• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back
Authentication
the act of confirming the identity of a person or software program; often involves verifying the validity of at least one form of identification.
Authorization
the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular.
What is the first step in solving any problem in systems analysis?
Understand the problem in order to solve it.
Six Questions to solve any problem
Who
What
When
Where
Why
How
SQL injection
attack that takes advantage of improper coding of your web applications that allows hacker to inject SQL commands into say a login form to allow them to gain access to the data held within your database.
normalization
the process of organizing the fields and tables of a relational database to minimize redundancy and dependency; involves dividing large tables into smaller (and less redundant) tables and defining relationships between them.
Boolean
true/false, 0 & 1, null & not null
class variable
A variable that is shared by all instances of a class; defined within a class but outside any of the class's methods.
Public
method anybody can call it if they have access to that class
Private
method ONLY members of the class can call