Test 3 Flashcards

1
Q

A(n) ________ protects an organization’s network from outside attack.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This type of computer criminal creates and shares programs designed to gain unauthorized access to computer systems

A

Crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

T/F: A field description is a required part of the field definition.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The privacy issue that relates to the responsiblity of controlling who is able to use data is:

A

Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

These systems are computer systems that allow people located at various locations to communicate and have live meetings.

A

Videoconferencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A _________ is a field in one table that defers to the primary key field in another table and indicates how the tables are related

A

Foreign Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In Access, the rows in the tables are called _________.

A

Records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following refers to a system that summarizes the detailed data of the transaction processing systems in standard reports for middle-level managers?

A

Managment Information System (MIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T/F: A data name is used to identify the data stored in the field.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In Access, a _________ indicates the type of data that can be stored in a field.

A

Data type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Secret words or phrases used to gain access to a computer system are called

A

Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who among the following need detailed, very current, day-to-day information on units?

A

Supervisory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called a

A

Denial-of-service Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In Access, a(n) _________ consists of a collection of tables, each of which contains information on a specific subject.

A

Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T/F: A field contains information about one person, thing, and place.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The transmission medium that carries the data is referred to as the:

A

Communication channel

17
Q

A ________ is often used as the primary key.

A

Catalog number

18
Q

How a network is arranged and how it shares information and resources is called a network ________.

A

Architecture

19
Q

People who create or improve programs and share those programs are ________.

A

Hackers

20
Q

Information about how often you visit a Web site can be stored in a _____ on your hard drive

A

Cookie

21
Q

Special high-speed lines used by large corportations to support digital communications are known as

A

T1 and T3 lines

22
Q

The department in charge of recording all financial activity is the ________ department.

A

Accounting

23
Q

Computer __________ are guidlines for the morally acceptable use of computers to our society.

A

Ethics

24
Q

T/F: A validation rule is an expression that defines acceptable data entry values.

A

True

25
Q

This object finds and displays selected data.

A

Query