Chapter 1 Flashcards
Bench Test
A check that determines how a solution would behave with a range of data. The intention is to predict how the solution will treat the sample data.
Cookie
A small file that a web server stores on a users computer containing data about the user and web viewing preferences.
Data Acquisition Software
Program designed to create an online user form and then assist in retrieving and storing that data
Data Integrity
TARA - Timeliness, Authenticity, Relevancy, Accuracy
Effectiveness
COME BACK TO ME
Efficiency
Time, Cost, Effort
Entity Relation Diagram
A diagram that shows the interrelationships between difference entities and their attributes
First normal form (1NF)
A table with no repeating groups; no single row has a column containing more than one value
Flat File
A database that stores data in tables consisting of rows and columns; AKA Single table database
Foreign Key
A common linking field, a field defined as a primary key in another table that is used to link tables together.
Hasing
A method of encryption of data
HTTPS
Hyper Text Transfer Protocol Secure; A combination of SSL and HTTP
Input Mask
A control applied to how data is entered; it restricts entry of data to the specified format
Machine Validation
Database validation tools to detect inputed values that are not following the validation rule
Malware
A program designed to have undesirable or harmful effects
Manual Validation
Inspecting the data to check for any mistakes
Normalisation
Removing redundant data and arranging it into appropriate tables to improve data integrity and reduce redundancy; follows a set of rules to check for non normalised data.
Primary Key
Uniquely identifies a record in a table/database
Privacy Policy
A document stating Why the organisation is collecting data, The purpose of the data/what they will use it for, How it will be stored
Query
Select specific data based on a series of criteria
RDBMS
Relation Database Management System; Database with linking tables
Second normal form (2NF)
Any column that is not part of the primary key is dependent on the whole primary key (????? Come back to me)
SSL
Secure Socket Layer; provide security in the transmission of data
Spyware
Discretely installed, collects data about the user and can change settings
Task Completeness
A solutions ability to support all of the tasks a user wants to perform, in the way they expect
Third normal form (3NF)
Come back to me????
User Flow Diagram
A chart that shows the steps a user takes to complete a transaction such as purchase or sign up on a website
Validation
Checking the data on input it is used for Existence Checking, Range Checking, Data-type checking
Validation Rule
A rule that restricts data entry to only that of which follows or meets the validation criteria