Browse Definitions :
Definition

transactional data

What is transactional data?

In computing, transactional data is the information collected from transactions. Ideally, the information includes all the details necessary to define each transaction as a unique event at a specific date and time. For this reason, the data that describes the transaction often includes a unique identifier (UID) and timestamp.

A transaction, in this context, is a sequence of related tasks that are treated as a logical unit of work. Transactional data is usually collected on an ongoing basis as part of an organization's daily business operations. For example, an organization might collect transactional data about its online product sales, credit card purchases or checking account deposits and withdrawals, depending on the nature of the business.

Diagram showing six types of e-commerce.
Transactional data is often associated with e-commerce and sales transactions, although it also plays an important role in several other types of financial, logistical or work-related activities.

Transactional data is often associated with sales events, but it can include a wide range of financial, logistical or work-related events, including the following activities:

  • Customer sales from an e-commerce site.
  • A manufacturer's purchase orders for raw materials.
  • Shipping status of merchandise as it moves from one shipping point to the next.
  • Stock purchases and sales handled by a brokerage firm.
  • Employee hours worked on each shift.
  • Accident claims from auto insurance customers.
  • Payments made on a bank car loan.
  • Cryptocurrency purchases through a public blockchain.

How is transactional data managed?

Transactional data is often managed through a relational database management system (DBMS) such as SQL Server or MySQL. Such systems include built-in transactional processing capabilities and are based on the Structured Query Language (SQL), which incorporates transaction capabilities directly into its syntax. Relational database transactions typically adhere to the four ACID properties: atomicity, consistency, isolation and durability.

Some NoSQL databases are also used for transactional data and consequently support transactions. For example, MongoDB ensures that an operation on a single document is atomic, and it can handle distributed transactions by providing atomicity for reads and writes to multiple documents. In addition, blockchain technologies are commonly used to record the details of a transaction, which in this case, refers to the transfer of value between two users on a blockchain peer-to-peer network.

Diagram showing the NoSQL database family.
Although transactional data is often managed through a relational database management system, some NoSQL databases like MongoDB can also be used.

Transactional data, master data and reference data

Transactional data can include or refer to master data, reference data or both. Master data is the core data that an organization maintains to support its business processes. It is the functional data that describes the entities at the heart of the business. For example, master data might include information about customers, products, partners, employees, suppliers or store locations.

In contrast, reference data provides information that supports the organization's master and transactional data. It includes less critical information, such as languages, currencies, sales territories, postal codes or similar types of lookup data.

Transactional data often incorporates master or reference data to provide a complete picture of the transaction. For example, if a customer purchases a product online, transactional data for that sale will likely include some type of transaction ID or sales ID, along with a timestamp, purchase amount and other attributes specific to that transaction.

However, the data might also include a customer ID, product ID and store ID, which point to the master data, as well as a currency ID and territory ID, which point to the reference data. Only by including the master and reference data can the transactional data include a complete snapshot of the event so it can be understood. For example, the following figure illustrates what this transaction might look like in a relational database.

Diagram of a transaction in a relational database.
How a transaction might look like in a company's relational database.

The figure shows the transaction as it appears in the Sales table, which includes one row for each sales transaction. In this case, all the data for this transaction is represented by a single row in the Sales table. (The figure shows only this row, along with the column names.) However, this is a very simple example, and the transactional data might span multiple rows in multiple tables.

In this example, the table includes the CustomerID, ProductID and StoreID columns. Each column references a related table. The three referenced tables -- Customers, Products and Stores -- are considered part of the master data. In a relational database, these types of references are implemented as foreign key relationships.

The Sales table also includes the CurrencyID and TerritoryID columns, which reference the Currencies and Territories tables, respectively. These tables are part of the reference data. However, all the data in this row is considered transactional data because it applies to a specific transaction. By extension, all the rows in the Sales table are also considered transactional data.

Today, the DBMS market is dominated by RDBMS, but NoSQL database systems continue to grow in popularity. Learn how cloud databases are deployed and managed and the benefits of using them. Explore e-commerce trends, tips and traps to avoid and see what IT skills are required for e-commerce. Also, check out this blockchain terminology glossary for beginners.

This was last updated in January 2024

Continue Reading About transactional data

Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • phishing

    Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person in an email or other form of ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • cybersecurity

    Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.

CIO
HRSoftware
  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

  • reference checking software

    Reference checking software is programming that automates the process of contacting and questioning the references of job ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close