click below
click below
Normal Size Small Size show me how
Data An Exam 2
| Question | Answer |
|---|---|
| Big Data | The vast amount of data that are created and stored that have grown beyond the capabilities of traditional data processing tools and applications. |
| Database | An organized collection of data |
| Database Management System | A set of programs that control the creation, maintenance, and use of databases |
| Field | In a relational database, stores data about a single characteristic of a record |
| Foreign Key | In a relational database, a field (or fields) that references the primary key of a related table |
| Primary Key | In a relational database, the unique identifier of a record |
| Record | In a relational database, a set of related fields |
| Relational Database | A data store that organizes data in connected two-dimensional tables |
| Data Visualization | A visual representation of data with the goal of clearly communicating or better understanding the meaning of the data |
| Decision | A choice among alternatives |
| Decision Alternative | A method for transforming the current condition into the desired state |
| Decision Criteria | Objective measures of decision requirements and goals that discriminate among the alternatives |
| Decision Goal | Desired decision solution requirements that go beyond the minimum, essential requirements |
| Document Management System | A system that assists with managing, locating, retrieving, and tracking documents |
| Goal-Seek Analysis | An analysis that determines the value of a particular input variable that will produce the desired output |
| Reporting Tools | Information systems tools that allow users to create reports without knowing special commands |
| Requirement (Decision) | A condition that any acceptable solution must provide |
| Semi structured Decision | A decision for which some elements are structured and others are unstructured |
| Structured Decision | A decision that is routine and repetitive and often has well-defined procedures for making it |
| Unstructured Decision | A decision that is novel and therefore has no agreed-upon, well-understood procedure for making i |
| What If Analysis | An analysis that involves seeing how changes in one or more input variables impact the value of one or more outcome variables. Also known as sensitivity analysis |
| Authentication | A process by which the identity of a transacting party is verified |
| Bitcoins | A cryptocurrency or currency that utilizes encryption based on the blockchain technology |
| Blockchain | A network where transactions can be tracked but do not require trust between the transacting parties, thus allowing anonymity |
| Cipher | An algorithm used to encrypt and decrypt plaintext |
| DNA Recognition | A type of security that analyzes segments from an individual’s DNA |
| Ear Recognition | A type of security that analyzes ear features or patterns |
| Encryption | The application of a mathematical algorithm to a message or information that scrambles that message or information to make it unreadable |
| Facial Recognition | A type of security that analyzes facial features or patterns |
| Hacktivism | A type of hacking in which hackers try to find information that, if revealed, will advance human causes |
| Key Pair | A linked public key and private key |
| Password Crackers | Software used to recover forgotten passwords |
| Plaintext | Original message before it is encrypted |
| Risk Management | The process of identifying, assessing, and prioritizing the security risks an organization may face and deciding whether to accept, mitigate, or share the security risks |
| Spamming | Sending emails to many individuals at once, sending unsolicited commercial email to individuals, or targeting one individual computer or network and sending thousands of messages to it |
| Spoofing | Pretending to be someone else (or another computer) to enter a system or gain attention |
| Stealth Virus | A more advanced virus that changes its own bit pattern to become undetectable by virus scanners |
| Theft and Fraud Threats | Threats related to the loss of systems or data due to theft or fraudulent activities |
| Trojan Horses | Viruses embedded into a legitimate file |
| Virus | A computer program designed to perform unwanted events |
| Worms | Viruses that propagate themselves throughout networks with no user intervention required |
| What is a SELECT keyword? | Utilized to return a result of set of rows from one or more tables in a database |
| What is a FROM keyword? | Utilized to specify which table to select from |
| What is a WHERE keyword? | Utilized to specify criteria that field values must meet for the records that contain the values to be included in the search results |
| What is an ORDER BY keyword? | Utilized to sort the result-set, can be specified in ascending or descending order by using ASC and DESC keywords |
| What is a DESC keyword? | Utilized to sort in descending order |
| What is a DISTINCT keyword? | Utilized to return unique values |
| What is an AS keyword? | Utilized to rename a column or table with an alias |
| What is an AND operator? | Used to filter records based on more than one condition |
| What is an OR operator? | Used to display a record if any of the conditions are true |
| What is a NOT operator? | Used in front of conditional statements to select rows for which that statement is false |
| What is an IN operator? | Used to specify multiple values in a where clause |
| What is a % wildcard? | Represents zero or more characters |
| What is an _ wildcard? | Represents a single character, matches just a single character |
| What is an [] wildcard? | Represents any single character within the brackets, specify set of characters any which must match a character in a specified location |
| What is a ^ wildcard? | Represents any character not in the brackets, negates other wildcards |
| = | Equality |
| <> | Nonequality |
| != | Nonequality |
| < | Less than |
| <= | Less than or equal to |
| !< | Not less than |
| > | Greater than |
| >= | Greater than or equal to |
| !> | Not greater than |
| Between | Between two specified values |
| Is Null | Is a Null Value |