click below
click below
Normal Size Small Size show me how
CSCI 120
Computers in Society
Question | Answer |
---|---|
backup | copy of a file or directory on a separate storage device |
character | can be a number, letter, punctuation mark, or other symbol |
column | term used by users of relational databases for field. |
data dictionary | A DBMS element that contains data about each file in a database and each field in those files. |
data file | Collection of related records on a storage medium such as a hard disk, CD, or DVD |
data model | rules and standards that define how a database organizes data |
data type | 7 |
data warehouse | 8 |
database | is a collection of data organized in a matter that allows access, retrieval, and use of data |
database administrator | (DBA) creates and maintains the data dictionary, manages security of the database, monitors the performance of the database, and checks backup and recovery procedures |
database analyst | person who focuses on the meaning and usage in data i.e,. definining relationships among data and allowing users' access privileges |
database approach | 12 |
database management system | 13 |
database software | 14 |
field | a combination of one or more related characters or bytes, a field isthe smallest unit of data a user accesses. |
field name | 16 |
field size | defines the max. number of characters a field can contain |
file maintenance | 18 |
file processing system | System used to store and manage data in which each department or area within an organization has its own set of files. |
form | 20 |
key filed | 21 |
log | any of various chronological records made concerning the use of a computer system, the changes made to data, etc. |
multidimensional database | Database that stores data in demininsions |
object | database item that contains data, as well as the actions that read or process the data |
object-oriented database | Stores data in objects. |
primary key | 26 |
query | request for a specific data from the database. |
query by example | 28 |
query language | 29 |
record | group of related fields in a database |
recovery utility | 31 |
relational database | database consisting of separate tables, having explicitly defined relationships, and whose elements may be selectively combined as the results of queries |
relationship | is a connection within the data |
report gnerator | DBMS feature that allows users to design a report on the screen,retrieve data into the report design,and then display or print the report. |
row | Term used by users of relational databases for record. |
SQL | Structured Query Language- Query language used with databases that allows users to manage, update, and retrieve data |
table | term used by users of relational databases for file |
validation | 7 |
anti-spam program | 8 |
Antivirus software | protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. |
audit trail | records in a file both successful and unsuccessful acces attempts to gain entrance into a confidential information on a computer |
back door | a program that allows users to bypass certain security controls when accessing a program, computer or network. eg. used by worms to distribute junk |
back up | 12 |
backup | 13 |
biometric device | 14 |
botnet | group of compromised computers connected to a network such as the internet that is being used as part of a network that attacks other networks, usually for nefarious purposes. |
code of conduct | 16 |
computer addiction | growing health problem that occurs when the computer consumes someones entire social life |
computer crime | 18 |
computer ethics | Moral guidelines that govern the use of computers and information systems |
computer forensics | 20 |
computer security risk | 21 |
computer vision syndrome | temporary condition resulting from focusing the eyes on a computer display for protracted, uninterrupted periods of time. |
content filtering | Process of restricing access to certain material on the web. |
cookie | small text file |
copyright | Gives authors and artists exclusive rights to duplicate, publish, and sell their materials. |
cracker | 26 |
cybercrime | refers to online or Internet-based illegal acts. |
cyberextortionist | 28 |
cyberterrorist | 29 |
decrypt | Process of deciphering encrypted data into a readable form. |
denial of service attack | 31 |
digital certificate | An electronic document that verifies the owner of a public key, issued by a certificate authority |
digital signature | is an encrypted code that a person, web site or company attaches to an electronic messsage to verify the identity of the message sender |
DoS attack | assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. |
e-mail filtering | Service that blocks e-mails messages from designated sources. |
employee monitoring | The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity) and Web sites visited. |
encryption | process of converting readable data into unreadable characters to prevent unauthorized access |
Fair Credit Reporting Act | 7 |
firewall | 8 |
Green Computing | involves reducing the electricity and environmental waste while using a computer |
hacker | refers to someone who accesses a computer or network illegally |
hardware theft | the physical act of stealing computer equipment |
hardware vandalism | 12 |
information privacy | 13 |
information theft | 14 |
inoculate | capability of an antivirus program to record information such a file size and file creation date in a seperate file in order to detect viruses. |
intellectual property rights | 16 |
license agreement | an agreement issued by a software manufacturer that gives the user the right to use the software |
noise | 18 |
online security service | Website that evaluates a computer to check for Internet and e-mail vulnerabilities. |
overvoltage | 20 |
password | 21 |
personal firewall | an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy. |
personal identification number | Password that can be used with a bankcard at an ATM, which verifies the user is the holder of the bankcard. |
pharming | when a perpetrator tries to obtain your personal info via spoofing |
phishing | Is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information. |
piracy | 26 |
power surge | occurs when incoming electrical power increases significantly above the normal 120 volts. |
product activation | 28 |
quarantine | 29 |
repetitive strain injury | Injury or disorder of the muscles, nerves, tendons, ligaments, and joints. |
restore | 31 |
script kiddie | describe those who use scripts or programs developed by others to attack computer systems and networks. It is generally assumed that script kiddies are juveniles who lack the ability to write sophisticated hacking programs or exploits on their own |
secure site | a web site that uses encrytion techniques to secure its data |
social engineering | gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. |
software theft | Computer security risk that occurs when someone steals software media, intentionally erases programs or illegally copies a program. |
spam | Unsolicited e-mail messages or newsgroups posting sent to many recipients or newsgroups at once. |
spoofing | technique intruders use to make their network or internet transmission appear legitmate to a victim computer or network |
surge protector | 7 |
Trojan horse | 8 |
trusted source | companyor a person a user believes will not send a virus infected file knowingly |
unauthorized access | the use of a computer or network without permission. |
unauthorized use | see above |
undervoltage | 12 |
uninterruptible power supply | 13 |
user name | 14 |
virus | potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without a user's knowledge or permission. |
virus definition | 16 |
virus hoax | email message that warns users of a nonexistent virus, worm or trojan horse. |
virus signature | 18 |
web filtering software | Program that restricts access to certain material on the Web |
worm | 20 |
zombie | 21 |