• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/42

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

42 Cards in this Set

  • Front
  • Back

first type of computer crime

illegal act perpetrated against computers or telecommunications, such as hardware theft

second type of computer crime

use of computers or telecommunications to accomplish an illegal act, such as identity theft

evil twin attack

an evil doer sets up a Wi-Fi hot spot that your computer thinks offers safe access to a secure public network and then monitors your communications and steals data you input

security

a system of safegaurds for protecting information technology against disasters, system failures, and unauthorized access that can result in damage or loss

biometrics

the science of measuring individual body characteristics

encryption

the process of altering readable data into unreadable form to prevent unauthorized access

disaster-recovery plan

a method of restoring information-processing operations that have been halted by destruction or accident

cyberwarfare

warfare involving computers and the Internet in which one nation attacks another's information systems

database

a collection of interrelated data and files

data storage hierarchy

levels of data stored in a computer database: bits, characters (bytes), fields, records, and tables (files)

character (byte)

a letter, number, or special character

field

unit or category of data consisting of one or more characters (bytes)

record

collection of related fields

file

collection of related records

database management system (DBMS)

software written specifically to control the structure of a database and access to the data

data dictionary

a document or file that stores the data definitions and descriptions of the structure of data used in the databse

metadata

data that describes other data

DBMS utilities

programs that allow you to maintain the database by creating, editing, and deleting data, records, and files

report generator

a program for producing an on-screen or printed document form all or part of a database

database administrator (DBA)

coordinates all related activities and needs for an organization's database

relational database

relates, or connects, data in different tables of rows and columns through the use of primary keys, or common data elements

structured query language (SQL)

standard query language used to create, modify, maintain, and query relational databases

query by example (QBE)

the user asks for information in a database by using a sample record form, or table, to define the qualifications he or she wants for selected records

object-oriented database

uses "objects", software written in small, reusable chunks, as elements within database files

multidimensional database (MDB)

models data as facts, dimensions, or numerical measure for use in the interactive analysis of large amounts of data for decision-making purposes

data mining (DM)

the computer-assisted process of sifting through and analyzing vast amounts of data in order to extract hidden patterns and meaning and to discover new knowledge

data warehouse

a special database of cleaned-up data and metadata

cyberattacks

attempts to gain unauthorized access to or to disrupt or damage a computer system or electronic communications network

troll

a person who posts intentionally offensive, incendiary, or off-topic comments online

hacker

a person who gains unauthorized access to computers or networks

crackers

people who break into computers for destructive purposes

denial-of-service (DoS) attack

making repeated requests of a computer system or network, thereby overloading it and denying legitimate users access to it

worms

program that copies itself repeatedly into a computer's memory or onto a disk or flash drive or USB device

trojan horse

a program that pretends to be a useful program, usually free, such as a game or screen saver, but carries viruses, or destructive instructions, that perpetrate mischief without your knowledge

rootkit

a secret software program installed in a computer's operating system that someone in another location can use to take control of the computer

blended threats

use multiple techniques to attack a computer systems

zombie

computer taken over covertly and programmed to respond to instructions sent remotely

botnet

a network of computers in which each computer has been implanted with instructions to wait for commands from the person controlling the botnet

privacy

the right of people not to reveal information about themselves

identity (ID) theft

a crime in which thieves hijack your name and identity and use your information and credit rating to get cash or buy things

database software

a program that sets up and controls the structure of a database and access to the data

key

field used to sort data