Chapter 4
Chapter 5
Chapter 6
Randomness
100
A system that prevents a specific type of information for moving between untrusted networks.
What is a firewall?
100
A collection of logically related records.
What is a data file?
100
The transportation capacity of a network, stated in bits per second
What is bandwidth?
100
Alien software designed to help pop up advertisements appear on your screen
What is adware?
200
Typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security procedures.
What is a Back Door?
200
A binary digit that is 0 or 1
What is a bit?
200
A communication medium consisting of thousands of very thin filaments of glass fibers, Surrounded by cladding, The transmit information via light pulses by lasers
What is fiber-optic cable?
200
Low cost scaled down version of a data warehouse that is designed for the end user needs in a strategic Business unit or a department.
What is a data-mart
300
A computer that has been compromised by, and under the control of, a hacker.
What is a Bot?
300
The identifier field or attribute that uniquely identifies a record
What is a primary key?
300
A web-based personalized gateway to information and knowledge that provides information from disparate information systems and the Internet, Using advanced search and indexing techniques.
What is a portal?
300
A common local area network protocol.
What is Ethernet?
400
Destructive programs that replicate themselves without requiring another program to provide a safe environment for replication.
What is a worm?
400
The cumulative store of subjective or a experiential learning which is highly personal and hard to formalize.
What is the tacit knowledge?
400
The movement of information as it flows through the sequence of steps that make up an organization's work procedures.
What is workflow?
400
Malicious software that can attach itself two other computer programs without the owner of the program being aware of the infection
What are viruses?
500
Software program containing a hidden function that presents a security risk.
What is a Trojan horse?
500
Popular relational database language that enables users to perform complicated searches with relatively simple instruction.
What is structured query language?
500
A virtual meeting in which participants in one location can see and hear participants at other locations and can share data and graphics by electronic means
What is videoconferencing?
500
Diverse, high-volume, high velocity information assets that require new forms of processing to enable enhanced decision-making, insight discovery, and process optimization.
What is big data?