Chapter 11- A
Chapter 9 - A
Chapter 11- B
Chapter 9 - B
Chapter 9 - C
100

This is the most commonly used electronic databases

What is relational

100

A computer controlled by a hacker who uses it to launch attacks on other computer systems

What is a zombie

100

 a collection of information organized in a table that pertains to a specific topic or category.

What is record

100

A hacker gets ahold of your personal information is called

What is identity theft

100

A type of virus that can spread without human interaction

What is worm

200

Data ________ means that the data contained in a database is accurate and reliable.

What is integrity

200

A small text file that is stored on a hard drive when user visits a web site

What is a cookie

200

A simple list such as a Excel Workbook where data is not related in anyway

What is flat database

200

A type of hacker who breaks into a computer system for malicious reasons

What is a black-hat hacker

200

Type of malware that attacks a system by encrypting critical files and then demands payment so that files can be restored.

What is encryption or ransomware

300

This automatically displays in a field unless the user enters something different.  

What is a default value

300

A hacker takes complete control of your computer and turns your computer into this

What is zombie

300

A group of related records

What is a table

300

A type of virus that is attached to something that you have downloaded or opened that appears harmless

What is a Trojan Horse

300

Computer hardware or software program which detects and records information being transmitted over a network

What is a packet analyzer (sniffer)

400

 a unique identifier for a record, such as an ID number

What are primary key

400

Sending email messages to lure users into revealing personal information 

What is phishing

400

A type of database relationship where there is on record in a table that is linked to many records in another table

What is one to many

400

Computer program that appears to be useful but is doing something malicious in the background

What is a Trojan horse

400

A type of malware that’s downloaded onto your computer and that tries to convince you that your computer is infected with a virus or other type of malware.

What is scareware

500

to a single piece of information or data value that is stored within a record or row.

What is a field

500

A hacker who breaks into a system and does not want to steal or cause problems

What is a white-hat hacker

500

A database object that retrieves specific data from one or more database objects—either tables or other queries—and then, in a single datasheet, displays only the data you specify

What are query

500

A hacker who sends requests from hacked computers and cause this type of bottleneck on a server

What is a denial of servce

500

A type of virus that is triggered when a condition is met such as number of transactions processed


What is a logic bomb virus