record.
primary protectionA type of protection in which data on the protected server is directly protected by a primary DPM Server.
primary serverIn a log shipping configuration, the server instance where the primary database resides.
primary tableThe "one" side of two related tables in a one-to-many relationship. A primary table should have a primary key and each record should be unique.
principal databaseIn database mirroring, a read-write database whose transaction log is continuously sent to the mirror server, which restores the log to the mirror database.
principal serverIn database mirroring, the partner whose database is currently the principal database.
priority boostAn advanced option that specifies whether Microsoft® SQL Server™ should run at a higher Microsoft Windows NT® scheduling priority than other processes on the same computer.
private keyThe secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key.
proactive cachingA system that manages data obsolescence in a cube by which objects in MOLAP storage are automatically updated and processed in cache while queries are redirected to ROLAP storage.
procedure cacheThe part of the SQL Server memory pool that is used to store execution plans for Transact-SQL batches, stored procedures, and triggers.
profile templateThe core of all Certificate Lifecycle Manager (CLM) management activities. The profile template provides a single administrative unit that includes all information necessary to manage the multiple certificates that might be required by a user community throughout the certificate’s lifecycle. A profile template also includes information regarding the final location of those certificates, which can be software-based (that is, stored on the local computer) or hardware-based (stored on a smart card). A profile template cannot include both software-based and smart card-based certificates.
profit chartA diagram that displays the theoretical increase in profit that is associated with using various data models.
programmableCapable of accepting instructions for performing a task or an operation. Being programmable is a characteristic of computers.
properties pageA dialog box that displays information about an object in the interface.
propertyAttribute or characteristic of an object that is used to define its state, appearance, or value.
property mappingA mapping between a variable and a property of a package element.
property pageA grouping of properties presented as a tabbed page of a property sheet.
protected computerA computer that contains data sources that are protection group members.
protected memberA data source within a protection group.
protocolA standard set of formats and procedures that enable computers to exchange information.
providerAn in-process dynamic link library (DLL) that provides access to a database.
providerA software component that allows a replica to synchronize its data with other replicas.
provider objectAn object that's part of a data provider such as Oracle Provider for SQL Server.
proximity searchFull-text query searching for those occurrences where the specified words are close to one another.
proxy accountAn account that is used to provide additional permissions for certain actions to users which do not have these permissions but have to execute these actions.
public keyThe nonsecret half of a cryptographic key pair that is used with a public key algorithm. Public keys are typically used when encrypting a session key, verifying a digital signature, or encrypting data that can be decrypted with the corresponding private key.
publicationA collection of one or more articles from one database.
publication access listThe primary mechanism for securing the Publisher. It contains a list of logins, accounts, and groups that are granted access to the publication.
publication databaseA database on the Publisher from which data and database objects are marked for replication and propagated to Subscribers.
publication retention periodIn merge replication, the amount of time a subscription can remain unsynchronized.
published dataData at the Publisher that has been replicated.
PublisherA server that makes data available for replication to other servers. A Publisher also detects changed data and maintains information about all publications at the site.
publisher databaseA server that makes data available for replication to other servers. A Publisher also detects changed data and maintains information about all publications at the site.
publishing serverA server running an instance of Analysis Services that stores the source cube for one or more linked cubes.
publishing tableThe table at the Publisher in which data has been marked for replication and is part of a publication.
pullThe process of retrieving data from a network server.
pull replicationReplication that is invoked at the target.
pull subscriptionA subscription created and administered at the Subscriber. The Distribution Agent or Merge Agent for the subscription runs at the Subscriber.
pure log backupA backup containing only the transaction log covering an interval without any bulk changes.
pushThe process of sending data to a network server.
push replicationReplication that is invoked at the source.
push subscriptionA subscription created and administered at the Publisher.
qualified componentA method of identifying a component in an MSI database indirectly by a pair "component category GUID, string qualifier" instead of identifying it directly by the component identifier.
qualifierA modifier containing information that describes a class, instance, property, method, or parameter. Qualifiers are defined by the Common Information Model (CIM), by the CIM Object Manager, and by developers.
qualifier flavorA flag that provides additional information about a qualifier, such as whether a derived class or instance can override the qualifier's original value.
quantumA brief period of time when a given thread executes in a multitasking operating system. It performs the multitasking before it is rescheduled against other threads with the same priority. Previously known as a "time slice."
queryAn instance of a query template that runs continuously in the StreamInsight server processing events received from instances of input adapters to which the query is bound and sending processed events to instances of output adapters to which it is bound.
query binderAn object that binds an existing StreamInsight query template to specific input and output adapters.
query bindingThe process of binding instances of input adapters and instances of output adapters to an instance of a query template.
query designerA tool that helps a user create the query command that specifies the data the user wants in a report dataset.
query governorA configuration option that can be used to prevent system resources from being consumed by long-running queries.
query hintA hint that specifies that the indicated hints should be used throughout the query. Query hints affect all operators in the statement.
query optimizerA database engine component responsible for generating efficient execution plans for statements.
query templateThe fundamental unit of query composition. A query template defines the business logic required to continuously analyze and process events submitted to and emitted by the StreamInsight server.
question templateA structure that describes a set of questions that can be asked using a particular relationship or set of relationships.
Queue Reader AgentThe executable that reads the changes from subscribers in the queue and delivers the changes to the publisher.
quorumIn a database mirroring session with a witness server, a relationship in which the servers that can currently communicate with each other arbitrate who owns the role of principal server.
quoted identifierAn object in a database that requires the use of special characters (delimiters) because the object name does not comply with the formatting rules of regular identifiers.
RADA method of building computer systems in which the system is programmed and implemented in segments, rather than waiting until the entire project is completed for implementation. Developed by programmer James Martin, RAD uses such tools as CASE and visual programming.
ragged hierarchyA hierarchy in which one or more levels do not contain members in one or more branches of the hierarchy.
rangeA set of continuous item identifiers to which the same clock vector applies. A range is represented by a starting point, an ending point, and a clock vector that applies to all IDs that are in between.
range partitionA table partition that is defined by specific and customizable ranges of data.
range partitioningA way of partitioning a table or index by specifying partitions to hold rows with ranges of values from a single partitioning column.
range queryA query that specifies a range of values as part of the search criteria, such as all rows from 10 through 100.
ranking functionFunction that returns ranking information about each row in the window (partition) of a result set depending on the row's position within the window.
rapid application developmentA method of building computer systems in which the system is programmed and implemented in segments, rather than waiting until the entire project is completed for implementation. Developed by programmer James Martin, RAD uses such tools as CASE and visual programming.
rate of changeThe rate of price change compared with historical data. The rate of change is calculated against a period of days prior to the current price. The output is a percentage.
raw destination adapterAn SSIS destination that writes raw data to a file.
raw fileA native format for fast reading and writing of data.
Raw File destinationAn SSIS destination that writes raw data to a file.
Raw File sourceAn SSIS source that reads raw data from a file.
raw source adapterAn SSIS source that reads raw data from a file.
RDAA service that provides a simple way for a smart device application to access (pull) and send (push) data to and from a remote SQL Server database table and a local SQL Server Mobile Edition database table. RDA can also be used to issue SQL commands on a server running SQL Server.
RDBMSA database system that organizes data into related rows and columns as specified by a relational model.
RDLA set of instructions that describe layout and query information for a report. RDL is composed of XML elements that conform to an XML grammar created for Reporting Services.
RDL SandboxingA feature that makes it possible to detect and restrict specific types of resource use by individual tenants in a scenario where multiple tenants share a single Web farm of report servers.
record setA data structure made up of a group of database records. It can originate from a base table or from a query to the table.
recoverTo put back into a stable condition. A computer user may be able to recover lost or damaged data by using a program to search for and salvage whatever information remains in storage. A database may be recovered by restoring its integrity after some problem has damaged it, such as abnormal termination of the database management program.
recoveryA phase of database startup that brings the database into a transaction-consistent state. Recovery can include rolling forward all the transactions in the log records (the redo phase) and rolling back uncommitted transactions (the undo phase), depending on how the database was shut down.
recovery branchA range of LSNs that share the same recovery branch GUID. A new recovery branch originates when a database is created or when RESTORE WITH RECOVERY generates a recovery fork. A multiple-branch recovery path is possible that includes ranges of LSNs that cover two or more recovery fork points.
recovery fork pointThe point (LSN,GUID) at which a new recovery branch is started, every time a RESTORE WITH RECOVERY is performed. Each recovery fork determines a parent-child relationship between the recovery branches. If you recover a database to an earlier point in time and begin using the database from that point, the recovery fork point starts a new recovery path.
recovery intervalThe maximum amount of time that the Database Engine should require to recover a database.
recovery modelA database property that controls the basic behavior of backup and restore operations for a database. For instance, the recovery model controls how transactions are logged, whether the transaction log requires backing up, and what kinds of restore operations are available.
recovery pathThe sequence of data and log backups that have brought a database to a particular point in time (known as a recovery point). A recovery path is a specific set of transformations that have evolved the database over time, yet have maintained the consistency of the database. A recovery path describes a range of LSNs from a start point (LSN,GUID) to an end point (LSN,GUID). The range of LSNs in a recovery path can traverse one or more recovery branches from start to end.
recovery pointThe point in the log chain at which rolling forward stops during a recovery.
rectangleA report item that can be used as a container for multiple report items or as a graphical element on a report.
recursive hierarchyA hierarchy of data in which all parent-child relationships are represented in the data.
recursive partitioningThe iterative process, used by data mining algorithm providers, of dividing data into groups until no more useful groups can be found.
redoThe phase during recovery that applies (rolls forward) logged changes to a database to bring the data forward in time.
redo phaseThe phase during recovery that applies (rolls forward) logged changes to a database to bring the data forward in time.
redo setThe set of all files and pages being restored.
reference dataData characterized by shared read operations and infrequent changes. Examples of reference data include flight schedules and product catalogs. Windows Server AppFabric offers the local cache feature for storing this type of data.
reference dimensionA relationship between a dimension and a measure group in which the dimension is coupled to the measure group through another dimension.
reference tableThe source table to use in fuzzy lookups.
referenced keyA primary key or unique key referenced by a foreign key.
referencing keyA key in a database table that comes from another table (also know as the "referenced table") and whose values match the primary key (PK) or unique key in the referenced table.
reflexive relationshipA relationship from a column or combination of columns in a table to other columns in that same table.
regionA container of data, within a cache, that co-locates all cached objects on a single cache host. Cache Regions enable the ability to search all cached objects in the region by using descriptive strings, called tags.
regionA collection of 128 leaf level pages in logical order in a single file. Used to identify areas of a file that are fragmented.
registration modelA defined method for submitting and approving enrollment requests. An enterprise generally chooses one registration model and modifies their management policies accordingly.
regressionThe statistical process of predicting one or more continuous variables, such as profit or loss, based on other attributes in the dataset.
regressorAn input variable that has a linear relationship with the output variable.
relational database management systemA database system that organizes data into related rows and columns as specified by a relational model.
relational engineA component of SQL Server that works with the storage engine. It is responsible for interpreting Transact-SQL search queries and mapping out the most efficient methods of searching the raw physical data provided by the storage engine and returning the results to the user.
relational OLAPA storage mode that uses tables in a relational database to store multidimensional structures.
relational storeA data repository structured in accordance with the relational model.
relationship objectAn object representing a pair of objects that assume a role in relation to each other.
relative dateA range of dates that is specified by using comparison operators and return data for a range of dates.
remote dataData stored in an OLE DB data source that is separate from the current instance of SQL Server.
remote data accessA service that provides a simple way for a smart device application to access (pull) and send (push) data to and from a remote SQL Server database table and a local SQL Server Mobile Edition database table. RDA can also be used to issue SQL commands on a server running SQL Server.
remote DistributorA server configured as a Distributor that is separate from the server configured as the Publisher.
remote login identificationThe login identification assigned to a user for accessing remote procedures on a remote server.
remote partitionA partition whose data is stored on a server running an instance of Analysis Services, other than the one used to store the metadata of the partition.
remote service bindingA Service Broker object that specifies the local security credentials for a remote service.
remote stored procedureA stored procedure located on one instance of SQL Server that is executed by a statement on another instance of SQL Server.
remote tableA table stored in an OLE DB data source that is separate from the current instance of SQL Server.
rendered outputThe output from a rendering extension.
rendered reportA fully processed report that contains both data and layout information, in a format suitable for viewing (such as HTML).
rendering extensionA plug-in that renders reports to a specific format (for example, an Excel rendering extension)
rendering object modelReport object model used by rendering extensions.
replicaA complete copy of protected data residing on a single volume on the DPM server. A replica is created for each protected data source after it is added to its protection group. With co-location, multiple data sources can have their replicas residing on the same replica volume.
replicaA particular repository of information to be synchronized.
replica IDA value that uniquely identifies a replica.
replica keyA 4-byte value that maps to a replica ID in a replica key map.
replica tick countA monotonically increasing number that is used to uniquely identify a change to an item in a replica.
replicationThe process of copying content and/or configuration settings from one location, generally a server node, to another. Replication is done to ensure synchronization or fault tolerance.
Replication Management ObjectsA managed code assembly that encapsulates replication functionalities for SQL Server.
Report BuilderA report authoring tool that features a Microsoft Office-like authoring environment and features such as new sparkline, data bar, and indicator data visualizations, the ability to save report items as report parts, a wizard for creating maps, aggregates of aggregates, and enhanced support for expressions.
report data paneA data pane that displays a hierarchical view of the items that represent data in the user's report. The top level nodes represent built-in fields, parameters, images, and data source references.
report definitionThe blueprint for a report before the report is processed or rendered. A report definition contains information about the query and layout for the report.
Report Definition LanguageA set of instructions that describe layout and query information for a report. RDL is composed of XML elements that conform to an XML grammar created for Reporting Services.
Report DesignerA collection of design surfaces and graphical tools that are hosted within the Microsoft Visual Studio environment.
report execution snapshotA report snapshot that is cached. Report administrators create report execution snapshots if they want to run reports from static copies.
report historyA collection of previously run copies of a report.
report history snapshotReport history that contains data captured at a specific point in time.
report intermediate formatInternal representation of a report.
report itemEntity on a report.
report layout templateA pre-designed table, matrix, or chart report template in Report Builder.
report linkURL to a report.
Report ManagerA Web-based report management tool
report modelA metadata description of business data used for creating ad hoc reports.
report partA report item that has been published separately to a report server and that can be reused in other reports.
Report Processor componentA component that retrieves the report definition from the report server database and combines it with data from the data source for the report.
Report ProjectA template in the report authoring environment.
Report Project WizardA wizard in the report authoring environment used to create reports.
report renderingThe action of combining the report layout with the data from the data source for the purpose of viewing the report.
report serverA location on the network where Report Builder is launched from and a report is saved, managed, and published.
report server administratorA user with elevated privileges who can access all settings and content of a report server. A report server administrator is a user who is assigned to the Content Manager role, the System Administrator role, or both. All local administrators are automatically report server administrators, but additional users can become report server administrators for all or part of the report server namespace.
report server databaseA database that provides internal storage for a report server.
report server execution accountThe account under which the Report Server Web service and Report Server Windows service run.
Report Server Web serviceA Web service that hosts, processes, and delivers reports.
report snapshotA static report that contains data captured at a specific point in time.
report-specific scheduleSchedule defined inline with a report. Report-specific schedules are defined in the context of an individual report, subscription, or report execution operation to determine cache expiration or snapshot updates.
repositoryA database containing information models that, in conjunction with the executable software, manage the database.
repository engineObject-oriented software that provides management support for and customer access to a repository database.
repository objectA COM object that represents a data construct stored in a repository type library.
Repository SQL schemaA set of standard tables used by the repository engine to manage all repository objects, relationships, and collections.
Repository Type Information ModelA core object model that represents repository type definitions for Metadata Services.
republisherA Subscriber that publishes data that it has received from a Publisher.
reserved characterA keyboard character that has a special meaning to a program and, as a result, normally cannot be used in assigning names to files, documents, and other user-generated tools, such as macros. Characters commonly reserved for special uses include the asterisk (*), forward slash (/), backslash (\), question mark (?), and vertical bar (|).
resolution strategyA set of criteria that the repository engine evaluates sequentially when selecting an object, where multiple versions exist and version information is unspecified in the calling program.
resourceA special variable that holds a reference to a database connection or statement.
resourceAny item in a report server database that is not a report, folder, or shared data source item.
resource dataA type of data that is characterized by shared, concurrently read and written into operations, and accessed by many transactions. Examples of resource data include user accounts and auction items.
resource governorA feature in SQL Server 2008 that enables the user to manage SQL Server workload and resources by specifying limits on resource consumption by incoming requests.
restoreA multi-phase process that copies all the data and log pages from a specified backup to a specified database (the data-copy phase) and rolls forward all the transactions that are logged in the backup (the redo phase). At this point, by default, a restore rolls back any incomplete transactions (the undo phase), which completes the recovery of the database and makes it available to users.
restore sequenceA sequence of one or more restore commands that, typically, initializes the contents of the database, files, and/or pages being restored (the data-copy phase), rolls forward logged transactions (the redo phase), and rolls back uncommitted transactions (the undo phase).
result setThe set of records that results from running a query or applying a filter.
resultsThe set of records that results from running a query or applying a filter.
results paneA pane that displays details about an item selected in another portion of the user interface. For example, in Microsoft Management Console (MMC), the details pane is the right pane that displays details for the selected item in the console tree.
retract eventAn internal event kind used to modify an existing insert event by modifying the end time of the event.
reusable bookmarkA bookmark that can be consumed from a rowset for a given table and used on a different rowset of the same table to position on a corresponding row.
revocation delayThe period of time between when the credential revocation request is placed and when the credentials are actually revoked.
RIAA web application that provides a user interface which is more similar to a desktop application than typical web pages. It is able to process user actions without posting the whole web page to a web server.
RIA Services linkA project-to-project link reference that facilitates generating presentation tier code from middle tier code.
rich Internet applicationA web application that provides a user interface which is more similar to a desktop application than typical web pages. It is able to process user actions without posting the whole web page to a web server.
right outer joinAn outer join in which all the records from the right side of the RIGHT JOIN operation in the query's SQL statement are added to the query's results, even if there are no matching values in the joined field from the table on the left.
ring indexAn index that indicates the number of rings in a polygon instance.
RMOA managed code assembly that encapsulates replication functionalities for SQL Server.
role assignmentThe assignment of a specific role that determines whether a user or group can access a specific item and perform an operation on it.
role definitionThe collection of task permissions associated with a role.
role switchingIn a database mirroring session, the taking over of the principal role by the mirror.
role-playing dimensionA single database dimension joined to the fact table on a different foreign keys to produce multiple cube dimensions.
roll backTo reverse changes.
roll forwardTo apply logged changes to the data in a roll forward set to bring the data forward in time.
roll forward setThe set of all data restored by a restore sequence. A roll forward set is defined by restoring a series of one or more data backups.
roll upTo collect subsets of data from multiple locations in one location.
rollover fileA file created when the file rollover option causes SQL Server to close the current file and create a new file when the maximum file size is reached.
routeA Service Broker object that specifies the network address for a remote service.
routing clientA type of cache client that includes a routing table that is maintained by lead hosts in the cluster and enables the client to obtain cached data directly from the cache host on which the data resides.
routing tableA data structure used by the routing client to track the connectivity information of all cache hosts in the cache cluster. It is maintained by lead hosts in the cluster. It allows a routing client to obtain cached data directly from the cache host on which the data resides.
row aggregate functionA function that generates summary values, which appear as additional rows in the query results.
row lockA lock on a single row in a table.
row versioningIn 0nline index operations, a feature that isolates the index operation from the effects of modifications that are made by other transactions.
row-overflow datavarchar, nvarchar, varbinary, or sql_variant data stored off the main data page of a table or index as a result of the combined widths of these columns exceeding the 8,060-byte row limit in a table.
rowsetA set of rows in which each row has one or more columns of data.
rs utilityReport scripting tool.
rs.exeReport scripting tool.
rsconfig utilityServer connection management tool.
rsconfig.exeServer connection management tool.
rule firingThe process of running one of the application rules (event chronicle rules, subscription event rules, and subscription scheduled rules) defined in the application definition file.
runaway queryA query with an excessive running time, that can lead to a blocking problem. Runaway queries usually do not use use a query or lock time out.
run-time errorA software error that occurs while a program is being executed, as detected by a compiler or other supervisory program.
safe codeCode that is executed by the common language runtime environment rather than directly by the operating system. Managed code applications gain common language runtime services such as automatic garbage collection, runtime type checking and security support, and so on. These services help provide uniform platform- and language-independent behavior of managed-code applications.
samplingA statistical process that yields some inferential knowledge about a population or data set of interest as a whole by observing or analyzing a portion of the population or data set.
save processThe process of writing data to disk.
savepointA location to which a transaction can return if part of the transaction is conditionally canceled or encounters an error, hence offering a mechanism to roll back portions of transactions.
SBCSA character encoding in which each character is represented by 1 byte. Single byte character sets are mathematically limited to 256 characters.
scalarA factor, coefficient, or variable consisting of a single value (as opposed to a record, an array, or some other complex data structure).
scalar-valued functionA function that returns a single value, such as a string, integer, or bit value.
scale break lineA line drawn across a chart area to indicate a significant gap between a high and low range of values on the chart.
scale-out deploymentA deployment model in which an installation configuration has multiple report server instances sharing a single report server database.
Scheduling and Delivery ProcessorA component of the report server engine that handles scheduling and delivery. Works with SQL Agent.
schema rowsetA specially defined rowset that returns metadata about objects or functionality on an instance of SQL Server or Analysis Services. For example, the OLE DB schema rowset DBSCHEMA_COLUMNS describes columns in a table, while the Analysis Services schema rowset MDSCHEMA_MEASURES describes the measures in a cube.
schema snapshotA snapshot that includes schema for published tables and objects required by replication (triggers, metadata tables, and so on), but not user data.
schema-awarePertaining to a processing method based on a schema that defines elements, attributes and types that will be used to validate the input and output documents.
scopeThe extent to which an identifier, such as an object or property, can be referenced within a program. Scope can be global to the application or local to the active document.
scopeThe set of data that is being synchronized.
script memoryThe local memory (the client-side RAM) that is used by a PHP script.
script paneThe text editor portion of the Table Designer.
scriptingPertaining to the automation of user actions or the configuration of a standard state on a computer by means of scripts.
SDKA set of routines (usually in one or more libraries) designed to allow developers to more easily write programs for a given computer, operating system, or user interface.
search conditionIn a WHERE or HAVING clause, predicates that specify the conditions that the source rows must meet to be included in the SQL statement.
search keyThe value that is to be searched for in a document or any collection of data.
secondary databaseA read-only copy of a primary database.
secondary DPM serverA DPM server that protects one or more primary DPM servers in addition to file and application data.
secondary protectionA type of protection in which data on the protected server is protected by a primary DPM server and the replica on the primary DPM server is protected by a secondary DPM server.
secondary serverIn a log shipping configuration, the server instance where the secondary database resides. At regular intervals, the secondary server copies the latest log backup from the primary database and restores the log to the secondary database. The secondary server is a warm standby server.
secret providerA one-time-password generation and validation component for user authentication.
securableEntities that can be secured with permissions. The most prominent securables are servers and databases, but discrete permissions can be set at a much finer level.
Secure Sockets LayerThe protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation.
security extensionA component in Reporting Services that authenticates a user or group to a report server.
security IDIn Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created.
security identifierIn Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created.
segmentationA data mining technique that analyzes data to discover mutually exclusive collections of records that share similar attributes sets.
self-joinA join in which records from a table are combined with other records from the same table when there are matching values in the joined fields. A self-join can be an inner join or an outer join. In database diagrams, a self-join is called a reflexive relationship.
self-service registration modelA Certificate Lifecycle Manager (CLM) registration model in which a certificate subscriber performs or requests certificate management activities directly using a Web-based interface.
self-tracking entityAn entity built from a Text Template Transformation Toolkit (T4) template that has the ability to record changes to scalar, complex, and navigation properties.
Semantic Model Definition LanguageA set of instructions that describe layout and query information for reports created in Report Builder.
semantic objectAn object that can be represented by a database object or other real-world object.
semantic validationThe process of confirming that the elements of an XML file are logically valid.
semiadditive measureA measure that can be summed along one or more, but not all, dimensions in a cube.
sensitive cursorA cursor that can reflect data modifications made to underlying data by other users while the cursor is open.
sensitive dataPersonally identifiable information (PII) that is protected in special ways by law or policy.
sequenced collectionA collection of destination objects of a sequenced relationship object.
sequenced relationshipA relationship in a repository that specifies explicit positions for each destination object within the collection of destination objects.
serial numberA number assigned to a specific inventory item to identify it and differentiate it from similar items with the same item number.
serializationThe process of converting an object's state information into a form that can be stored or transported. During serialization, an object writes its current state to temporary or persistent storage. Later, the object can be recreated by reading, or deserializing, the object's state from storage.
serverA computer that provides shared resources, such as files or printers, to network users.
server collationThe collation for an instance of SQL Server.
server cursorA cursor implemented on the server.
server nameA name that uniquely identifies a server computer on a network.
server subscriptionA subscription to a merge publication with an assigned priority value used for conflict detection and resolution.
serviceA program, routine, or process that performs a specific system function to support other programs.
Service BrokerA technology that helps developers build scalable, secure database applications.
service connection pointAn Active Directory node on which system administrators can define Certificate Lifecycle Manager (CLM) management permissions for users and groups.
service principalA globally-unique name associated with a service entity at an endpoint node within a Kerberos peer-to-peer communication.
service principal nameThe name by which a client uniquely identifies an instance of a service. It is usually built from the DNS name of the host. The SPN is used in the process of mutual authentication between the client and the server hosting a particular service.
service programA program that uses Service Broker functionality. A service program may be a Transact-SQL stored procedure, a SQLCLR stored procedure, or an external program.
sessionA period of time when a connection is active and communication can take place. For the purpose of data communication between functional units, session also refers to all the activities that take place during the establishment, maintenance, and release of the connection.
session stateIn ASP.NET, a variable store created on the server for the current user; each user maintains a separate Session state on the server. Session state is typically used to store user-specific information between postbacks.
setA grouping of dimension members or items from a data source that are named and treated as a single unit and can be referenced or reused multiple times.
setup initialization fileA text file, using the Windows .ini file format, that stores configuration information allowing SQL Server to be installed without a user having to be present to respond to prompts from the Setup program.
setup repairAn error reporting process that may run during the setup of a program if a problem occurs.
shadow copyA static image of a set of data, such as the records displayed as the result of a query.
shapefileA public domain format for the interchange of spatial data in geographic information systems. Shapefiles have the file name extension ".shp".
shardingA technique for partitioning large data sets, which improves performance and scalability, and enables distributed querying of data across multiple tenants.
shared codeCode that is specifically designated to exist without modification in the server project and the client project.
shared data source itemData source connection information that is encapsulated in an item. Can be managed as an item in the report server folder namespace.
shared dimensionA dimension created within a database that can be used by any cube in the database.
shared lockA lock created by nonupdate (read) operations.
shared scheduleSchedule information that can be referenced by multiple items.
shopping basket analysisA standard data mining algorithm that analyzes a list of transactions to make predictions about which items are most frequently purchased together.
showplanA report showing the execution plan for an SQL statement.
SIDIn Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created.
significanceOne of the arguments of the FLOOR function.
Silverlight business applicationA template that provides many common features for building a business application with a Silverlight client. It utilizes WCF RIA Services for authentication and registration services.
simple clientA type of cache client that does not have a routing table and thus does not need network connectivity to all cache hosts in the cache cluster. Because data traveling to simple clients from the cluster may need to travel across multiple cache hosts, simple clients may not perform as fast as a routing clients.
Simple Mail Transfer ProtocolA member of the TCP/IP suite of protocols that governs the exchange of electronic mail between message transfer agents.
simple recovery modelA database recovery mode that minimally logs all transactions sufficiently to ensure database consistency after a system crash or after restoring a data backup. The database is recoverable only up to the time of its most recent data backup, and restoring individual pages is unsupported.
single-byte character setA character encoding in which each character is represented by 1 byte. Single byte character sets are mathematically limited to 256 characters.
single-precisionOf or pertaining to a floating-point number having the least precision among two or more options commonly offered by a programming language, such as single-precision versus double-precision.
single-user modeA state in which only one user can access a resource.
sinkA device or part of a device that receives something from another device.
SKUA unique identifier, usually alphanumeric, for a product. The SKU allows a product to be tracked for inventory purposes. An SKU can be associated with any item that can be purchased. For example, a shirt in style number 3726, size 8 might have a SKU of 3726-8.
sleepTo suspend operation without terminating.
sliceA subset of the data in a cube, specified by limiting one or more dimensions by members of the dimension.
SlicersA feature that provides one-click filtering controls that make it easy to narrow down the portion of a data set that's being looked at.
sliding windowA window of fixed length L that moves along a timeline according to the stream’s events. With every event on the timeline, a new window is created, starting at the event’s start time.
slipstreamTo integrate updates, patches or service packs into the base installation files of the original software, so that the resulting files will allow a single step installation of the updated software.
slipstream installationA type of installation that integrates the base installation files for an operating system or program with its service packs, updates or patches, and enables them to be installed in a single step.
smart cardA plastic (credit card–sized or smaller) device with an embedded microprocessor and a small amount of storage that is used, with an access code, to enable certificate-based authentication. Smart cards securely store certificates, public and private keys, passwords, and other types of personal information.
Smart Card Personalization ControlAn ActiveX control that performs all Certificate Lifecycle Manager (CLM) smart card application management activities on a client computer.
smart card profileA Certificate Lifecycle Manager (CLM) profile created when a request is performed using a profile template that only includes smart card-based certificate templates.
smart card readerA device that is installed in computers to enable the use of smart cards for enhanced security features.
Smart Card Self Service ControlSoftware installed on a client computer that enables end users and administrators to manage smart cards by providing a connection from the client computer to the smart card.
smart card unblockingThe action of binding a smart card with administrative credentials to reset the the personal identification number (PIN) attempt counter.
SMOAn application programming interface that supports the incorporation of SQL Server administration into any COM or OLE Automation application.
SMTPA member of the TCP/IP suite of protocols that governs the exchange of electronic mail between message transfer agents.
snap-inA type of tool that you can add to a console supported by Microsoft Management Console (MMC). A stand-alone snap-in can be added by itself; an extension snap-in can be added only to extend the function of another snap-in.
snapshotA static report that contains data captured at a specific point in time.
snapshot isolation levelA transaction isolation level in which each read operation performed by a transaction returns all data as it existed at the start of the transaction. Because a snapshot transaction does not use locks to protect read operations, it will not block other transactions from modifying any data read by the snapshot transaction.
snapshot replicationA replication in which data is distributed exactly as it appears at a specific moment in time and does not monitor for updates to the data.
Snapshot ShareA share available for the storage of snapshot files. Snapshot files contain the schema and data for published tables.
snapshot windowA window that is defined according to the start and end times of the event in the stream, instead of a fixed grid along the timeline.
snowflake schemaAn extension of a star schema such that one or more dimensions are defined by multiple tables. In a snowflake schema, only primary dimension tables are joined to the fact table. Additional dimension tables are joined to primary dimension tables.
soft pageA rendered page that can be slightly larger than the size specified using the InteractiveHeight and InteractiveWidth properties of a report (HTML and WinForm control).
soft page-break rendererA rendering extension that maintains the report layout and formatting so that the resulting file is optimized for screen-based viewing and delivery, such as on a Web page or in the ReportViewer controls.
software development kitA set of routines (usually in one or more libraries) designed to allow developers to more easily write programs for a given computer, operating system, or user interface.
software profileA Certificate Lifecycle Manager (CLM) profile created when a request is performed using a profile template that only includes software-based certificate templates.
software transformerA software module or routine that modifies the events (data) into a format expected by the output device, and emits the data to that device.
solution explorerA component of Microsoft SQL Server Management Studio that allows you to view and manage items and perform item management tasks in a solution or a project.
solve orderThe order of evaluation (from highest to lowest solve order) and calculation (from lowest to highest solve order) for calculated members, custom members, custom rollup formulas, and calculated cells in a single calculation pass of a multidimensional cube.
sort orderA way to arrange data based on value or data type. You can sort data alphabetically, numerically, or by date. Sort orders use an ascending (1 to 9, A to Z) or descending (9 to 1, Z to A) order.
sourceA disk, file, document, or other collection of information from which data is taken or moved.
sourceThe SSIS data flow component that makes data from different external data sources available to the other components in the data flow.
sourceA synchronization provider that enumerates any changes and sends them to the destination provider.
source adapterA data flow component that extracts data from a data store.
source code controlA set of features that include a mechanism for checking source code in and out of a central repository. It also implies a version control system that can manage files through the development lifecycle, keeping track of which changes were made, who made them, when they were made, and why.
source controlA set of features that include a mechanism for checking source code in and out of a central repository. It also implies a version control system that can manage files through the development lifecycle, keeping track of which changes were made, who made them, when they were made, and why.
source cubeThe cube on which a linked cube is based.
source databaseA database on the Publisher from which data and database objects are marked for replication as part of a publication that is propagated to Subscribers. For a database view, the database on which the view is created.
source objectThe single object to which all objects in a particular collection are connected by way of relationships that are all of the same relationship type.
source partitionAn Analysis Services partition that is merged into another and is deleted automatically at the end of the merger process.
source providerA synchronization provider that enumerates any changes and sends them to the destination provider.
sparklineA miniature chart that can be inserted into text or embedded within a cell on a worksheet to illustrate highs, lows, and trends in your data.
sparse columnA column that reduces the storage requirement for null values at the cost of more overhead to retrieve nonnull values.
sparse fileA file that is handled in a way that requires much less disk space than would otherwise be needed. Sparse support allows an application to create very large files without committing disk space for those regions of the file that contain only zeros. For example, you can use sparse support to work with a 42-GB file in which you need to write data only to the first 64 KB (the rest of the file is zeroed).
sparsityThe relative percentage of a multidimensional structure's cells that do not contain data.
spatial dataData that is represented by 2D or 3D images. Spatial data can be further subdivided into geometric data (data that can use calculations involving Euclidian geometry) and geographic data (data that identifies geographic locations and boundaries on the earth).
SPNThe name by which a client uniquely identifies an instance of a service. It is usually built from the DNS name of the host. The SPN is used in the process of mutual authentication between the client and the server hosting a particular service.
SQLA database query and programming language widely used for accessing, querying, updating, and managing data in relational database systems.
SQL databaseA database based on Structured Query Language (SQL).
SQL expressionAny combination of operators, constants, literal values, functions, and names of tables and fields that evaluates to a single value.
SQL Native ClientA stand-alone data access API that is used for both OLE DB and ODBC.
SQL ServerA family of Microsoft relational database management and analysis systems for e-commerce, line-of-business, and data warehousing solutions.
SQL Server 2005 Express EditionAn edition of a Microsoft relational database design and management system for e-commerce, line-of-business, and data warehousing solutions.
SQL Server 2005 Mobile EditionSQL Server product name (edition)
SQL Server AgentA Microsoft Windows service that executes scheduled administrative tasks, which are called jobs, and stores the information in SQL Server.
SQL Server Analysis ServicesA feature of Microsoft SQL Server that supports online analytical processing (OLAP) and data mining for business intelligence applications. Analysis Services organizes data from a data warehouse into cubes with precalculated aggregation data to provide rapid answers to complex analytical queries.
SQL Server BrowserThe Windows service that listens for incoming requests for Microsoft SQL Server resources and provides information about SQL Server instances installed on the computer.
SQL Server CompactA Microsoft relational database management and analysis system for e-commerce, line-of-business, and data warehousing solutions.
SQL Server componentA SQL Server program module developed to perform a specific set of tasks - e.g., data transformation, data analysis, reporting.
SQL Server Configuration ManagerA tool to manage the services associated with SQL Server, to configure the network protocols used by SQL Server, and to manage the network connectivity configuration from SQL Server client computers.
SQL Server Connection DirectorA connectivity technology where applications based on different data access technologies (.NET or native Win32) can share the same connection information. Connection information can be centrally managed for such client applications.
SQL Server Data Mining Content ViewerA viewer that displays the content that is contained in the content schema rowset of the mining model.
SQL Server Data Mining Content Viewer ControlsA set of server-side controls that allow a user to browse complex mining models from any computer that has Microsoft Internet Explorer installed.
SQL Server Data Quality ServicesA knowledge-based data-quality system that enables users to perform knowledge discovery and management, data cleansing, data matching, integration with reference data services, and integrated profiling.
SQL Server data-tier application projectA Visual Studio project used by database developers to create and develop a DAC. DAC projects get full support from Visual Studio and VSTS source code control, versioning, and development project management.
SQL Server End-User RecoveryA tool for SQL Server that enables backup administrators to authorize end users to recover backups of SQL Server databases from DPM, without further action from the backup administrator.
SQL Server EURA tool for SQL Server that enables backup administrators to authorize end users to recover backups of SQL Server databases from DPM, without further action from the backup administrator.
SQL Server Execute Package UtilityA graphical user interface that is used to run a Integration Services package.
SQL Server ExpressAn edition of a Microsoft relational database design and management system for e-commerce, line-of-business, and data warehousing solutions.
SQL Server instanceA copy of SQL Server running on a computer.
SQL Server instance auto-protectionA type of protection that enables DPM to automatically identify and protect databases that are added to instances of SQL Server that are configured for auto-protection.
SQL Server loginAn account stored in SQL Server that allows users to connect to SQL Server.
SQL Server Management ObjectsAn application programming interface that supports the incorporation of SQL Server administration into any COM or OLE Automation application.
SQL Server Management StudioA suite of management tools included with Microsoft SQL Server for configuring, managing, and administering all components within Microsoft SQL Server.
SQL Server Master Data ServicesA master data management application to consistently define and manage the critical data entities of an organization.
SQL Server Power Pivot for ExcelA SQL Server add-in for Excel.
SQL Server ProfilerA graphical user interface for monitoring an instance of the SQL Server database engine or an instance of Analysis Services.
SQL Server Reporting ServicesA server-based report generation environment for enterprise, Web-enabled reporting functionality so you can create reports that draw content from a variety of data sources, publish reports in various formats, and centrally manage security and subscriptions.
SQL Server Service BrokerA technology that helps developers build scalable, secure database applications.
SQL Server Store for Office ApplicationsA SQL Server feature that enables storage of data from an Office application on a SQL server.
SQL Server TraceA set Transact-SQL system stored procedures to create traces on an instance of the SQL Server Database Engine.
SQL Server UtilityA way to organize and monitor SQL Server resource health. It enables administrators to have a holistic view of their environment.
SQL Server Utility dashboardA dashboard that provides an at-a-glance summary of resource health for managed SQL Server instances and data-tier applications. Can also be referred to as the SQL Server Utility detail view or the list view with details.
SQL Server Utility ExplorerA hierarchical tree displaying the objects in the SQL Server Utility.
SQL Server Utility viewpointsA feature of SQL Server Utility that provides administrators a holistic view of resource health through an instance of SQL Server that serves as a utility control point (UCP).
SQL statementAn SQL or Transact-SQL command, such as SELECT or DELETE, that performs some action on data.
SQL TraceA set Transact-SQL system stored procedures to create traces on an instance of the SQL Server Database Engine.
SQL writerA VSS compliant writer provided by the SQL Server that handles the VSS interaction with SQL Server.
SQL Writer ServiceA service that permits Windows backup programs to copy SQL Server data files through the Volume Shadow Copy Service framework, while SQL Server is running.
SQL-92The version of the SQL standard published in 1992.
SSASA feature of Microsoft SQL Server that supports online analytical processing (OLAP) and data mining for business intelligence applications. Analysis Services organizes data from a data warehouse into cubes with precalculated aggregation data to provide rapid answers to complex analytical queries.
SSLThe protocol that improves the security of data communication by using a combination of data encryption, digital certificates, and public key cryptography. SSL enables authentication and increases data integrity and privacy over networks. SSL does not provide authorization or nonrepudiation.
SSRCTA tool that enables DPM administrators to authorize end users to perform self-service recovery of data by creating and managing DPM roles (grouping of users, objects, and permissions).
SSRSA server-based report generation environment for enterprise, Web-enabled reporting functionality so you can create reports that draw content from a variety of data sources, publish reports in various formats, and centrally manage security and subscriptions.
SSRTA tool that is used by end users to recover backups from DPM, without any action required from the DPM administrator.
staged dataData imported into staging tables during the staging process in SQL Server Master Data Services.
stagingThe process used in SQL Server Master Data Services to import data into staging tables and then process the staged data as a batch prior to importing it into the master database.
staging processThe process used in SQL Server Master Data Services to import data into staging tables and then process the staged data as a batch prior to importing it into the master database.
staging queueThe batch table in SQL Server Master Data Services where staged records are queued as batches to be processed into the Master Data Services database.
staging tableA table in SQL Server Master Data Services that is populated with business data during the staging process.
standalone serverA computer that runs Windows Server but does not participate in a domain. A standalone server has only its own database of end users, and it processes logon requests by itself. It does not share account information with any other computer and cannot provide access to domain accounts.
standby fileIn a restore operation, a file used during the undo phase to hold a "copy-on-write" pre-image of pages that are to be modified. The standby file allows reverting the undo pass to bring back the uncommitted transactions.
standby serverA server instance containing a copy of a database that can be brought online if the source copy of the database becomes unavailable. Log shipping can be used to maintain a "warm" standby server, called a secondary server, whose copy of the database is automatically updated from log backups at regular intervals. Before failover to a warm standby server, its copy of the database must be brought fully up to date manually. Database mirroring can be used to maintain a "hot" standby server, called a mirror server, whose copy of the database is continuously brought up to date. Failover to the database on a mirror server is essentially instantaneous.
standing queryAn instantiation of a query template that runs within the StreamInsight server performing continuous computation over the incoming events.
star joinA join between a fact table (typically a large fact table) and at least two dimension tables.
star queryA query that joins a fact table and a number of dimension tables.
star schemaA relational database structure in which data is maintained in a single fact table at the center of the schema with additional dimension data stored in dimension tables. Each dimension table is directly related to and usually joined to the fact table by a key column.
start angleThe angle of rotation, between 0 and 360, at which the scale will begin. The zero (0) position is located at the bottom of the gauge, and the start angle rotates clockwise. For example, a start angle of 90 degrees starts the scale at the 9 o'clock position.
start capThe start of a line.
statementA compiled T-SQL query.
static cursorA cursor that shows the result set exactly as it was at the time the cursor was opened.
static row filterA filter available for all types of replication that allows you to restrict the data replicated to a Subscriber based on a WHERE clause.
stemmerIn Full-Text Search, for a given language, a stemmer generates inflectional forms of a particular word based on the rules of that language. Stemmers are language specific.
step intoTo execute the current statement and enter Break mode, stepping into the next procedure whenever a call for another procedure is reached.
stewardship portalA feature of MDS that provides centralized control over master data, including members and hierarchies and enables data model administrators to ensure data quality by developing, reviewing, and managing data models and enforcing them consistently across domains.
stock keeping unitA unique identifier, usually alphanumeric, for a product. The SKU allows a product to be tracked for inventory purposes. An SKU can be associated with any item that can be purchased. For example, a shirt in style number 3726, size 8 might have a SKU of 3726-8.
stolen pageA page in Buffer Cache taken for other server requests
stoplistA specific collection of so-called stopwords, which tend to appear frequently in documents, but are believed to carry no usable information.
stopwordA word that tends to appear frequently in documents and carries no usable information.
storage engineA component of SQL Server that is responsible for managing the raw physical data in your database. For example, reading and writing the data to disk is a task handled by the storage engine.
storage locationThe position at which a particular item can be found: either an addressed location or a uniquely identified location on a disk, tape, or similar medium.
stored procedureA precompiled collection of SQL statements and optional control-of-flow statements stored under a name and processed as a unit. They are stored in an SQL database and can be run with one call from an application.
stored procedure resolverA program that is invoked to handle row change-based conflicts that are encountered in an article to which the resolver was registered.
streamAn abstraction of a sequence of bytes, such as a file, an I/O device, an inter-process communication pipe, a TCP/IP socket, or a spooled print job. The relationship between streams and storages in a compound file is similar to that of files and folders.
stream consumerThe structure or device that consumes the output of a query. Examples are an output adapter or another running query.
StreamInsight Event Flow DebuggerA stand-alone tool in the Microsoft StreamInsight platform that provides event-flow debugging and analysis.
StreamInsight platformThe platform, consisting of the StreamInsight server, Event Flow Debugging tool, Visual Studio IDE, and other components, for the development of complex event processing applications.
StreamInsight serverThe core engine and adapter framework components of Microsoft StreamInsight. The StreamInsight server can be used to process and analyze the event streams associated with a complex event processing application.
stringA group of characters or character bytes handled as a single entity. Computer programs use strings to store and transmit data and commands. Most programming languages consider strings (such as 2674:gstmn) as distinct from numeric values (such as 470924).
strip lineHorizontal or vertical ranges that set the background pattern of the chart in regular or custom intervals. You can use strip lines to improve readability for looking up individual values on the chart, highlight dates that occur at regular intervals, or highlight a specific key range.
stripeHorizontal or vertical ranges that set the background pattern of the chart in regular or custom intervals. You can use strip lines to improve readability for looking up individual values on the chart, highlight dates that occur at regular intervals, or highlight a specific key range.
striped media setA media set that uses multiple devices, among which each backup is distributed.
strong consistencyA scenario where high availability is enabled and there is more than one copy of a cached object in the cache cluster. All copies of that object remain identical.
Structured Query LanguageA database query and programming language widely used for accessing, querying, updating, and managing data in relational database systems.
subqueryA SELECT statement that contains one or more subqueries.
subreportA report contained within another report.
subscribeTo request data from a Publisher.
subscriberIn Notification Services, the person or process to which notifications are delivered.
subscriberIn replication, a database instance that receives replicated data.
subscriber databaseIn replication, a database instance that receives replicated data.
subscribing serverA server running an instance of Analysis Services that stores a linked cube.
subscriptionA request for a copy of a publication to be delivered to a subscriber.
subscription databaseA database at the Subscriber that receives data and database objects published by a Publisher.
subscription event ruleA rule that processes information for event-driven subscriptions.
subscription scheduled ruleOne or more Transact-SQL statements that process information for scheduled subscriptions.
subsetA selection of tables and the relationship lines between them that is part of a larger database diagram.
subtractTo perform the basic mathematical operation of deducting something from something else.
Support CountA dynamic option that displays the number of rows in which the determinant column value determines the dependent column.
Support PercentageA dynamic option that displays the percentage of rows in which the determinant column determines the dependent column.
surface areaThe number of ways in which a piece of software can be attacked.
suspect tapeA tape that has conflicting identification information, such as the barcode or the on-media identifier.
SVFA function that returns a single value, such as a string, integer, or bit value.
SVGAn XML-based language for device-independent description of two-dimensional graphics. SVG images maintain their appearance when printed or when viewed with different screen sizes and resolutions. SVG is a recommendation of the World Wide Web Consortium (W3C).
sweep angleThe number of degrees, between 0 and 360 that the scale will sweep in a circle. A sweep angle of 360 degrees produces a scale that is a complete circle.
switch in tableThe staging table the user wants to use to switch in their data. The staging table needs to be created before switching partitions with the Manage PartitionsWizard.
switch out tableThe staging table the user wants to use for the partition to switch out of the current source table.
symmetric keyThe cryptographic key used to both encrypt and decrypt protected content during publishing and consumption.
Sync ManagerA tool used to ensure that a file or directory on a client computer contains the same data as a matching file or directory on a server.
sync providerA software component that allows a replica to synchronize its data with other replicas.
synchronization applicationA software component, such as a personal information manager or music database, that hosts a synchronization session and invokes synchronization providers to synchronize disparate data stores.
synchronization communityA set of replicas that keep their data synchronized with one another.
synchronization managerA tool used to ensure that a file or directory on a client computer contains the same data as a matching file or directory on a server.
Synchronization ManagerA tool used to ensure that a file or directory on a client computer contains the same data as a matching file or directory on a server.
synchronization orchestratorAn orchestrator that initiates and controls synchronization sessions.
synchronization providerA software component that allows a replica to synchronize its data with other replicas.
synchronization sessionA unidirectional synchronization in which the source provider enumerates its changes and sends them to the destination provider, which applies them to its store.
syndication formatA format used for publishing data on blogs and web sites.
syntactic validationThe process of confirming that an XML file conforms to its schema.
System Configuration CheckerA system preparation tool that helps to avoid setup failures by validating the target machine before a software application is installed.
system databasesA set of five databases present in all instances of SQL Server that are used to store system information.
system functionsA set of built-in functions that perform operations on and return the information about values, objects, and settings in SQL Server.
system localeA Regional and Language Options setting that specifies the default code pages and associated bitmap font files for a specific computer that affects all of that computer's users. The default code pages and fonts enable a non-Unicode application written for one operating system language version to run correctly on another operating system language version.
system role assignmentRole assignment that applies to the site as a whole.
system role definitionRole definition that conveys site-wide authority.
system stored procedureA type of stored procedure that supports all of the administrative tasks required to run a SQL Server system.
system stored proceduresA set of SQL Server-supplied stored procedures that can be used for actions such as retrieving information from the system catalog or performing administration tasks.
system tableA table that stores the data defining the configuration of a server and all its tables.
system tablesBuilt-in tables that form the system catalog for SQL Server.
system variableA variable provided by DTS.
tab pageA part of a tab control that consists of the tab UI element and the display area, which acts as a container for data or other controls, such as text boxes, combo boxes, and command buttons.
tableA database object that stores data in records (rows) and fields (columns). The data is usually about a particular category of things, such as employees or orders.
table data regionA report item on a report layout that displays data in a columnar format.
Table DesignerA visual design surface that is used to create and edit TSQL tables and table related objects.
table lockA lock on a table including all data and indexes.
table referenceA name, expression or string that resolves to a table.
tablespaceA unit of database storage that is roughly equivalent to a file group in SQL Server. Tablespaces allow storage and management of database objects within individual groups.
table-valued functionA user-defined function that returns a table.
TablixA data region that can render data in table, matrix, and list format. It is intended to convey the unique functionality of the data region object and the users' ability to combine data formats.
Tablix data regionA data region that can render data in table, matrix, and list format. It is intended to convey the unique functionality of the data region object and the users' ability to combine data formats.
tabular data streamThe SQL Server internal client/server data transfer protocol. TDS allows client and server products to communicate regardless of operating-system platform, server release, or network transport.
tabular queryA standard operation such as search, sort, filter or transform on data in a table.
tail-log backupA log backup taken from a possibly damaged database to capture the log that has not yet been backed up. A tail-log backup is taken after a failure in order to prevent work loss.
tape backupA SQL Server backup operation that writes to any tape device supported by the operating system.
targetThe database on which an operation acts.
target partitionAn Analysis Services partition into which another is merged, and which contains the data of both partitions after the merger.
target queueIn Service Broker, the queue associated with the service to which messages are sent.
target serverA server that receives jobs from a master server.
target typeThe type of target, which has certain characteristics and behavior.
task objectA Data Transformation Services (DTS) object that defines pieces of work to be performed as part of the data transformation process. For example, a task can execute an SQL statement or move and transform heterogeneous data from an OLE DB source to an OLE DB destination using the DTS Data Pump.
TDSThe SQL Server internal client/server data transfer protocol. TDS allows client and server products to communicate regardless of operating-system platform, server release, or network transport.
temporary smart cardA non-permanent smart card issued to a user for replacement of a lost smart card or to a user that requires access for a limited time.
temporary stored procedureA procedure placed in the temporary database, tempdb, and erased at the end of the session.
temporary tableA table placed in the temporary database, tempdb, and erased at the end of the session.
tenantA client organization that is served from a single instance of an application by a web service. A company can install one instance of software on a set of servers and offer Software as a Service to multiple tenants.
theater viewA view where the preview is centered in a Power Pivot Gallery SharePoint document library and lets you rotate through the available worksheets. Smaller thumbnails of each worksheet appear lower on the page, on either side.
theta joinA join based on a comparison of scalar values.
thousand separatorA symbol that separates thousands from hundreds within a number that has four or more places to the left of the decimal separator.
threadA type of object within a process that runs program instructions. Using multiple threads allows concurrent operations within a process and enables one process to run different parts of its program on different processors simultaneously. A thread has its own set of registers, its own kernel stack, a thread environment block, and a user stack in the address space of its process.
throttleA Microsoft SQL Server tool designed to limit the performance of an instance of the database engine any time more than eight operations are active at the same time.
tickA regular, rapidly recurring signal emitted by a clocking circuit.
tick countA monotonically increasing number that is used to uniquely identify a change to an item in a replica.
tile serverA map image caching engine that caches and serves pregenerated, fixed-size map image tiles.
timeA SQL Server system data type that stores a time value from 0:00 through 23:59:59.999999.
time intervalA period of time in which a given event is valid. The valid time interval includes the valid start time, and all moments of time up to, but not including the valid end time.
tokenizationIn text mining or Full-Text Search, the process of identifying meaningful units within strings, either at word boundaries, morphemes, or stems, so that related tokens can be grouped. For example, although "San Francisco" is two words, it could be treated as a single token.
tombstoneA marker that is used to represent and track a deleted item and prevent its accidental reintroduction into the synchronization community.
toolA utility or feature that aids in accomplishing a task or set of tasks.
topologyThe set of participants involved in synchronization and the way in which they are connected to each other.
traceA collection of events and data returned by the Database Engine.
trace fileA file containing records of activities of a specified object, such as an application, operating system, or network. A trace file can include calls made to APIs, the activities of APIs, the activities of communication links and internal flows, and other information.
tracer tokenA performance monitoring tool available for transactional replication. A token (a small amount of data) is sent through the replication system to measure the amount of time it takes for transactions to reach the Distributor and Subscribers.
trail byteThe byte value that is the second half of a double-byte character.
trainTo populate a model with data to derive patterns that can be used in prediction or knowledge discovery.
training data setA set of known and predictable data used to train a data mining model.
traitAn attribute that describes an entity.
trait phrasingA way of expressing a relationship in which a minor entity describes a major entity.
transaction isolation levelThe property of a transaction that controls the degree to which data is isolated for use by one process, and is guarded against interference from other processes.
transaction logA file that records transactional changes occurring in a database, providing a basis for updating a master file and establishing an audit trail.
transaction log backupA backup of transaction logs that includes all log records not backed up in previous log backups. Log backups are required under the full and bulk-logged recovery models and are unavailable under the simple recovery model.
transaction retention periodIn transactional replication, the amount of time transactions are stored in the distribution database.
transaction rollbackRollback of a user-specified transaction to the last savepoint inside a transaction or to the beginning of a transaction.
transactional dataData related to sales, deliveries, invoices, trouble tickets, claims, and other monetary and non-monetary interactions.
transactional replicationA type of replication that typically starts with a snapshot of the publication database objects and data.
Transact-SQLThe language containing the commands used to administer instances of SQL Server, create and manage all objects in an instance of SQL Server, and to insert, retrieve, modify and delete all data in SQL Server tables. Transact-SQL is an extension of the language defined in the SQL standards published by the International Standards Organization (ISO) and the American National Standards Institute (ANSI).
transformationThe SSIS data flow component that modifies, summarizes, and cleans data.
transformation inputData that is contained in a column, which is used duing a join or lookup process, to modify or aggregate data in the table to which it is joined.
transformation outputData that is returned as a result of a transformation procedure.
TrendA general tendency or inclination, typically determined by the examination of a particular attribute over time.
trusted connectionA Windows network connection that can be opened only by users who have been authenticated by the network.
TSQL paneOne of the tabs that hosts the editor control to allow TSQL code editing.
tumbling windowA hopping window whose hop size is equal to the window size.
tupleAn ordered collection of members that uniquely identifies a cell, based on a combination of attribute members from every attribute hierarchy in the cube.
two-phase commitA protocol that ensures that transactions that apply to more than one server are completed on all servers or none at all. Two-phase commit is coordinated by the transaction manager and supported by resource managers.
type checkingThe process performed by a compiler or interpreter to make sure that when a variable is used, it is treated as having the same data type as it was declared to have.
typed adapterAn adapter that emits only a single event type.
typed eventAn event for which the structure of the event payload provided by the source or consumed by the sink is known, and the input or output adapter is designed around this specific event structure.
UCPA network node that provides the central reasoning point for the SQL Server Utility. It uses Utility Explorer in SQL Server Management Studio (SSMS) to organize and monitor SQL Server resource health.
UDTA user-written extension to the scalar type system in SQL Server.
unbalanced hierarchyA hierarchy in which one or more levels do not contain members in one or more branches of the hierarchy.
unbound streamAn event stream that contains the definition of the event model or payload type, but does not define the data source.
uncommittablePertaining to a transaction that remains open and cannot be completed. Uncommitable transactions could be considered a subclass of partially failed transactions, where the transaction has encountered an error that prevents its completion, but it is still holding its locks and has to be rolled back by the user.
uncompressTo restore the contents of a compressed file to its original form.
undeliverableNot able to be delivered to an intended recipient. If an e-mail message is undeliverable, it is returned to the sender with information added by the mail server explaining the problem; for example, the e-mail address may be incorrect, or the recipient's mailbox may be full.
underlying tableA table referenced by a view, cursor, or stored procedure.
undoThe phase during database recovery that reverses (rolls back) changes made by any transactions that were uncommitted when the redo phase of recovery completed.
undo fileA file that saves the content of the pages in a database after they've been modified by uncommitted, rolled back transactions and before recovery restores them to their previous state. The undo file prevents the changes performed by uncommitted transactions from being lost.
undo phaseThe phase during database recovery that reverses (rolls back) changes made by any transactions that were uncommitted when the redo phase of recovery completed.
unenforced relationshipA link between tables that references the primary key in one table to a foreign key in another table, and which does not check the referential integrity during INSERT and UPDATE transactions.
uninitializeTo change the state of an enumerator or data source object so that it cannot be used to access data.
unique indexAn index in which no two rows are permitted to have the same index value, thus prohibiting duplicate index or key values.
uniqueifierA 4-byte column that the SQL Server Database Engine automatically adds to a row to make each index key unique.
Universal Time CoordinateThe standard time common to every place in the world, coordinated by the International Bureau of Weights and Measures. Coordinated Universal Time is used for the synchronization of computers on the Internet.
unknown memberA member of a dimension for which no key is found during processing of a cube that contains the dimension.
unknown tapeTape that has not been identified by the DPM server.
unmanaged codeCode that is executed directly by the operating system, outside the .NET Framework common language runtime. Unmanaged code must provide its own memory management, type checking, and security support, unlike managed code, which receives these services from the common language runtime.
unmanaged instanceAn instance of SQL Server not monitored by a utility control point.
unpivotTo expand values from multiple columns in a single record into multiple records with the same values in a single column.
unsafe codeCode that is executed directly by the operating system, outside the .NET Framework common language runtime. Unmanaged code must provide its own memory management, type checking, and security support, unlike managed code, which receives these services from the common language runtime.
untyped adapterAn adapter that accepts or emits multiple event types in which the payload structure or the type of fields in the payload are not known in advance. Examples are events from a CSV or text file, a SQL table, or a socket.
update lockA lock placed on resources (such as row, page, table) that can be updated.
update statisticsA process that recalculates information about the distribution of key values in specified indexes.
updategramA template that makes it possible to modify a database in Microsoft SQL Server from an existing XML document.
user accountIn Active Directory, an object that consists of all the information that defines a domain user, which includes user name, password, and groups in which the user account has membership. User accounts can be stored in either Active Directory or on your local computer.
user databaseA database created by a SQL Server user and used to store application data.
user instanceAn instance of SQL Server Express that is generated by the parent instance on behalf of a user.
user-defined aggregate functionAn aggregate function created against a SQL Server assembly whose implementation is defined in an assembly created in the .NET Frameworks common language runtime.
user-defined typeA user-written extension to the scalar type system in SQL Server.
utility control pointA network node that provides the central reasoning point for the SQL Server Utility. It uses Utility Explorer in SQL Server Management Studio (SSMS) to organize and monitor SQL Server resource health.
Utility ReaderA privilege that allows the user account to connect to the SQL Server Utility, see all viewpoints in the Utility Explorer in SSMS and see settings on the Utility Administration node in Utility Explorer in SSMS.
vacuumerA tool for data removal.
validity periodThe amount of time a defined credential is deemed to be trusted.
value expressionAn expression in Multidimensional Expressions (MDX) that returns a value. Value expressions can operate on sets, tuples, members, levels, numbers, or strings.
versionA property that is used to differentiate objects stored in the cache using the same key. Windows Server AppFabric stores the version information using the DataCacheItemVersion class. Every time an object is added or updated in the cache, the version value changes. Versioning is used to maintain data consistency. Optimistic concurrency is achieved by using versioning as opposed to locks.
versionMetadata that identifies a change made to an item in a replica. It consists of the replica key and the replica tick count for the item.
vertical filteringFiltering columns from a table. When used as part of replication, the table article created contains only selected columns from the publishing table.
vertical partitioningThe process of splitting a single table into multiple tables based on selected columns. Each of the multiple tables has the same number of rows but fewer columns.
vertical splitA vertical orientation of the CIDER shell.
very large databaseA database that has become large enough to be a management challenge, requiring extra attention to people, processes, and processes.
victimThe longest running transaction that has not generated row versions when tempdb runs out of space and the Database Engine forces the version stores to shrink. A message 3967 is generated in the error log for each victim transaction. If a transaction is marked as a victim, it can no longer read the row versions in the version store.
view generationA repository engine feature that is used to create relational views based on classes, interfaces, and relationships in an information model.
virtual log fileNon-physical files that are derived from one physical log file by the SQL Server Database Engine.
visual totalA displayed, aggregated cell value for a dimension member that is consistent with the displayed cell values for its displayed children.
visualizerA way to visually represent data in debug mode.
VLDBA database that has become large enough to be a management challenge, requiring extra attention to people, processes, and processes.
VSS writerA component within an application that interfaces with the VSS platform infrastructure during backups to ensure that application data is ready for shadow copy creation.
wall-timeThe total time taken by a computer to complete a task which is the sum of CPU time, I/O time, and the communication channel delay.
warm latencyThe time to create a new workflow instance when the workflow type has already been compiled.
warm standbyA method of redundancy in which the secondary (i.e., backup) system runs in the background of the primary system. Data is mirrored to the secondary server at regular intervals, which means that there are times when both servers do not contain the exact same data.
warm standby serverA standby server that contains a copy of a database that is asynchronously updated, and that can be brought online fairly quickly.
watermarkA threshold used to manage the memory consumption on each cache host. The high watermark and low watermark specify when objects are evicted out of memory.
Web applicationA software program that uses Hypertext Transfer Protocol (HTTP) for its core communication protocol and that delivers Web-based information to the user in the Hypertext Markup Language (HTML) language.
Web poolA grouping of one or more URLs served by a worker process.
Web Pool AgentAn isolated process under which the Certificate Lifecyle Manager (CLM) web portal runs.
Web projectA collection of files that specifies elements of a Web application.
Web siteA group of related web pages that is hosted by an HTTP server on the World Wide Web or an intranet. The pages in a website typically cover one or more topics and are interconnected through hyperlinks.
Web synchronizationIn merge replication, a feature that lets you replicate data by using the HTTPS protocol.
websiteA group of related web pages that is hosted by an HTTP server on the World Wide Web or an intranet. The pages in a website typically cover one or more topics and are interconnected through hyperlinks.
weighted close formulaA formula that calculates the average of the high, low, and close prices, while giving extra weight to the close price.
wide characterA 2-byte multilingual character code.
windowA subset of events within a stream that fall within some period of time; that is, a window contains event data along a timeline.
Windows Management InstrumentationThe Microsoft extension to the Distributed Management Task Force (DMTF) Web-based Enterprise Management (WBEM) initiative.
Windows NT Integrated SecurityA security mode that leverages the Windows NT authentication process.
witness serverIn database mirroring, the server instance that monitors the status of the principal and mirror servers and that, by default, can initiate automatic failover if the principal server fails. A database mirroring session can have only one witness server (or "witness"), which is optional.
WMIThe Microsoft extension to the Distributed Management Task Force (DMTF) Web-based Enterprise Management (WBEM) initiative.
WMI Query LanguageA subset of ANSI SQL with semantic changes adapted to Windows Management Instrumentation (WMI).
workbookIn a spreadsheet program, a file containing a number of related worksheets.
workload governorA Microsoft SQL Server tool designed to limit the performance of an instance of the database engine any time more than eight operations are active at the same time.
workload groupIn Resource Governor, a container for session requests that are similar according to the classification rules that are applied to each request. A workload group allows the aggregate monitoring of resource consumption and a uniform policy that is applied to all the requests in a group.
workstationA microcomputer or terminal connected to a network.
WQLA subset of ANSI SQL with semantic changes adapted to Windows Management Instrumentation (WMI).
write backTo update a cube cell value, member, or member property value.
write-ahead logA transaction logging method in which the log is always written prior to the data.
x-axisThe horizontal reference line on a grid, chart, or graph that has horizontal and vertical dimensions.
XML for AnalysisA specification that describes an open standard that supports data access to data sources that reside on the World Wide Web.
XMLAA specification that describes an open standard that supports data access to data sources that reside on the World Wide Web.
XQueryFunctional query language that is broadly applicable to a variety of XML data types derived from Quilt, XPath, and XQL. Both Ipedo and Software AG implement their own versions of the W3C's proposed specification for the XQuery language. Also called: XML Query, XQL.
XSLAn XML vocabulary that is used to transform XML data to another form, such as HTML, by means of a style sheet that defines presentation rules.
XSL TransformationA declarative, XML-based language that is used to present or transform XML data.
XSLTA declarative, XML-based language that is used to present or transform XML data.

Community Additions

Show: