Term
| DML (Data Manipulation Language) |
|
Definition
| Allows users to access a database, modify and update it, & generate reports |
|
|
Term
1. Give definitions or terms and data elements 2.Helps with writing programs 3.Simplifies database modifications |
|
Definition
Dictionary Data is used to:
1.___________________________ 2.___________________________ 3.___________________________ |
|
|
Term
|
Definition
An advantage of the data dictionary: ___________________________________ |
|
|
Term
|
Definition
| Description of all of the data in the database |
|
|
Term
|
Definition
| A collection of data organized for the users convenience. |
|
|
Term
|
Definition
| Stores rows and columns of data and is used for analyzing data and making graphs |
|
|
Term
|
Definition
| The 2 dimensional tables the data is placed in |
|
|
Term
|
Definition
| Combining 2 or more tables |
|
|
Term
|
Definition
| Field in a record used to identify the record |
|
|
Term
|
Definition
| Closing data based on certain criteria |
|
|
Term
| G.I.G.O. (Garbage Input Garbage Output) |
|
Definition
| The term for inaccurate data input yielding inaccurate output |
|
|
Term
|
Definition
| A website design tool designed to make it simple to graphically layout a web page design. |
|
|
Term
|
Definition
| A database where data is spread across several databases at different locations |
|
|
Term
| DBA (Database Administrator) |
|
Definition
Computer pro's that work as the director of activities related to an organizations database.
Also, provides security from intruders |
|
|
Term
|
Definition
| multiple databases that hold info from a variety of sources |
|
|
Term
| SQL (Structure Query Language) |
|
Definition
Popular language to query a database (Standard way to manipulate data) |
|
|
Term
|
Definition
| Popular language to query a database. (Easiest way to manipulate a database) |
|
|
Term
| EDI (Electronic Data Interchange) |
|
Definition
| Uses private communications networks (VAN) to transmit data |
|
|
Term
| Automatic transactions using EDI |
|
Definition
| Drastically reduced the amount of paperwork and the need for human intervention |
|
|
Term
|
Definition
| Represents the WHOLE process of buying raw material, then producing and selling to the consumers by the same company. |
|
|
Term
|
Definition
| A collection of cookies created each time you buy something online. Only the server who created the cookies can access them |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Businesses can find the best deals for raw material and supplies |
|
|
Term
|
Definition
| Turns consumer opinions into demographic variables. |
|
|
Term
|
Definition
| Private and secure way of transmitting funds |
|
|
Term
|
Definition
| Best Known e-cash provider |
|
|
Term
| Encryption and Decryption |
|
Definition
| Slows down computer slightly with opening and saving files |
|
|
Term
|
Definition
Contains business info about the buyer
A service provided by VeriSign |
|
|
Term
|
Definition
| E-commerce that takes place using mobile devices or cell phones |
|
|
Term
| E-Tailing (Electronic Retailing) |
|
Definition
| where small businesses sell online + deliver to customers doorsteps. Provides customer with product info and the ability the comparison shop. |
|
|
Term
|
Definition
| Authentication by measuring a person unique physical features |
|
|
Term
|
Definition
| a device that replicates itself in an attempt to overwhelm a network (traffic jam) |
|
|
Term
|
Definition
| listening in to peoples phone conversations |
|
|
Term
|
Definition
| Software installed w/o the users consent to monitor or control the users computer |
|
|
Term
|
Definition
| Software designed to find and eliminate web bugs, ad-serving cookies, and other spyware |
|
|
Term
|
Definition
| A crime of deliberately deceiving a person over the internet |
|
|
Term
|
Definition
| The backing-up of all files |
|
|
Term
|
Definition
| Backing up only the files that have changed since the last back-up |
|
|
Term
|
Definition
| Improves security by examining all incoming packets and filters out the dangerous packets |
|
|
Term
|
Definition
| Delivers destructive action called "Payload" by attaching itself to a downloaded file |
|
|
Term
| Field < Record < File < Database |
|
Definition
~Hierarchy of Data~ (Smallest to Largest)
_____ < _____ < _____ < _____ |
|
|
Term
|
Definition
DIRECTLY interacts with other programs or applications specifically.
Only INDIRECTLY with people/users |
|
|
Term
|
Definition
DIRECTLY interacts with people/users
ex: user-interfaces |
|
|
Term
|
Definition
| Opens ports on a computer used later for hackers access. |
|
|
Term
|
Definition
No criminal intention. Don't make $$. Hired by businesses to check the network security of the businesses. |
|
|
Term
|
Definition
| Criminal intentions. Make $$. |
|
|
Term
|
Definition
Confirming the identity of a user.
ex: Password/PIN/ID/badge |
|
|
Term
|
Definition
| The ACTUAL number of bytes in the file by AV software and compared to the new number.(If the numbers are different there is a virus) |
|
|
Term
|
Definition
| The identity of the virus by comparing its signatures to the list of virus signatures |
|
|
Term
|
Definition
| Virus that delivers payload at a specific time |
|
|
Term
|
Definition
| Delivers payload on specific conditions |
|
|
Term
| US-CERT (U.S. Computer Emergency Readiness Team) |
|
Definition
| Monitors the security of the U.S. networks and the internet. Responds to attacks |
|
|
Term
|
Definition
| Elimination of "Middle-people" and brokers which allows seller and buyer to maximize their profits |
|
|
Term
~Hierarchy of Data Collection~
Collection < Editing < Collection < Manipulation < Storage < Output |
|
Definition
~Hierarchy of Data Collection~
__________ < __________ < __________ < __________ < __________ < __________ |
|
|
Term
1. Businesses have high exposure 2. Able to browse a variety of stores for a product |
|
Definition
Benefits of a cybermall:
1. _____________________________ 2. _____________________________ |
|
|
Term
|
Definition
| ___ and ___ are popular standardized data manipulation languages for database. |
|
|