Test 3 Flashcards
A(n) ________ protects an organization’s network from outside attack.
Firewall
This type of computer criminal creates and shares programs designed to gain unauthorized access to computer systems
Crackers
T/F: A field description is a required part of the field definition.
False
The privacy issue that relates to the responsiblity of controlling who is able to use data is:
Access
These systems are computer systems that allow people located at various locations to communicate and have live meetings.
Videoconferencing
A _________ is a field in one table that defers to the primary key field in another table and indicates how the tables are related
Foreign Key
In Access, the rows in the tables are called _________.
Records
Which of the following refers to a system that summarizes the detailed data of the transaction processing systems in standard reports for middle-level managers?
Managment Information System (MIS)
T/F: A data name is used to identify the data stored in the field.
False
In Access, a _________ indicates the type of data that can be stored in a field.
Data type
Secret words or phrases used to gain access to a computer system are called
Passwords
Who among the following need detailed, very current, day-to-day information on units?
Supervisory
An attempt to slow down or stop a computer system or network by flooding the system with requests for information is called a
Denial-of-service Attack
In Access, a(n) _________ consists of a collection of tables, each of which contains information on a specific subject.
Database
T/F: A field contains information about one person, thing, and place.
False