This is the most commonly used electronic databases
What is relational
A computer controlled by a hacker who uses it to launch attacks on other computer systems
What is a zombie
a collection of information organized in a table that pertains to a specific topic or category.
What is record
A hacker gets ahold of your personal information is called
What is identity theft
A type of virus that can spread without human interaction
What is worm
Data ________ means that the data contained in a database is accurate and reliable.
What is integrity
A small text file that is stored on a hard drive when user visits a web site
What is a cookie
A simple list such as a Excel Workbook where data is not related in anyway
What is flat database
A type of hacker who breaks into a computer system for malicious reasons
What is a black-hat hacker
Type of malware that attacks a system by encrypting critical files and then demands payment so that files can be restored.
What is encryption or ransomware
This automatically displays in a field unless the user enters something different.
What is a default value
A hacker takes complete control of your computer and turns your computer into this
What is zombie
A group of related records
What is a table
A type of virus that is attached to something that you have downloaded or opened that appears harmless
What is a Trojan Horse
Computer hardware or software program which detects and records information being transmitted over a network
What is a packet analyzer (sniffer)
a unique identifier for a record, such as an ID number
What are primary key
Sending email messages to lure users into revealing personal information
What is phishing
A type of database relationship where there is on record in a table that is linked to many records in another table
What is one to many
Computer program that appears to be useful but is doing something malicious in the background
What is a Trojan horse
A type of malware that’s downloaded onto your computer and that tries to convince you that your computer is infected with a virus or other type of malware.
What is scareware
to a single piece of information or data value that is stored within a record or row.
What is a field
A hacker who breaks into a system and does not want to steal or cause problems
What is a white-hat hacker
A database object that retrieves specific data from one or more database objects—either tables or other queries—and then, in a single datasheet, displays only the data you specify
What are query
A hacker who sends requests from hacked computers and cause this type of bottleneck on a server
What is a denial of servce
A type of virus that is triggered when a condition is met such as number of transactions processed
What is a logic bomb virus