Term
DML (Data Manipulation Language) |
|
Definition
Allows users to access a database, modify and update it, & generate reports |
|
|
Term
1. Give definitions or terms and data elements 2.Helps with writing programs 3.Simplifies database modifications |
|
Definition
Dictionary Data is used to:
1.___________________________ 2.___________________________ 3.___________________________ |
|
|
Term
|
Definition
An advantage of the data dictionary: ___________________________________ |
|
|
Term
|
Definition
Description of all of the data in the database |
|
|
Term
|
Definition
A collection of data organized for the users convenience. |
|
|
Term
|
Definition
Stores rows and columns of data and is used for analyzing data and making graphs |
|
|
Term
|
Definition
The 2 dimensional tables the data is placed in |
|
|
Term
|
Definition
Combining 2 or more tables |
|
|
Term
|
Definition
Field in a record used to identify the record |
|
|
Term
|
Definition
Closing data based on certain criteria |
|
|
Term
G.I.G.O. (Garbage Input Garbage Output) |
|
Definition
The term for inaccurate data input yielding inaccurate output |
|
|
Term
|
Definition
A website design tool designed to make it simple to graphically layout a web page design. |
|
|
Term
|
Definition
A database where data is spread across several databases at different locations |
|
|
Term
DBA (Database Administrator) |
|
Definition
Computer pro's that work as the director of activities related to an organizations database.
Also, provides security from intruders |
|
|
Term
|
Definition
multiple databases that hold info from a variety of sources |
|
|
Term
SQL (Structure Query Language) |
|
Definition
Popular language to query a database (Standard way to manipulate data) |
|
|
Term
|
Definition
Popular language to query a database. (Easiest way to manipulate a database) |
|
|
Term
EDI (Electronic Data Interchange) |
|
Definition
Uses private communications networks (VAN) to transmit data |
|
|
Term
Automatic transactions using EDI |
|
Definition
Drastically reduced the amount of paperwork and the need for human intervention |
|
|
Term
|
Definition
Represents the WHOLE process of buying raw material, then producing and selling to the consumers by the same company. |
|
|
Term
|
Definition
A collection of cookies created each time you buy something online. Only the server who created the cookies can access them |
|
|
Term
|
Definition
|
|
Term
|
Definition
Businesses can find the best deals for raw material and supplies |
|
|
Term
|
Definition
Turns consumer opinions into demographic variables. |
|
|
Term
|
Definition
Private and secure way of transmitting funds |
|
|
Term
|
Definition
Best Known e-cash provider |
|
|
Term
Encryption and Decryption |
|
Definition
Slows down computer slightly with opening and saving files |
|
|
Term
|
Definition
Contains business info about the buyer
A service provided by VeriSign |
|
|
Term
|
Definition
E-commerce that takes place using mobile devices or cell phones |
|
|
Term
E-Tailing (Electronic Retailing) |
|
Definition
where small businesses sell online + deliver to customers doorsteps. Provides customer with product info and the ability the comparison shop. |
|
|
Term
|
Definition
Authentication by measuring a person unique physical features |
|
|
Term
|
Definition
a device that replicates itself in an attempt to overwhelm a network (traffic jam) |
|
|
Term
|
Definition
listening in to peoples phone conversations |
|
|
Term
|
Definition
Software installed w/o the users consent to monitor or control the users computer |
|
|
Term
|
Definition
Software designed to find and eliminate web bugs, ad-serving cookies, and other spyware |
|
|
Term
|
Definition
A crime of deliberately deceiving a person over the internet |
|
|
Term
|
Definition
The backing-up of all files |
|
|
Term
|
Definition
Backing up only the files that have changed since the last back-up |
|
|
Term
|
Definition
Improves security by examining all incoming packets and filters out the dangerous packets |
|
|
Term
|
Definition
Delivers destructive action called "Payload" by attaching itself to a downloaded file |
|
|
Term
Field < Record < File < Database |
|
Definition
~Hierarchy of Data~ (Smallest to Largest)
_____ < _____ < _____ < _____ |
|
|
Term
|
Definition
DIRECTLY interacts with other programs or applications specifically.
Only INDIRECTLY with people/users |
|
|
Term
|
Definition
DIRECTLY interacts with people/users
ex: user-interfaces |
|
|
Term
|
Definition
Opens ports on a computer used later for hackers access. |
|
|
Term
|
Definition
No criminal intention. Don't make $$. Hired by businesses to check the network security of the businesses. |
|
|
Term
|
Definition
Criminal intentions. Make $$. |
|
|
Term
|
Definition
Confirming the identity of a user.
ex: Password/PIN/ID/badge |
|
|
Term
|
Definition
The ACTUAL number of bytes in the file by AV software and compared to the new number.(If the numbers are different there is a virus) |
|
|
Term
|
Definition
The identity of the virus by comparing its signatures to the list of virus signatures |
|
|
Term
|
Definition
Virus that delivers payload at a specific time |
|
|
Term
|
Definition
Delivers payload on specific conditions |
|
|
Term
US-CERT (U.S. Computer Emergency Readiness Team) |
|
Definition
Monitors the security of the U.S. networks and the internet. Responds to attacks |
|
|
Term
|
Definition
Elimination of "Middle-people" and brokers which allows seller and buyer to maximize their profits |
|
|
Term
~Hierarchy of Data Collection~
Collection < Editing < Collection < Manipulation < Storage < Output |
|
Definition
~Hierarchy of Data Collection~
__________ < __________ < __________ < __________ < __________ < __________ |
|
|
Term
1. Businesses have high exposure 2. Able to browse a variety of stores for a product |
|
Definition
Benefits of a cybermall:
1. _____________________________ 2. _____________________________ |
|
|
Term
|
Definition
___ and ___ are popular standardized data manipulation languages for database. |
|
|