• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back
constructor
method/object called when object is instantiated (create instance of object)
destructor
method/object called when object is destroyed; tears down values of class
Authentication
the act of confirming the identity of a person or software program; often involves verifying the validity of at least one form of identification.
Authorization
the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular.
What is the first step in solving any problem in systems analysis?
Understand the problem in order to solve it.
SQL injection
attack that takes advantage of improper coding of your web applications that allows hacker to inject SQL commands into say a login form to allow them to gain access to the data held within your database.
normalization
the process of organizing the fields and tables of a relational database to minimize redundancy and dependency; involves dividing large tables into smaller (and less redundant) tables and defining relationships between them.
instantiation
creating an instance/object of a class
Boolean
true/false, 0 & 1, null & not null
class variable
A variable that is shared by all instances of a class; defined within a class but outside any of the class's methods.