Ch 5 Flashcards
(44 cards)
A database ____________ is software that allows a user to create a database.
Management system
A relational database, such as those created in Access, consists of a collection of ___________, each of which consists information on a specific subject.
Tables
A __________ is a row in an Access table.
Record
Columns in a n Access table are called __________.
Fields
A unique identifier is also called a ___________.
Primary Key
The ______________ contains a list of all objects in the database.
Navigation pane
In ____________ view, data is presented in rows and columns similar to a spreadsheet.
Datasheet
Short text and Currency are examples of _____________.
Datatype
_______________ view is used only to create a table or modify the structure of a table.
Design
If you assign a _____________ to a field, Access will display the value assigned, rather than the field name, in data sheets and forms.
Caption
To make a copy of data stored in an Excel spreadsheet and use it in an Access table, you can __________ the data.
Import
___________ are questions about data in a database.
Queries
A ____________ is a condition that records must satisfy to be included in the query.
Criterion
In ___________ view, you can usually see all the fields, but only for one record.
Form
____________ means storing the same fact in more than one place.
Redundancy
The term _________ refers to online or Internet based illegal acts.
Cybercrime
A _____________ is someone who accesses a computer on network illegally, but originally was a complimentary word for a computer enthusiast.
Hacker
A __________ is someone who accesses a computer or network illegally with the intent of destroying data stealing information, or other malicious acts.
Cracker
___________ often use prewritten hacking and cracking programs to break into computers and networks.
Script kiddies
______________ is the destructive event or prank delivered by malware.
Payload
A _____________ is a group of comprised devices, connected to a network, that are used to attack other networks.
Botnet
A ___________ is an assault whose purpose is to disrupt computer access to an Internet service.
DOS attack
A ___________ is a program that allows users to bypass security controls when accessing a program, computer, or network.
Backdoor
___________ is a technique intruders use to make their network or internet transmissions appears legitimate to a victim computer or network.
Spoofing