• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/164

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

164 Cards in this Set

  • Front
  • Back
a question asked about data stored within a database
query
A ____ can be used to extract data from one or more tables.
query
What are some things a query allows you to do?
- Display selected fields and records from one or more tables or queries
- Sort records
- Perform calculations
- Generate data for forms, reports, or other queries
- Update data in the tables
- Create new tables
- Delete records in a table based upon one or more criteria
Relational Databases use a common language for queries called _____________ (SQL).
Structured Query Language
Each Database Management Systems may have their own ______ to the Structured Query Language (SQL)
extensions
A Structure Query Language Statement that gets information from the database
select statement
A Structure Query Language Statement that updates records
update statement
A Structure Query Language Statement that inserts records into a table
insert statement
A Structure Query Language Statement that deletes records
delete statement
A Structure Query Language Select Statement Select ....?
Lists the fields to be displayed
A Structure Query Language Select Statement selects from
lists the table(s) used
A Structure Query Language Select Statement specifies the _______ for the statement (where)
criteria
A Structure Query Language Select Statement uses ______ operators (<,=,>,etc.) (where)
comparison
A Structure Query Language Select Statement groups records with identical _____ in specified _____ into a ______ record.
values, fields, single
A Structure Query Language Select Statement HAVING list the ______ for selecting _______ records
conditions, grouped
A Structure Query Language Select Statement is ordered by listing the ______ to sort the resulting ____ by
field(s), data
SQL Select- lists the fields to be displayed
select
SQL Select- lists the table(s) used
from
SQL Select- specifies the criteria for the statement, uses comparison operators (<,=,>, etc.)
where
SQL Select- groups records with identical values in specified fields into a single record
group by
SQL Select- list the conditions for selecting grouped records
having
SQL Select- list the field(s) to sort the resulting data by
order by
Microsoft Access has a query building interface called ______.
QBE (Query by Example)
Queries can be built without knowing ___. The QBE interface buildings the _____ statements.
SQL (x2)
A ____ database consists of information stored in tables (rows and columns).
relational
In relational databases, each table stores data about a single type of ______.
entity
With relational databases, relationships between ______ can be established to ____ information from multiple related tables.
tables, extract
Relational Database Terms - defines a single piece of information to be stored about a single entity
field
A field (relational database) is also known as a _______.
column
Relational Database Terms- the field that contains a unique value for each record; used to identify a single entity
key field
A key field (relational database) is also known as a
primary key
Relational Database Terms- a key made up of more than one field, where the combination of field values are unique
compound key
Relational Database Terms- a group of fields about a single entity
record
A record (relational database) is also known as a ____
row
Relational Database Terms- stores information about multiple entities of the same type
table
a statement that extracts data from or updates data in one or more tables
query
When creating a database, the most important aspect of a relational database is the ____ and ____ of the tables.
structure, definition
When creating a database, determine the different types of ___ for which data will be stored.
entities
When creating a database, define the _____ or the type of ____ stored about each entity.
fields, data
When creating a database, identify the _____ field for each table.
key
When creating a database, structure the tables to reduce __________.
data redundancy
Structuring the tables to reduce data redundancy is known as _____?
normalization
When creating a database, establish ______ between the tables.
relationships
When normalizing data, a table is separated into multiple ___, a ____ is identified for each table, and ___ keys are used to create the relationships between tables.
tables, key, foreign
When defining a table, you begin by identifying a type of _____ that data will be stored for.
entity
When defining a table, after identifying a type of entity that data will be stored for, you identify the ______ for each entity.
fields
When defining a table, after identifying the fields for each entity, you determine which field is the ______ key for each table.
primary
After determining which field is the primary key in a table when defining a table, the next thing you do is determine the ____ type of each field.
data
What are some common data types?
text, number, date/time, currency, boolean
A common data type - boolean - will contain a ___/____, _____,____ value.
True/False, Yes/No
When defining a table, for a text field the number of _______ must be specified.
characters
When defining a table, for a numeric field the type of ___ (integer or floating point) will need to be specified
number
Three types of relationships between tables:
one-to-one, one-to-many, many-to-many
For each record in one table there is one corresponding record in another table. What relationship between tables is this?
one-to-one
For each record in one table there are more than one corresponding record in another table. This is the most common. What relationship between tables is this?
one-to-many
For each record in each table there are more than one corresponding record in another table. What relationship between tables is this?
many-to-many
A many-to-many relationship usually indicates the necessity to create an additional ____ and two _______ relationships.
table, one-to-many
A _______ is useful in modeling the database tables.
Entity Relationship Diagram (ERD)
With an entity relationship diagram, each table is represented by a _____, with the table __ specified at the top, and a list of ____ included in the rectangle. Relationships are represented with _____ between the rectangles.
rectangle, name, fields, lines
a set of rules to maintain consistency between tables
referential integrity
About Referential Integrity: When a record is added that has a foreign key, there must be a matching record in the table with the ___ key. When a record in the primary table is deleted, the records in the related table with the matching foreign key are _____. The delete can be ____ or all of the records in the second table with the matching foreign key must be _______.
primary, orphaned, prevented, deleted
a process used to structure tables to prevent data redundancy and data inconsistencies, a three step process
normalization
the steps of normalization are called ______
normal forms
Each normal form is built upon the ______ one.
previous
Each table must be in ____ normal form.
3rd
What normal form is a table in if no field has multiple values and a second table is created with the repeating fields to establish a one-to-many relationship?
first normal form (1nf)
What normal form is a table in if it is first in 1NF and if no fields are dependent on part of a compound key. This indicates two different entities. Create a second table with part of the compound key as its key.
Second normal form (2nf)
What normal form is a table in if it is first in 2nf and if no fields are dependent on a field other than the key. This indicates that a field is one that can be calculated from other fields, or that there is another entity. If the field is calculated, there is no need to include it. If there is another entity, create a new table and establish a one-to-many relationship.
Third normal form (3nf)
a vast network of computers that connects millions of people all over the world. Makes the web possible.
internet
A multimedia based collection of information, services, and Web sites supported by the internet. Uses hypertext and hypermedia technology
world wide web
The origin of the internet came from the ____________ network and began with ___ research in 1957 to provide protection from nuclear strike. Connected computers formed ARPANET in 1969. It allowed computers at leading universities and research organizations to communicate with each other over great distances.
Advanced Research Projects Agency (ARPAMET), military
The internet is a ______ network
client/server
With a _____ computer, users connected to the internet, requests data and web pages
client
With a _____ computer, stores web pages and data and returns the requested data to the client
server
What type of server provides information and services to web surfers?
web server
What type of server maintains a collection of files that can be downloaded?
ftp server
What type of server supports use of discussion groups and chat rooms?
irc server
What type of server provides e-mail services and accounts?
mail server
a set of rules that every computer follows to transfer information; different types of computers handle information in different forms
communications protocol
A type of communication protocol that is the basic protocol that makes the internet work
TCP/IP (Transfer Control Protocol/Internet Protocol)
A type of communication protocol that supports movement of info over the web. To access a website, you use ____ and _____.
Hypertext transfer protocol (http), TCP/IP, http
A type of communication protocol that transfers files from one computer to another and can download a variety of file types
file transfer protocol (FTP)
a computer connected to the internet
host
a unique identifying number for each host that consists of a set of four numbers between 0 and 255 separated by periods
IP address
When connecting to the internet, there are ____ and ____ connections.
dial-up, broadband
types of broadband connections
cable, satellite, DSL
a broadband connection that uses coaxial cable and a cable modem, fast connection speed that depends on number of users, not available in all areas
cable
a broadband connection that uses telephone lines, is faster than dial-up, doesn't tie up the line, and requires special modem
Digital Subscriber line (DSL)
a broadband connection that sends light through fiber optics, is fast but expensive, only available in certain areas
fiber optic internet
a type of broadband connections that uses a satellite dish and coaxial cable, almost anyone in the U.S. can receive this service, and the signal is affected by location and weather
satellite
a type of connection that uses standard telephone line and has the slowest connection speech
dial-up
Internet service _____ provide user access to the Internet. With broadband connection, broadband provider is your ISP. With a dial-up connection you need to determine ISPs available in your area.
providers
Types of internet communications:
instant messaging, podcasts, blogs and vlogs, webcasts, wikis, voice over internet (VoIP), E-mail
Group internet communications:
internet social network, multiplayer online game services, chat rooms, newsgroup, listservs
real-time text-based conversations
instant messaging
compressed audio/video files distributed on the internet
podcasts
RSS technology for podcasts allows constant updates for subscribers. What does RSS stand for?
Really Simple Syndication
broadcast of audio/visual content over the internet
webcast
web site that allows anyone to change its content
wiki
using the internet to place phone calls
voice over internet protocol (VoIP)
online personal networks where members share common interests, create personalized profiles
social networks
real-time text-based conversations; rooms focus on specific topics or interests
chat rooms
online discussion forums, members post and reply to messages, create or respond to "threads"
newsgroups
The technology used in the world wide web is called hypertext. Documents are connected using ______ and are written in _______ language.
hyperlinks, hypertext mark-up (HTML)
used to surf the web
web browser software
specific location on the web
web site
specific portion of a web site
web page
unique name (domain name) for an entire web site
web site address
unique name (URL) for a web page within a web site
web page address
collection of related web pages, first page known as home or index page
web site
html document with text and graphics, unique address, hyperlinks
web page
identifies a specific computer on the internet, associated with an ip address
domain name
address for a specific page or document, techical name, often called "web page" or "address"
URL (uniform resource locater)
.com can be used by ____
anyone
.edu is for degree granting _____
institutions
.gov means its a ______ website
u.s. government
.net is for _____ organizations
networking
.org is for _______, often non_____
organizations, nonprofits
Web pages are created using this programming language. It describes the layout and content of the page. The web browser "interprets" the language source and displays what is described.
HTML - HyperText Markup Language
text files stored on client computers when visiting web sites, used on return visits to websites unique id number, personal information remembered, privacy risk
cookies
programs that download on your PC when you install/use other software and enable sponsored ads to appear in your browser window or as pop-up
adware
______ is added as a program piggybacked with a requested program. It gathers information, usually about surfing habits and isn't detected by antivirus software. ______ removal programs are required.
Spyware (x2)
Software that has a malicious intent, spyware is a form of it, other forms are viruses, worms, and trojan horses. It is designed to render a computer useless or penetrate it completely
malware
phony communication that attempts to scam someone into revealing personal information
phishing
contain information that is untrue, may request that people send money
hoaxes
What are three types of ways E-commerce goes about conducting business online?
business-to-consumer (B2C), business-to-business (B2B), and consumer-to-consumer (C2C)
E Commerce safeguards are that _____ transactions can be safer than traditional retail shopping. A closed _____ icon indicates a secure website and the url changes from http to https.
transactions, padlock
two or more computers connected together
computer network
devices connected to networks
nodes
benefits of a network:
sharing resources, transferring files
There is a _____ in each computer to act as a doorway for information to move in and out.
network interface card
A _____ provides a pathway for information to move around on wireless devices that propel information through the air
cable
A Network _______ is in place to move information in and out of the computer and to facilitate communications among several computers
operating system
A ______ network design is locally administered and used for small networks (2-5 computers). A ________ network design is centrally administered, used for large networks, used by the internet.
Peer-to-peer, Client/Server
network where a few computers share hardware and information, all computers are equal, and each can have access to devices and files on the others, each computer independently stores its own software and information, but can access the information on the other computers, all computers can access devices connected to any of the other computers
peer-to-peer networks
a network i which one or more computers are servers and provide services to other computers, which are called clients. Servers have hardware, software, and/or information that the client computers can access. Servers are usually powerful computers with large storage systems.
Client/Server networks
criminal acts conducted through the use of computers by cybercriminals
cybercrimes
anyone who unlawfully accesses a computer system
hackers
Hackers can gain ___ access by hacking software or __ access by internet connection and logical ports.
direct, indirect
software programs or hardware designed to close logical ports to invaders
firewalls
a program that attaches itself to another program and spreads itself to other computers, hidden within the code of a host program
viruses
a type of virus that replicates themselves in the boot sector of the hard drive
boot-sector viruses
a type of virus that activates when certain conditions are met
logic bombs
a type of virus that is triggered by the passage of time or on a certain date
time bombs
a type of virus that travels between systems through networks
worms
a type of virus that is hidden on web pages as mini programs
script viruses
a type of virus that attaches to documents
macro viruses
a type of virus that uses a e-mail address book to distribute the virus
e-mail virus
a type of virus that compresses files using a complex encryption key, and user must pay to get the files unlocked
encryption viruses
a virus that periodically rewrite themselves to avoid detection
polymorphic virus
a virus that infects multiple file types
multipartite virus
a virus that erases its code from the hard drive and resides in the active memory
stealth virus
programs designed to detect viruses
antivirus software
Network Navigation devices. A _______ connects computers in a network and is the simplest form of connection computers. A _____ receives and retransmits data to nodes on the same network, sends messages only to the computer that is the intended recipient, can handle multiple communications channels at the same time, can temporarily segment parts of the network with high traffic from the rest of the network. _____ connect computers into a network, and also connects dissimilar networks together.
hubs, switch, router
_____ media provides communications channel between nodes.
transmission
In what type of network are nodes within a small geographic region such as homes, schools, or small business?
Local area network (LAN)
In what type of network are LANS connected over long distances using telecommunications lines?
Wide area network (WAN)
want it to reference that cell no matter where you copy the formula
absolute referencing
What are the Golden Rules for Excel?
1. Never enter data into a spreadsheet that you can reference or calculate from existing data.
2. When you write a formula, write it so you can copy it.
(E-commerce) exchanges that take place between businesses and consumers
business-to-consumer
(E-commerce) businesses buying and selling goods and services to other businesses
business-to-business
(E-commerce) consumers selling to each other through online auction and exchange sites
consumer-to-consumer
the process of conducting business online, such as through advertising and selling products
E-commerce / electronic commerce
two types of network architectures
peer to peer and client/server