Test 3 Flashcards
A(n) ________ protects an organization’s network from outside attack.
Firewall
This type of computer criminal creates and shares programs designed to gain unauthorized access to computer systems
Crackers
T/F: A field description is a required part of the field definition.
False
The privacy issue that relates to the responsiblity of controlling who is able to use data is:
Access
These systems are computer systems that allow people located at various locations to communicate and have live meetings.
Videoconferencing
A _________ is a field in one table that defers to the primary key field in another table and indicates how the tables are related
Foreign Key
In Access, the rows in the tables are called _________.
Records
Which of the following refers to a system that summarizes the detailed data of the transaction processing systems in standard reports for middle-level managers?
Managment Information System (MIS)
T/F: A data name is used to identify the data stored in the field.
False
In Access, a _________ indicates the type of data that can be stored in a field.
Data type
Secret words or phrases used to gain access to a computer system are called
Passwords
Who among the following need detailed, very current, day-to-day information on units?
Supervisory
An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called a
Denial-of-service Attack
In Access, a(n) _________ consists of a collection of tables, each of which contains information on a specific subject.
Database
T/F: A field contains information about one person, thing, and place.
False
The transmission medium that carries the data is referred to as the:
Communication channel
A ________ is often used as the primary key.
Catalog number
How a network is arranged and how it shares information and resources is called a network ________.
Architecture
People who create or improve programs and share those programs are ________.
Hackers
Information about how often you visit a Web site can be stored in a _____ on your hard drive
Cookie
Special high-speed lines used by large corportations to support digital communications are known as
T1 and T3 lines
The department in charge of recording all financial activity is the ________ department.
Accounting
Computer __________ are guidlines for the morally acceptable use of computers to our society.
Ethics
T/F: A validation rule is an expression that defines acceptable data entry values.
True
This object finds and displays selected data.
Query