Final Exam Day 6 Flashcards
___________ is the destructive event or prank delivered by malware.
Payload
A ____________ is the right to use software that is not owned by the user.
License Agreement
A ___________ is someone who accesses a computer on network illegally with the intent of destroying data, stealing information, or performing other malicious acts.
Cracker
____________ is a technique intruders use to make their transmission appear legitimate.
Spoofing
___________ is software that may freeze the screen of a device and require payment from the user to green access to the device.
Ransomware
A ____________ is a condition that records must satisfy to be included in a query.
Criterion
A unique identifier is also called a __________.
Primary key
Access databases are __________ and consist of tables, each of which consist of information on a specific subject.
Relational databases
A ____________ determines the type of data that can be stored in a field.
Data type
In form view, you can usually only see one _____________.
Record
The ____________ contains a list of all objects in the database.
Navigation pane
In ____________ view, data is presented in rows and columns similar to a spreadsheet.
Datasheet
____________ are questions about data in a database.
Queries
_____________ means storing the same fact in more than one place in a database.
Redundancy