Term
|
Definition
highly detailed & personalized descriptions of individuals. Very likely, you have an electronic profile that includes your name, address, telephone number, Social Security number, driver’s license number, bank account numbers, credit card numbers, telephone records, & shopping & purchasing patterns. |
|
|
Term
freedom of information act |
|
Definition
you are also entitled to look at your records held by government agencies. |
|
|
Term
|
Definition
are small data files that are deposited on your hard disk from websites you have visited. |
|
|
Term
FERPA - family educational rights and privacy act |
|
Definition
restricts disclosure of educational records. |
|
|
Term
|
Definition
|
|
Term
|
Definition
someone who creates and distributes malicious programs |
|
|
Term
|
Definition
which is short for malicious software . They are specifically designed to damage or disrupt a computer system. The three most common types of malware are viruses, worms, & Trojan horses |
|
|
Term
|
Definition
are programs that migrate through networks & operating systems. Most attach themselves to different programs & databases. can alter and/or delete files, can damage system components |
|
|
Term
computer fraud and abuse act |
|
Definition
made in 1986 to the Counterfeit Access Device and Abuse Act that was passed in 1984 and essentially states that, whoever intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains information from any protected computer if the conduct involved an interstate or foreign communication shall be punished under the Act |
|
|
Term
|
Definition
are programs that simply replicate themselves over & over again. Once active in a network, the self-replicating activity clogs computers & networks until their operations are slowed or stopped. |
|
|
Term
|
Definition
are programs that come into a computer system disguised as something else. Trojan horses are not viruses. Like worms, however, they can be carriers of viruses. Most common type of Trojan horse appear as free computer games or free screen savers |
|
|
Term
DoS (denial of service attack |
|
Definition
attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data. |
|
|
Term
|
Definition
imitate these free networks. These rogue networks operate close to the legitimate free hot-spots & typically provide stronger signals that many users unsuspectingly connect to. Once connected, the rogue networks capture any & all information sent by the users to legitimate sites including user names & passwords |
|
|
Term
|
Definition
the fraudulent acquisition and use of a person's private identifying information, usually for financial gain. |
|
|
Term
|
Definition
is simply a scam using the Internet. Internet scams are becoming a serious problem & have created financial & legal problems for many thousands of people |
|
|
Term
|
Definition
devices such as fingerprint and iris (eye) scanners. – scan some part of the body |
|
|
Term
|
Definition
uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account. For this reason, words, names, & simple numeric patterns make weak or poor passwords. |
|
|
Term
|
Definition
the process of coding information to make it unreadable except to those who have a special encryption key to decode it. Protects from unauthorized access |
|
|
Term
HTTPS / hypertext transfer protocol secure |
|
Definition
most common protocol for website encryption |
|
|
Term
HTTP / hypertext transfer protocol |
|
Definition
adds a security level to http. Every URL that begins with https requires that the browser and the connecting site encrypt all messages, providing a safer and more secure transmission |
|
|
Term
|
Definition
describing ways to continue operating until normal computer operations can be restored |
|
|
Term
|
Definition
as you may know, are standards of moral conduct. |
|
|
Term
|
Definition
is the unauthorized copying and/or distribution of software |
|
|
Term
DRM / digital rights management |
|
Definition
DRM encompasses various technologies that control access to electronic media and files. Typically, DRM is used to (1) control the number of devices that can access a given file and (2) limit the kinds of devices that can access a file. |
|
|
Term
|
Definition
which means representing some other person’s work and ideas as your own without giving credit to the original source |
|
|
Term
|
Definition
two ways or perspectives to view data. These perspectives are the physical view and the logical view |
|
|
Term
|
Definition
focuses on the actual format and location of the data. |
|
|
Term
|
Definition
focuses on the meaning, content, and context of the data. End users and most computer professionals are concerned with this view. |
|
|
Term
|
Definition
The next higher level is a field or group of related characters. |
|
|
Term
|
Definition
A database is an integrated collection of logically related tables. |
|
|
Term
|
Definition
Each record has one distinctive, unique field - social security number |
|
|
Term
|
Definition
data is collected over several hours, days, or even weeks. It is then processed all at once as a “batch.” |
|
|
Term
real-time processing / online processing |
|
Definition
also known as online processing, occurs when data is processed at the same time the transaction occurs |
|
|
Term
|
Definition
records for the same customer may appear in different files in the sales department, billing department, and credit department |
|
|
Term
|
Definition
a product ordered might be sent to the new address, but the bill might be sent to the old address. |
|
|
Term
data definition subsystem |
|
Definition
defines the logical structure of the database by using a data dictionary or schema . This dictionary contains a description of the structure of data in the database. For a particular item of data, it defines the names used for a particular field. It defines the type of data for each field (text, numeric, time, graphic, audio, and video). |
|
|
Term
|
Definition
Analysis tools support viewing all or selected parts of the data, querying the database, and generating reports |
|
|
Term
SQL/Structured Query Language |
|
Definition
specialized programming language |
|
|
Term
DBMS (5 models) database management systems |
|
Definition
are hierarchical, network, relational, multi- dimensional, and object-oriented |
|
|
Term
|
Definition
, fields or records are structured in nodes. Nodes are points connected like the branches of an upside-down tree. Each entry has one parent node , although a parent may have several child nodes |
|
|
Term
|
Definition
also has a hierarchical arrangement of nodes. However, each child node may have more than one parent node. This is sometimes described as a many-to-many relationship . There are additional connections—called pointers —between parent nodes and child nodes. |
|
|
Term
|
Definition
In this structure, there are no access paths down a hierarchy. Rather, the data elements are stored in different tables, each of which consists of rows and columns. A table & its data are called a relation. Common fields are used to join or relate the tables to each other. |
|
|
Term
multidimensional database |
|
Definition
extend this two-dimensional data model to include additional or multiple dimensions, sometimes called a data cube . Data can be viewed as a cube having three or more sides & consisting of cells. Each side of the cube is considered a dimension of the data. |
|
|
Term
|
Definition
are more flexible & store data as well as instructions to manipulate the data. Additionally, this structure is ideally designed to provide input for object-oriented software development |
|
|
Term
types of databases (know 4 types) |
|
Definition
: individual, company, distributed, and commercial. |
|
|
Term
|
Definition
(microcomputer database)-a collection of integrated files primarily used by just one person |
|
|
Term
|
Definition
may be stored on a central database server & managed by a database administrator. Users throughout the company have access to the database through their microcomputers linked to local or wide area networks |
|
|
Term
|
Definition
Many times the data in a company is stored not in just one location but in several locations. It is made accessible through a variety of communications networks. |
|
|
Term
|
Definition
is generally an enormous database that an organization develops to cover particular subjects. It offers access to this database to the public or selected outside individuals for a fee |
|
|
Term
Csi-example of commercial database |
|
Definition
Offers consumer & business services, including electronic mail. |
|
|
Term
Dialog information services |
|
Definition
Offers business information, as well as technical & scientific information |
|
|
Term
Dow Jones interactive publishing |
|
Definition
Provides world news & information on business, investments, & stocks |
|
|
Term
|
Definition
Offers news and information on legal, public records, & business issues. |
|
|
Term
|
Definition
To support the needs of managers and other business professionals, many organizations collect data from a variety of internal and external databases. This data is then stored in a special type of database |
|
|
Term
|
Definition
document or data that appears to be nonexistent or lost |
|
|