• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/75

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

75 Cards in this Set

  • Front
  • Back
what is a database
collection of data organized so you can access, retrieve and use it

ex. peoplesoft
how ar edata and information related?
data is a collection of unprocessed items

information is data that is organized and meaningful

computers process data into information
what is data integrity
degree to which data is correct
garbage in garbage out
computer phrase that means you cannot create correct information from incorrect data
what is a heirarchy
database contains files, file contains records, record contains fields, field contains charcters

ex. in access they are called tables
what is a field
combination of one or more characters

*smallest unit of data user accesses
what is a field name
uiquely identifies each field
field size
defines the maximum number of characters a field can contain
data type
specifies kind of data field contains
what are common data types?
text, numeric, auto number, currency, date, yes/no, hyperlink, object
what is a record
group of related fields

*key field or primary key uniquley identifies each record
what is a data file
collection of related records stored on disk
what is a file maintenance
procedures that keep data current
what is validation
process of comparing data with a set of rules to find out if data is correct

reduce data entry errors and enhance data integrity before program writes data on disk
what are types of validity chekcs
check digit,alphabetic/numberic check, comleteness check, consistency check
what is a processing system
each department or area within organization has own set of files
what is the database approach
many programs and users can share data in database, secures data so only authorized users can access certain data
what is a data dictionary
contains data about each file in database and each field within those files
what is a query
request for specfic data from a database
what is a form
window on screen that provides areas for entering or changing data in database
waht is a report generator
allows user to design a report on screen, retrieve data into report design , then display or print reprot...

also called a report writer
what is data security
DBMS provides means to ensure only authorized users can access data
what is backup
copy of the entire database
what is log
a listing of activities that change database contents

*DBMS places three items in log; before image, actual change, and after image
what is recovery utitlity
uses logs/or backups to restore database when it is damaged or destroyed.
what is recovery utitlity = rollforward
DBMS uses log to re-enter changes made to database since last save or backup

*also called forward recovery
what is recovery utitlity = rollback
DBMS uses log to undo any changes made to database during a certain period of time

*also called backward recovery
what is data model
rules and standards that define how databse organizes data

defines how users view orgainziation of data

four popular data models
-relational
-object-oriented
-object-relational
-mulitdemensional
what is data model
= relational database
stores data in tables that consist of rows and columns
-each row has primary key
-each column has unique name

stores dat relationships
uses specialized terminology

***Uses SQL language
what is structured query language (SQL)
allows you to manage, update, and retrieve data

has special keywords and rules included in SQL statements
what is an object-oriented database (OODB)
stores data in objects (object is item that contians data, as well as actions that read or process data)

adv. can store more types of data, can access data faster, programmers can reuse objects

**often uses object query langauge (OQL)
what are examples of applications appropriate for an object-oriented database?
mulitmedia database= sotres images, audio clips

computer-aided design CAD = store data about engineering

hypermedia database= contain text, graphics, video
what is a multidemensional database
stores data in demisions, mulitdeminsions also called hypercube, allow users to analyze and view data = you can do trend surveys
what is a data warehouse
huge database systems that stores and manages data required to analyze historical and current transactions
what is web database/
database you access through the Web by filling in a form on a web page

usually resides on a database server, a computer that stores and provides access to database
what are guidelines for developing a database
1) determine the purpose of the database
2)design the tables
3)design the records and fields for each table
4)determine the relationshipos among the tables or files
what is the role of the database analyst
datablase anaylyst (DA)= focuses on meaning and usage of data, decides proper placement or fields, defines relationships, and identifies users access privileges
what is the role of the database administrator
DBA= creates and maintains data dictionary, manages database securtiy, monitors databse performance, and checks backup and recovery procedures
What is a computer security risk?
Event or action that causes loss of or damage to computer system
What are viruses
a potentially damaging computer program
What are worms,
copies itself repeatedly, using up resources and possibly shutting down computer or network
What are Trojan horses?
hides within or looks like legitimate program until triggered

does not replicate itself on other computers
what is payload
(destructive event) that is delivered when you open file, run infected program, or boot computer with infected disk in disk drive
What is an antivirus program?
Identifies and removes computer viruses

Most also protect against worms and Trojan horses
How does an antivirus program inoculate a program file?
-Records information about program such as file size and creation date
-Uses information to detect if virus tampers with file
-Attempts to remove any detected virus
-Quarantines infected files that it cannot remove
What are a denial of service attack
is an assault which disrupts computer access to an Internet service such as the Web or e-mail
What back door?
a program or set of instructions in a program that allow users to bypass security controls when accessing a computer resource
What is a virus signature?
Specific pattern of virus code
Also called virus definition

Antivirus programs look for virus signatures
What are spoofing?
a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
What is a firewall?
Security system consisting of hardware and/or software that prevents unauthorized intrusion
What is a personal firewall?
-Program that protects personal computer and its data from unauthorized intrusions
-Monitors transmissions to and from computer
-Informs you of attempted intrusion
What are other ways to protect your personal computer?
Disable file and printer sharing on Internet connection
What is a user name?
-Unique combination of characters that identifies user
-Password is private combination of characters associated with the user name that allows access to computer resources
What is a biometric device?
Authenticates person’s identity using personal characteristic
=Fingerprint, hand geometry, voice, signature, and iris
What are hardware theft
is act of stealing computer equipment
-Cables sometimes used to lock equipment
-Some notebook computers use passwords, possessed objects, and biometrics as security methods
-For PDAs and smart phones, you can password-protect the device
What is hardware vandalism
is act of defacing or destroying computer equipment
What is software theft?
Act of stealing or illegally stealing software, copying software or intentionally erasing programs
What is a license agreement?
-Right to use software
-Single-user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer
What is encryption?
-Safeguards against information theft
-Process of converting plaintext (readable data) into ciphertext (unreadable characters)
-Encryption key (formula) often uses more than one method
-To read the data, the recipient must decrypt, or decipher, the data
How do Web browsers provide secure data transmission?
Many Web browsers use encryption
-Secure site is Web site that uses encryption to secure data
-Digital certificate is notice that guarantees Web site is legitimate
What is Secure Sockets Layer (SSL)?
Provides encryption of all data that passes between client and Internet server
What is a surge protector?
-Protects computer and equipment from electrical power disturbances
-Uninterruptible power supply (UPS) is surge protector that provides power during power loss
How can I ensure my wireless communication is secure?
-Secure your wireless access point (WAP)
-WAP should not broadcast your network name
-Enable Wired Equivalent
--Privacy or Wi-Fi Protected Access (WPA)
What are computer ethics?
Moral guidelines that govern use of computers and information systems

-
What is an IT code of conduct?
-Written guideline that helps determine whether computer action is ethical
-Employers can distribute to employees
What is a cookie?
Small file on your computer that contains data about you
-
What are spyware
program placed on computer without user’s knowledge
What are adware?
a program that displays online advertisements
what is spam
unsolicited e-mail message sent to many recipients
What is phishing?
Scam in which a perpetrator sends an official looking
e-mail that attempts to obtain your personal and financial information
What is content filtering?
-Process of restricting access to certain material
-Internet Content Rating Association (ICRA) provides rating system of Web content
-Web filtering software restricts access to specified sites
What is computer forensics?
-Also called digital forensics, network forensics, or cyberforensics
-Discovery, collection, and analysis of evidence found on computers and networks
-Computer forensic analysts must have knowledge of the law, technical experience, communication skills, and willingness to learn
What are some health concerns of computer use?
-Computer vision syndrome (CVS)—eye and vision problems
-Repetitive strain injury (RSI)= Carpal tunnel syndrome (CTS)—inflammation of nerve that connects forearm to palm
and Tendonitis—inflammation of tendon due to repeated motion
-Computer addiction—when computer consumes entire social life
What precautions can prevent tendonitis or carpal tunnel syndrome?
-Spread fingers apart for several seconds while keeping wrists straight
-Gently push back fingers and then thumb
-Dangle arms loosely at sides and then shake arms and hands
What is green computing?
Reducing electricity and environmental waste while using computer