Ch 5 Flashcards
A database ____________ is software that allows a user to create a database.
Management system
A relational database, such as those created in Access, consists of a collection of ___________, each of which consists information on a specific subject.
Tables
A __________ is a row in an Access table.
Record
Columns in a n Access table are called __________.
Fields
A unique identifier is also called a ___________.
Primary Key
The ______________ contains a list of all objects in the database.
Navigation pane
In ____________ view, data is presented in rows and columns similar to a spreadsheet.
Datasheet
Short text and Currency are examples of _____________.
Datatype
_______________ view is used only to create a table or modify the structure of a table.
Design
If you assign a _____________ to a field, Access will display the value assigned, rather than the field name, in data sheets and forms.
Caption
To make a copy of data stored in an Excel spreadsheet and use it in an Access table, you can __________ the data.
Import
___________ are questions about data in a database.
Queries
A ____________ is a condition that records must satisfy to be included in the query.
Criterion
In ___________ view, you can usually see all the fields, but only for one record.
Form
____________ means storing the same fact in more than one place.
Redundancy
The term _________ refers to online or Internet based illegal acts.
Cybercrime
A _____________ is someone who accesses a computer on network illegally, but originally was a complimentary word for a computer enthusiast.
Hacker
A __________ is someone who accesses a computer or network illegally with the intent of destroying data stealing information, or other malicious acts.
Cracker
___________ often use prewritten hacking and cracking programs to break into computers and networks.
Script kiddies
______________ is the destructive event or prank delivered by malware.
Payload
A _____________ is a group of comprised devices, connected to a network, that are used to attack other networks.
Botnet
A ___________ is an assault whose purpose is to disrupt computer access to an Internet service.
DOS attack
A ___________ is a program that allows users to bypass security controls when accessing a program, computer, or network.
Backdoor
___________ is a technique intruders use to make their network or internet transmissions appears legitimate to a victim computer or network.
Spoofing
A __________ device authenticates a persons identity by taking a personal characteristic into a digital code that can be verified by a computer.
Biometric
__________ is the discovery, collection, and analysis of evidence found on computers and networks.
Digital Forensics
Software _________ is the unauthorized and illegal duplication of copyrighted software.
Piracy
___________ theft occurs when someone steals software media, intentionally erases programs, illegally registers or activates a program, or illegally copies a program.
Software
A _____________ is the right to use software.
License agreement
A digital _____________ is an encrypted code that can be attached to an electronic message to verify the identity of the message sender.
Signature
A digital ___________ is a notice that guarantees a user or a website is legitimate.
Certificate
____________ is the act of stealing digital equipment.
Hardware theft
A _____________ is a duplicate of a file, program, or media that can be used if the original is lost, damaged or destroyed.
Backup
Technology ______________ are the moral guidelines that govern the use of computers, mobile devices, information systems, and related techniques.
Ethics
A _____________ gives authors, artist, and other creators of original work exclusive rights to duplicate, publish, or sell their materials.
Copyright
A ______________ is hardware or software that protects a networks resources from intrusions by users on another network.
Firewall
A ____________ site is a website that uses encryption techniques to secure its data.
Secure
A __________ is a duplicated of a file, program, or media that can be used if the original is lost.
Backup
A ______________ is a written guideline that helps determine whether a specification is ethical/unethical or allowed or not allowed.
Code of Conduct
_____________ involves reducing the electricity and environmental waste while using computers, mobile devices, and related techniques.
Green Computing
____________ is a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and or financial information.
Phishing
A virus this is downloaded onto a mobile device by tapping on an object is an example of ____________.
Clickjacking
In the field of technology use,_____________ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
Social engineering
__________ is the process of restricting access to certain material.
Content filtering