Ch 5 Flashcards

(44 cards)

1
Q

A database ____________ is software that allows a user to create a database.

A

Management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A relational database, such as those created in Access, consists of a collection of ___________, each of which consists information on a specific subject.

A

Tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A __________ is a row in an Access table.

A

Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Columns in a n Access table are called __________.

A

Fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A unique identifier is also called a ___________.

A

Primary Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ______________ contains a list of all objects in the database.

A

Navigation pane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In ____________ view, data is presented in rows and columns similar to a spreadsheet.

A

Datasheet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Short text and Currency are examples of _____________.

A

Datatype

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_______________ view is used only to create a table or modify the structure of a table.

A

Design

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If you assign a _____________ to a field, Access will display the value assigned, rather than the field name, in data sheets and forms.

A

Caption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

To make a copy of data stored in an Excel spreadsheet and use it in an Access table, you can __________ the data.

A

Import

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___________ are questions about data in a database.

A

Queries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ____________ is a condition that records must satisfy to be included in the query.

A

Criterion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In ___________ view, you can usually see all the fields, but only for one record.

A

Form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____________ means storing the same fact in more than one place.

A

Redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The term _________ refers to online or Internet based illegal acts.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A _____________ is someone who accesses a computer on network illegally, but originally was a complimentary word for a computer enthusiast.

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A __________ is someone who accesses a computer or network illegally with the intent of destroying data stealing information, or other malicious acts.

19
Q

___________ often use prewritten hacking and cracking programs to break into computers and networks.

A

Script kiddies

20
Q

______________ is the destructive event or prank delivered by malware.

21
Q

A _____________ is a group of comprised devices, connected to a network, that are used to attack other networks.

22
Q

A ___________ is an assault whose purpose is to disrupt computer access to an Internet service.

23
Q

A ___________ is a program that allows users to bypass security controls when accessing a program, computer, or network.

24
Q

___________ is a technique intruders use to make their network or internet transmissions appears legitimate to a victim computer or network.

25
A __________ device authenticates a persons identity by taking a personal characteristic into a digital code that can be verified by a computer.
Biometric
26
__________ is the discovery, collection, and analysis of evidence found on computers and networks.
Digital Forensics
27
Software _________ is the unauthorized and illegal duplication of copyrighted software.
Piracy
28
___________ theft occurs when someone steals software media, intentionally erases programs, illegally registers or activates a program, or illegally copies a program.
Software
29
A _____________ is the right to use software.
License agreement
30
A digital _____________ is an encrypted code that can be attached to an electronic message to verify the identity of the message sender.
Signature
31
A digital ___________ is a notice that guarantees a user or a website is legitimate.
Certificate
32
____________ is the act of stealing digital equipment.
Hardware theft
33
A _____________ is a duplicate of a file, program, or media that can be used if the original is lost, damaged or destroyed.
Backup
34
Technology ______________ are the moral guidelines that govern the use of computers, mobile devices, information systems, and related techniques.
Ethics
35
A _____________ gives authors, artist, and other creators of original work exclusive rights to duplicate, publish, or sell their materials.
Copyright
36
A ______________ is hardware or software that protects a networks resources from intrusions by users on another network.
Firewall
37
A ____________ site is a website that uses encryption techniques to secure its data.
Secure
38
A __________ is a duplicated of a file, program, or media that can be used if the original is lost.
Backup
39
A ______________ is a written guideline that helps determine whether a specification is ethical/unethical or allowed or not allowed.
Code of Conduct
40
_____________ involves reducing the electricity and environmental waste while using computers, mobile devices, and related techniques.
Green Computing
41
____________ is a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and or financial information.
Phishing
42
A virus this is downloaded onto a mobile device by tapping on an object is an example of ____________.
Clickjacking
43
In the field of technology use,_____________ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
Social engineering
44
__________ is the process of restricting access to certain material.
Content filtering