Online  Fee: 

Classroom Fee: 

Upon completion of this course, you should be able to:Describe the purpose and function of the Teradata Database.

  • List the principal components of the Teradata Database and describe their functions.
  • Describe how Teradata Database features provide fault tolerance, performance, and scalability.
  • Describe how data is loaded and accessed through Teradata SQL,Teradata Database client hardware, and software utilities.
  • Identify Teradata objects and their hierarchy.
  • Differentiate between relational keys and Teradata Database indexes, and understand their use.
  • Explain data distribution and data access mechanics in the Teradata Database.
  1. Welcome to the Teradata Database

 What is the Teradata Database?

  • What Makes the Teradata Database Unique?
  • What is a Relational Database?
  • Primary Key
  • Foreign Key

After completing this module, you should be able to:

 Describe the Teradata Database.

  • Describe the advantages of the Teradata Database.
  • Define the terms associated with relational databases.
  • Describe the advantages of a relational database.

 2.     Teradata Database and Data Warehouse Architecture ·        Evolution to Active Data Warehousing·        Row vs. Set Processing ·  Response Time vs. Throughput·  The Data Warehouse ·  Data Marts ·   A Teradata Database System·  Teradata Virtual Storage ·  Using the BYNET ·   Storage Performance vs Data Temperature· Teradata Compression Comparison·  Hot Standby Node·  Software Components · Layers of the Data Warehouse Architecture After completing this module, you should be able to: •Identify the different types of enterprise data processing. •Define a data warehouse, active data warehouse, and a data mart. •List and define the different types of data marts. •Explain the advantages of detail data over summary data. •Describe the overall Teradata Database parallel architecture. •List and describe major Teradata Database hardware and software components and their functions. •Explain how the architecture helps to maintain high availability and reliability for Teradata Database users. 

  1. Client Access
  • Client Connections
  • Request Processing
  • Teradata Client Utilities
    • Query Submitting Utilities
    • Load and Unload Utilities
    • Archive Utilities
    • Tools that support a Multi-System Environment
    • Administrative Utilities

After completing this module, you should be able to:

  • Describe how the client utilities access the Teradata Database.
  • Illustrate how the Teradata Database processes a request.
  • Describe the Teradata client utilities and their use.
  1. Data Structure
  • Creating Databases and Users
  • A Teradata Database
  • Spool Space
  • Data Dictionary
  • Database Security

After completing this module, you should be able to:

  • Distinguish between a Teradata Database and a Teradata User.
  • List and define the Teradata Database objects.
  • Define Perm Space, Temp Space, and Spool Space, and explain how each is used.
  • Describe the function of the Data Dictionary.
  • List methods for authentication and security on Teradata.
  1. Data Protection

Protecting Data

  • RAID 1
  • RAID 1
  • Fallback
  • Disk Allocation
  • Journals for Data Availability
  • Locks

After completing this module, you should be able to:

  • Describe the types of data protection and fault tolerance used by the Teradata Database.
  • Discuss the types of RAID protection used on Teradata Database systems.
  • Explain basic data storage concepts.
  • Explain the concept of Fallback tables.
  • List the types and levels of locking provided by the Teradata Database.
  • Describe the function of recovery journals, transient journals, and permanent journals.

6.     Indexes

Indexes in the Teradata Database

  • Primary Index
  • Partitioned Primary Index
  • Multi-Level Partitioned Primary Index
  • Join Indexes
  • Secondary Indexes
  • Summary of Keys and Indexes

After completing this module, you should be able to:

  • List tasks Teradata Database Administrators never have to perform.
  • Define primary and secondary indexes and their purposes.
  • Distinguish between a primary index and a primary key.
  • Explain the reasons for choosing a UPI versus a NUPI.
  • Define a Partitioned Primary Index (PPI) and its purpose.
  • Describe the purpose of a NoPI table.
  • Describe how Column Partitioning is implemented.
  • Explain how a USI and a NUSI are implemented.
  • Explain the makeup of the Row-ID and its role in row storage.
  • Describe the sequence of events for locating a row.
  • Explain the roles of the hashing algorithm and hash map in locating a row.
  • Describe the operation of a full-table scan