Ch 5 Flashcards

1
Q

A database ____________ is software that allows a user to create a database.

A

Management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A relational database, such as those created in Access, consists of a collection of ___________, each of which consists information on a specific subject.

A

Tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A __________ is a row in an Access table.

A

Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Columns in a n Access table are called __________.

A

Fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A unique identifier is also called a ___________.

A

Primary Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ______________ contains a list of all objects in the database.

A

Navigation pane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In ____________ view, data is presented in rows and columns similar to a spreadsheet.

A

Datasheet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Short text and Currency are examples of _____________.

A

Datatype

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_______________ view is used only to create a table or modify the structure of a table.

A

Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If you assign a _____________ to a field, Access will display the value assigned, rather than the field name, in data sheets and forms.

A

Caption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

To make a copy of data stored in an Excel spreadsheet and use it in an Access table, you can __________ the data.

A

Import

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___________ are questions about data in a database.

A

Queries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ____________ is a condition that records must satisfy to be included in the query.

A

Criterion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In ___________ view, you can usually see all the fields, but only for one record.

A

Form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____________ means storing the same fact in more than one place.

A

Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The term _________ refers to online or Internet based illegal acts.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A _____________ is someone who accesses a computer on network illegally, but originally was a complimentary word for a computer enthusiast.

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A __________ is someone who accesses a computer or network illegally with the intent of destroying data stealing information, or other malicious acts.

A

Cracker

19
Q

___________ often use prewritten hacking and cracking programs to break into computers and networks.

A

Script kiddies

20
Q

______________ is the destructive event or prank delivered by malware.

A

Payload

21
Q

A _____________ is a group of comprised devices, connected to a network, that are used to attack other networks.

A

Botnet

22
Q

A ___________ is an assault whose purpose is to disrupt computer access to an Internet service.

A

DOS attack

23
Q

A ___________ is a program that allows users to bypass security controls when accessing a program, computer, or network.

A

Backdoor

24
Q

___________ is a technique intruders use to make their network or internet transmissions appears legitimate to a victim computer or network.

A

Spoofing

25
Q

A __________ device authenticates a persons identity by taking a personal characteristic into a digital code that can be verified by a computer.

A

Biometric

26
Q

__________ is the discovery, collection, and analysis of evidence found on computers and networks.

A

Digital Forensics

27
Q

Software _________ is the unauthorized and illegal duplication of copyrighted software.

A

Piracy

28
Q

___________ theft occurs when someone steals software media, intentionally erases programs, illegally registers or activates a program, or illegally copies a program.

A

Software

29
Q

A _____________ is the right to use software.

A

License agreement

30
Q

A digital _____________ is an encrypted code that can be attached to an electronic message to verify the identity of the message sender.

A

Signature

31
Q

A digital ___________ is a notice that guarantees a user or a website is legitimate.

A

Certificate

32
Q

____________ is the act of stealing digital equipment.

A

Hardware theft

33
Q

A _____________ is a duplicate of a file, program, or media that can be used if the original is lost, damaged or destroyed.

A

Backup

34
Q

Technology ______________ are the moral guidelines that govern the use of computers, mobile devices, information systems, and related techniques.

A

Ethics

35
Q

A _____________ gives authors, artist, and other creators of original work exclusive rights to duplicate, publish, or sell their materials.

A

Copyright

36
Q

A ______________ is hardware or software that protects a networks resources from intrusions by users on another network.

A

Firewall

37
Q

A ____________ site is a website that uses encryption techniques to secure its data.

A

Secure

38
Q

A __________ is a duplicated of a file, program, or media that can be used if the original is lost.

A

Backup

39
Q

A ______________ is a written guideline that helps determine whether a specification is ethical/unethical or allowed or not allowed.

A

Code of Conduct

40
Q

_____________ involves reducing the electricity and environmental waste while using computers, mobile devices, and related techniques.

A

Green Computing

41
Q

____________ is a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and or financial information.

A

Phishing

42
Q

A virus this is downloaded onto a mobile device by tapping on an object is an example of ____________.

A

Clickjacking

43
Q

In the field of technology use,_____________ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.

A

Social engineering

44
Q

__________ is the process of restricting access to certain material.

A

Content filtering