Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CSCI 120

Computers in Society

QuestionAnswer
backup copy of a file or directory on a separate storage device
character can be a number, letter, punctuation mark, or other symbol
column term used by users of relational databases for field.
data dictionary A DBMS element that contains data about each file in a database and each field in those files.
data file Collection of related records on a storage medium such as a hard disk, CD, or DVD
data model rules and standards that define how a database organizes data
data type 7
data warehouse 8
database is a collection of data organized in a matter that allows access, retrieval, and use of data
database administrator (DBA) creates and maintains the data dictionary, manages security of the database, monitors the performance of the database, and checks backup and recovery procedures
database analyst person who focuses on the meaning and usage in data i.e,. definining relationships among data and allowing users' access privileges
database approach 12
database management system 13
database software 14
field a combination of one or more related characters or bytes, a field isthe smallest unit of data a user accesses.
field name 16
field size defines the max. number of characters a field can contain
file maintenance 18
file processing system System used to store and manage data in which each department or area within an organization has its own set of files.
form 20
key filed 21
log any of various chronological records made concerning the use of a computer system, the changes made to data, etc.
multidimensional database Database that stores data in demininsions
object database item that contains data, as well as the actions that read or process the data
object-oriented database Stores data in objects.
primary key 26
query request for a specific data from the database.
query by example 28
query language 29
record group of related fields in a database
recovery utility 31
relational database database consisting of separate tables, having explicitly defined relationships, and whose elements may be selectively combined as the results of queries
relationship is a connection within the data
report gnerator DBMS feature that allows users to design a report on the screen,retrieve data into the report design,and then display or print the report.
row Term used by users of relational databases for record.
SQL Structured Query Language- Query language used with databases that allows users to manage, update, and retrieve data
table term used by users of relational databases for file
validation 7
anti-spam program 8
Antivirus software protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.
audit trail records in a file both successful and unsuccessful acces attempts to gain entrance into a confidential information on a computer
back door a program that allows users to bypass certain security controls when accessing a program, computer or network. eg. used by worms to distribute junk
back up 12
backup 13
biometric device 14
botnet group of compromised computers connected to a network such as the internet that is being used as part of a network that attacks other networks, usually for nefarious purposes.
code of conduct 16
computer addiction growing health problem that occurs when the computer consumes someones entire social life
computer crime 18
computer ethics Moral guidelines that govern the use of computers and information systems
computer forensics 20
computer security risk 21
computer vision syndrome temporary condition resulting from focusing the eyes on a computer display for protracted, uninterrupted periods of time.
content filtering Process of restricing access to certain material on the web.
cookie small text file
copyright Gives authors and artists exclusive rights to duplicate, publish, and sell their materials.
cracker 26
cybercrime refers to online or Internet-based illegal acts.
cyberextortionist 28
cyberterrorist 29
decrypt Process of deciphering encrypted data into a readable form.
denial of service attack 31
digital certificate An electronic document that verifies the owner of a public key, issued by a certificate authority
digital signature is an encrypted code that a person, web site or company attaches to an electronic messsage to verify the identity of the message sender
DoS attack assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail.
e-mail filtering Service that blocks e-mails messages from designated sources.
employee monitoring The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity) and Web sites visited.
encryption process of converting readable data into unreadable characters to prevent unauthorized access
Fair Credit Reporting Act 7
firewall 8
Green Computing involves reducing the electricity and environmental waste while using a computer
hacker refers to someone who accesses a computer or network illegally
hardware theft the physical act of stealing computer equipment
hardware vandalism 12
information privacy 13
information theft 14
inoculate capability of an antivirus program to record information such a file size and file creation date in a seperate file in order to detect viruses.
intellectual property rights 16
license agreement an agreement issued by a software manufacturer that gives the user the right to use the software
noise 18
online security service Website that evaluates a computer to check for Internet and e-mail vulnerabilities.
overvoltage 20
password 21
personal firewall an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy.
personal identification number Password that can be used with a bankcard at an ATM, which verifies the user is the holder of the bankcard.
pharming when a perpetrator tries to obtain your personal info via spoofing
phishing Is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.
piracy 26
power surge occurs when incoming electrical power increases significantly above the normal 120 volts.
product activation 28
quarantine 29
repetitive strain injury Injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
restore 31
script kiddie describe those who use scripts or programs developed by others to attack computer systems and networks. It is generally assumed that script kiddies are juveniles who lack the ability to write sophisticated hacking programs or exploits on their own
secure site a web site that uses encrytion techniques to secure its data
social engineering gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
software theft Computer security risk that occurs when someone steals software media, intentionally erases programs or illegally copies a program.
spam Unsolicited e-mail messages or newsgroups posting sent to many recipients or newsgroups at once.
spoofing technique intruders use to make their network or internet transmission appear legitmate to a victim computer or network
surge protector 7
Trojan horse 8
trusted source companyor a person a user believes will not send a virus infected file knowingly
unauthorized access the use of a computer or network without permission.
unauthorized use see above
undervoltage 12
uninterruptible power supply 13
user name 14
virus potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without a user's knowledge or permission.
virus definition 16
virus hoax email message that warns users of a nonexistent virus, worm or trojan horse.
virus signature 18
web filtering software Program that restricts access to certain material on the Web
worm 20
zombie 21
Created by: globalscience
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards