Chapter 4
Chapter 4 (Cont.)
Chapter 5
Chapter 5 (Cont.)
Chapter 6
100
A computer that has been compromised by, and under the control of, a hacker.
What is bot
100
Controls that restrict unauthorized individuals from using information resources and are concerned with user identification
What is access controls
100
Each row in a relational table, which is a specific, unique representation of the entity.
What is instance
100
A characteristic of interest that describes an entity.
What is field
100
The transmission capacity of a network, stated in bits per second.
What is bandwidth
200
An examination of information systems, their inputs, outputs, and processing.
What is audit
200
A process that determines the identity of the person requiring access.
What is authentication
200
A field (or group of fields) in one table that uniquely identifies a row of another table.
What is foreign key
200
A diagram that represents entities in the database and their relationships.
What is data model
200
Software applications through which users primarily access the Web.
What is browsers
300
Clandestine software that is installed on your computer through duplicitous methods.
What is alien software
300
Typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security procedures.
What is back door
300
The more objective, rational, and technical types of knowledge.
What is explicit knowledge
300
A set of core data, such as customer, product, employee, vendor, geographic location, and so on, that span an enterprise's information systems.
What is master data
300
A Web site that offers a single point of entry to an entire community of affiliated interests.
What is affinity portal
400
A process in which a company identifies certain types of software that are not allowed to run in the company environment.
What is blacklisting
400
The science and technology of authentication by measuring the subject's physiological or behavioral characteristics.
What is biometrics
400
A field (or attribute) of a record that uniquely identifies that record so that it can be retrieved, updated, and sorted.
What is primary key
400
A field that has some identifying information, but typically does not uniquely identify a record with complete accuracy.
What is secondary key
400
Computers, such as users' personal computers, that use any of the services provided by servers.
What is clients
500
A process that determines which actions, rights, or privileges the person has, based on verified identity.
What is authorization
500
Alien software designed to help pop-up advertisements appear on your screen.
What is adware
500
A method for analyzing and reducing a relational database to its most streamlined form to ensure minimum redundancy, maximum data integrity, and optimal processing performance.
What is normalization
500
To obtain information from a relational database, a user fills out a grid or template - also known as a form - to construct a sample or description of the data desired.
What is query by example
500
A process in which an organization outsources a task to an undefined, generally large group of people in the form of an open call.
What is crowdsourcing
M
e
n
u