Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
75 Cards in this Set
- Front
- Back
what is a database
|
collection of data organized so you can access, retrieve and use it
ex. peoplesoft |
|
how ar edata and information related?
|
data is a collection of unprocessed items
information is data that is organized and meaningful computers process data into information |
|
what is data integrity
|
degree to which data is correct
|
|
garbage in garbage out
|
computer phrase that means you cannot create correct information from incorrect data
|
|
what is a heirarchy
|
database contains files, file contains records, record contains fields, field contains charcters
ex. in access they are called tables |
|
what is a field
|
combination of one or more characters
*smallest unit of data user accesses |
|
what is a field name
|
uiquely identifies each field
|
|
field size
|
defines the maximum number of characters a field can contain
|
|
data type
|
specifies kind of data field contains
|
|
what are common data types?
|
text, numeric, auto number, currency, date, yes/no, hyperlink, object
|
|
what is a record
|
group of related fields
*key field or primary key uniquley identifies each record |
|
what is a data file
|
collection of related records stored on disk
|
|
what is a file maintenance
|
procedures that keep data current
|
|
what is validation
|
process of comparing data with a set of rules to find out if data is correct
reduce data entry errors and enhance data integrity before program writes data on disk |
|
what are types of validity chekcs
|
check digit,alphabetic/numberic check, comleteness check, consistency check
|
|
what is a processing system
|
each department or area within organization has own set of files
|
|
what is the database approach
|
many programs and users can share data in database, secures data so only authorized users can access certain data
|
|
what is a data dictionary
|
contains data about each file in database and each field within those files
|
|
what is a query
|
request for specfic data from a database
|
|
what is a form
|
window on screen that provides areas for entering or changing data in database
|
|
waht is a report generator
|
allows user to design a report on screen, retrieve data into report design , then display or print reprot...
also called a report writer |
|
what is data security
|
DBMS provides means to ensure only authorized users can access data
|
|
what is backup
|
copy of the entire database
|
|
what is log
|
a listing of activities that change database contents
*DBMS places three items in log; before image, actual change, and after image |
|
what is recovery utitlity
|
uses logs/or backups to restore database when it is damaged or destroyed.
|
|
what is recovery utitlity = rollforward
|
DBMS uses log to re-enter changes made to database since last save or backup
*also called forward recovery |
|
what is recovery utitlity = rollback
|
DBMS uses log to undo any changes made to database during a certain period of time
*also called backward recovery |
|
what is data model
|
rules and standards that define how databse organizes data
defines how users view orgainziation of data four popular data models -relational -object-oriented -object-relational -mulitdemensional |
|
what is data model
= relational database |
stores data in tables that consist of rows and columns
-each row has primary key -each column has unique name stores dat relationships uses specialized terminology ***Uses SQL language |
|
what is structured query language (SQL)
|
allows you to manage, update, and retrieve data
has special keywords and rules included in SQL statements |
|
what is an object-oriented database (OODB)
|
stores data in objects (object is item that contians data, as well as actions that read or process data)
adv. can store more types of data, can access data faster, programmers can reuse objects **often uses object query langauge (OQL) |
|
what are examples of applications appropriate for an object-oriented database?
|
mulitmedia database= sotres images, audio clips
computer-aided design CAD = store data about engineering hypermedia database= contain text, graphics, video |
|
what is a multidemensional database
|
stores data in demisions, mulitdeminsions also called hypercube, allow users to analyze and view data = you can do trend surveys
|
|
what is a data warehouse
|
huge database systems that stores and manages data required to analyze historical and current transactions
|
|
what is web database/
|
database you access through the Web by filling in a form on a web page
usually resides on a database server, a computer that stores and provides access to database |
|
what are guidelines for developing a database
|
1) determine the purpose of the database
2)design the tables 3)design the records and fields for each table 4)determine the relationshipos among the tables or files |
|
what is the role of the database analyst
|
datablase anaylyst (DA)= focuses on meaning and usage of data, decides proper placement or fields, defines relationships, and identifies users access privileges
|
|
what is the role of the database administrator
|
DBA= creates and maintains data dictionary, manages database securtiy, monitors databse performance, and checks backup and recovery procedures
|
|
What is a computer security risk?
|
Event or action that causes loss of or damage to computer system
|
|
What are viruses
|
a potentially damaging computer program
|
|
What are worms,
|
copies itself repeatedly, using up resources and possibly shutting down computer or network
|
|
What are Trojan horses?
|
hides within or looks like legitimate program until triggered
does not replicate itself on other computers |
|
what is payload
|
(destructive event) that is delivered when you open file, run infected program, or boot computer with infected disk in disk drive
|
|
What is an antivirus program?
|
Identifies and removes computer viruses
Most also protect against worms and Trojan horses |
|
How does an antivirus program inoculate a program file?
|
-Records information about program such as file size and creation date
-Uses information to detect if virus tampers with file -Attempts to remove any detected virus -Quarantines infected files that it cannot remove |
|
What are a denial of service attack
|
is an assault whichdisrupts computer access to an Internet service such as the Web or e-mail
|
|
What back door?
|
a program or set of instructionsin a program that allow users to bypasssecurity controls when accessing a computerresource
|
|
What is a virus signature?
|
Specific pattern of virus code
Also called virus definition Antivirus programs look for virus signatures |
|
What are spoofing?
|
a technique intruders use to maketheir network or Internet transmissionappear legitimate to a victim computer ornetwork
|
|
What is a firewall?
|
Security system consisting of hardware and/or software that prevents unauthorized intrusion
|
|
What is a personal firewall?
|
-Program that protects personal computer and its data from unauthorized intrusions
-Monitors transmissions to and from computer -Informs you of attempted intrusion |
|
What are other ways to protect your personal computer?
|
Disable file and printer sharing on Internet connection
|
|
What is a user name?
|
-Unique combination of characters that identifies user
-Password is private combination of characters associated with the user name that allows access to computer resources |
|
What is a biometric device?
|
Authenticates person’s identity using personal characteristic
=Fingerprint, hand geometry, voice, signature, and iris |
|
What are hardware theft
|
is act of stealing computer equipment
-Cables sometimes used to lock equipment -Some notebook computers use passwords, possessed objects, and biometrics as security methods -For PDAs and smart phones, you can password-protect the device |
|
What is hardware vandalism
|
is act of defacing or destroying computer equipment
|
|
What is software theft?
|
Act of stealing or illegally stealingsoftware, copying software or intentionally erasing programs
|
|
What is a license agreement?
|
-Right to use software
-Single-user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer |
|
What is encryption?
|
-Safeguards against information theft
-Process of converting plaintext (readable data) into ciphertext (unreadable characters) -Encryption key (formula) often uses more than one method -To read the data, the recipient must decrypt, or decipher, the data |
|
How do Web browsers provide secure data transmission?
|
Many Web browsers use encryption
-Secure site is Web site that uses encryption to secure data -Digital certificate is notice that guarantees Web site is legitimate |
|
What is Secure Sockets Layer (SSL)?
|
Provides encryption of all data that passes between client and Internet server
|
|
What is a surge protector?
|
-Protects computer and equipment from electrical power disturbances
-Uninterruptible power supply (UPS) is surge protector that provides power during power loss |
|
How can I ensure my wireless communication is secure?
|
-Secure your wireless access point (WAP)
-WAP should not broadcast your network name -Enable Wired Equivalent --Privacy or Wi-Fi Protected Access (WPA) |
|
What are computer ethics?
|
Moral guidelines that govern use of computers and information systems
- |
|
What is an IT code of conduct?
|
-Written guideline that helps determine whether computer action is ethical
-Employers can distribute to employees |
|
What is a cookie?
|
Small file on your computer that contains data about you
- |
|
What are spyware
|
program placed on computer without user’s knowledge
|
|
What are adware?
|
a programthat displays onlineadvertisements
|
|
what is spam
|
unsolicited e-mail message sent to many recipients
|
|
What is phishing?
|
Scam in which a perpetratorsends an official looking
e-mail that attemptsto obtain your personal and financial information |
|
What is content filtering?
|
-Process of restricting access to certain material
-Internet Content Rating Association (ICRA) provides rating system of Web content -Web filtering software restricts access to specified sites |
|
What is computer forensics?
|
-Also called digital forensics, network forensics, or cyberforensics
-Discovery, collection, and analysis of evidence found on computers and networks -Computer forensic analysts must have knowledge of the law, technical experience, communication skills, and willingness to learn |
|
What are some health concerns of computer use?
|
-Computer vision syndrome (CVS)—eye and vision problems
-Repetitive strain injury (RSI)= Carpal tunnel syndrome (CTS)—inflammation of nerve that connects forearm to palm and Tendonitis—inflammation of tendon due to repeated motion -Computer addiction—when computer consumes entire social life |
|
What precautions can prevent tendonitis or carpal tunnel syndrome?
|
-Spread fingers apart for several seconds while keeping wrists straight
-Gently push back fingers andthen thumb -Dangle arms loosely at sides and then shake arms and hands |
|
What is green computing?
|
Reducing electricity and environmental waste while using computer
|