Term
|
Definition
| highly detailed & personalized descriptions of individuals. Very likely, you have an electronic profile that includes your name, address, telephone number, Social Security number, driver’s license number, bank account numbers, credit card numbers, telephone records, & shopping & purchasing patterns. |
|
|
Term
| freedom of information act |
|
Definition
| you are also entitled to look at your records held by government agencies. |
|
|
Term
|
Definition
| are small data files that are deposited on your hard disk from websites you have visited. |
|
|
Term
| FERPA - family educational rights and privacy act |
|
Definition
| restricts disclosure of educational records. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| someone who creates and distributes malicious programs |
|
|
Term
|
Definition
| which is short for malicious software . They are specifically designed to damage or disrupt a computer system. The three most common types of malware are viruses, worms, & Trojan horses |
|
|
Term
|
Definition
| are programs that migrate through networks & operating systems. Most attach themselves to different programs & databases. can alter and/or delete files, can damage system components |
|
|
Term
| computer fraud and abuse act |
|
Definition
| made in 1986 to the Counterfeit Access Device and Abuse Act that was passed in 1984 and essentially states that, whoever intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains information from any protected computer if the conduct involved an interstate or foreign communication shall be punished under the Act |
|
|
Term
|
Definition
| are programs that simply replicate themselves over & over again. Once active in a network, the self-replicating activity clogs computers & networks until their operations are slowed or stopped. |
|
|
Term
|
Definition
| are programs that come into a computer system disguised as something else. Trojan horses are not viruses. Like worms, however, they can be carriers of viruses. Most common type of Trojan horse appear as free computer games or free screen savers |
|
|
Term
| DoS (denial of service attack |
|
Definition
| attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data. |
|
|
Term
|
Definition
| imitate these free networks. These rogue networks operate close to the legitimate free hot-spots & typically provide stronger signals that many users unsuspectingly connect to. Once connected, the rogue networks capture any & all information sent by the users to legitimate sites including user names & passwords |
|
|
Term
|
Definition
| the fraudulent acquisition and use of a person's private identifying information, usually for financial gain. |
|
|
Term
|
Definition
| is simply a scam using the Internet. Internet scams are becoming a serious problem & have created financial & legal problems for many thousands of people |
|
|
Term
|
Definition
| devices such as fingerprint and iris (eye) scanners. – scan some part of the body |
|
|
Term
|
Definition
| uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account. For this reason, words, names, & simple numeric patterns make weak or poor passwords. |
|
|
Term
|
Definition
| the process of coding information to make it unreadable except to those who have a special encryption key to decode it. Protects from unauthorized access |
|
|
Term
| HTTPS / hypertext transfer protocol secure |
|
Definition
| most common protocol for website encryption |
|
|
Term
| HTTP / hypertext transfer protocol |
|
Definition
| adds a security level to http. Every URL that begins with https requires that the browser and the connecting site encrypt all messages, providing a safer and more secure transmission |
|
|
Term
|
Definition
| describing ways to continue operating until normal computer operations can be restored |
|
|
Term
|
Definition
| as you may know, are standards of moral conduct. |
|
|
Term
|
Definition
| is the unauthorized copying and/or distribution of software |
|
|
Term
| DRM / digital rights management |
|
Definition
| DRM encompasses various technologies that control access to electronic media and files. Typically, DRM is used to (1) control the number of devices that can access a given file and (2) limit the kinds of devices that can access a file. |
|
|
Term
|
Definition
| which means representing some other person’s work and ideas as your own without giving credit to the original source |
|
|
Term
|
Definition
| two ways or perspectives to view data. These perspectives are the physical view and the logical view |
|
|
Term
|
Definition
| focuses on the actual format and location of the data. |
|
|
Term
|
Definition
| focuses on the meaning, content, and context of the data. End users and most computer professionals are concerned with this view. |
|
|
Term
|
Definition
| The next higher level is a field or group of related characters. |
|
|
Term
|
Definition
| A database is an integrated collection of logically related tables. |
|
|
Term
|
Definition
| Each record has one distinctive, unique field - social security number |
|
|
Term
|
Definition
| data is collected over several hours, days, or even weeks. It is then processed all at once as a “batch.” |
|
|
Term
| real-time processing / online processing |
|
Definition
| also known as online processing, occurs when data is processed at the same time the transaction occurs |
|
|
Term
|
Definition
| records for the same customer may appear in different files in the sales department, billing department, and credit department |
|
|
Term
|
Definition
| a product ordered might be sent to the new address, but the bill might be sent to the old address. |
|
|
Term
| data definition subsystem |
|
Definition
| defines the logical structure of the database by using a data dictionary or schema . This dictionary contains a description of the structure of data in the database. For a particular item of data, it defines the names used for a particular field. It defines the type of data for each field (text, numeric, time, graphic, audio, and video). |
|
|
Term
|
Definition
| Analysis tools support viewing all or selected parts of the data, querying the database, and generating reports |
|
|
Term
| SQL/Structured Query Language |
|
Definition
| specialized programming language |
|
|
Term
| DBMS (5 models) database management systems |
|
Definition
| are hierarchical, network, relational, multi- dimensional, and object-oriented |
|
|
Term
|
Definition
| , fields or records are structured in nodes. Nodes are points connected like the branches of an upside-down tree. Each entry has one parent node , although a parent may have several child nodes |
|
|
Term
|
Definition
| also has a hierarchical arrangement of nodes. However, each child node may have more than one parent node. This is sometimes described as a many-to-many relationship . There are additional connections—called pointers —between parent nodes and child nodes. |
|
|
Term
|
Definition
| In this structure, there are no access paths down a hierarchy. Rather, the data elements are stored in different tables, each of which consists of rows and columns. A table & its data are called a relation. Common fields are used to join or relate the tables to each other. |
|
|
Term
| multidimensional database |
|
Definition
| extend this two-dimensional data model to include additional or multiple dimensions, sometimes called a data cube . Data can be viewed as a cube having three or more sides & consisting of cells. Each side of the cube is considered a dimension of the data. |
|
|
Term
|
Definition
| are more flexible & store data as well as instructions to manipulate the data. Additionally, this structure is ideally designed to provide input for object-oriented software development |
|
|
Term
| types of databases (know 4 types) |
|
Definition
| : individual, company, distributed, and commercial. |
|
|
Term
|
Definition
| (microcomputer database)-a collection of integrated files primarily used by just one person |
|
|
Term
|
Definition
| may be stored on a central database server & managed by a database administrator. Users throughout the company have access to the database through their microcomputers linked to local or wide area networks |
|
|
Term
|
Definition
| Many times the data in a company is stored not in just one location but in several locations. It is made accessible through a variety of communications networks. |
|
|
Term
|
Definition
| is generally an enormous database that an organization develops to cover particular subjects. It offers access to this database to the public or selected outside individuals for a fee |
|
|
Term
| Csi-example of commercial database |
|
Definition
| Offers consumer & business services, including electronic mail. |
|
|
Term
| Dialog information services |
|
Definition
| Offers business information, as well as technical & scientific information |
|
|
Term
| Dow Jones interactive publishing |
|
Definition
| Provides world news & information on business, investments, & stocks |
|
|
Term
|
Definition
| Offers news and information on legal, public records, & business issues. |
|
|
Term
|
Definition
| To support the needs of managers and other business professionals, many organizations collect data from a variety of internal and external databases. This data is then stored in a special type of database |
|
|
Term
|
Definition
| document or data that appears to be nonexistent or lost |
|
|