Chapter 4
Chapter 5 Pt. 1
Chapter 5 pt. 2
Chapter 6
100

A network of computers that have been compromised by, and under control of, a hacker, who is called the botmaster

What is a botnet?

100

Each characteristic of quality of a particular entity.

What is an attribute?

100

A collection of logically related records

What is a data file?

100

A private network that uses Internet software and TCP/IP protocols

What is intranet?
200

The chain of events linking planning to protection and to recovery

What is business continuity?

200

The most effective and efficient ways to do things

What is best practices?
200

An approach to managing information across an entire organization

What is data governance?

200

The transmission capacity of a network, stated in bits per second.

What is bandwidth?
300

Small amounts of information that Web sites store on your computer, temporarily or more or less permanently

What is a cookie?

300

A binary digit - that is, a 0 or a 1.

What is a bit?

300

A diagram that represents entities in the database and their relationships

What is a data model?

300

The transmission capacity of a communications medium faster than 4 Mbps

What is broadband?

400

Illegal activities executed on the Internet

What is cybercrime?

400

A group of eight bits that represents a single character

What is a byte?

400

A repository of historical data that are organized by subject to support the decision makers in the organization

What is a data warehouse?

400

Software applications through which users primarily access the Web

What are browsers?
500

Controls that deal with the movement of data across networks.

What is communication controls?

500

Describes the classification of a relationship: one-to-one, one-to-many, or many-to-many

What is connectivity?

500

Any person, place, thing, or event of interest to a user

What is an entity?

500

Computers, such as users" personal computers, that use any of the services provided by servers

What are clients?

M
e
n
u