Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

MISY160

Business Concepts & Tools ch 6-8

TermDefinition
Information security the protection of information systems and the information they manage against unauthorized access, use, manipulation, or destruction, and against the denial of service to authorized uses
Machine-level Security actions taken to protect information on a computer not connected to the internet
Authentication security process that verifies the identity of a person
Encryption security technique that uses high-level mathematical functions and algorithms to encode data so it is unintelligible to all but the intend recipients
Data backup copies of important files are stored in a safe place to guard against data loss
Network Security concerned with addressing vulnerabilities and threats in computer networks
permissions specific access privileges afforded to each network user and each system resources
Interior threats network security threats that originate from within a network, typically from registerd users
Information theft access of information by an unauthorized person for financial gain or benefit
Network Use Policy document, agreement, or contract that defines acceptable and unacceptable use of computer and network resources
Internet Security unique threats and defenses associated with computers connected to the internet -https
Hacker anyone trying to get computer security without authorization
Firewall hardware or software that protects the computer from getting information you did not request
Software Patch fixes bugs and flaws in software through software update
Malware -short for "malicious software" -any software designed to damage, corrupt, or illegally manipulate computer resources -includes: viruses, worms, and spyware
Antivirus Software software that uses techniques to find viruses, worms, and spyware on a computer system, remove them if possible , and keep them off
Botnet collection of computers working towards some goal
Identity Theft the criminal act of stealing information about a person to assume that person's identity in order to commit fraud or other crime
Phishing Scam combines both fraudulent e-mail and web sites in order to trick a person into providing private information for identity theft
Digital Media digital technologies of all kind that serve and support publishing
eBooks books in digital format
Digital Audio type of sound, including voice, music, and sound effects, recorded and stored as a series of 1s and 0s
Sampling process of capturing the value of sound wave at regular intervals to store sound and music digitally
Podcast an audio file that contains a recorded broadcast distributed over Internet
Digital Graphic any application to support creating, editing, and viewing 2D and 3D images and animations
RGB Color method of specifying color digital using value for the intensity levels of red, green, and blue (RGB) as combined to create all colors
Vector Graphic Software tools to create, arrange, and layer graphical objects on the screen
Graphic File Formats designed to store various types of graphic images for varying purposes
Visualization creating diagrams or images to convey a message
Animation displaying digital images in rapid succession to create the illusion of motion
Digital Photography photography that captures, stores, and manipulates photographs digitally as a series of 1s and 0s
Digital Cameras camera that captures photographs, and sometimes video, and stores them digitally rather then on film
Database a collection of data organized to meet user's needs
Database Structure manner in which data is organized and stored
Data Management System a group of programs that manipulates the data within a database
Data Hierachy manner in which data in a data base is organized into sequential levels of detail
Database Key is a field in a table used to identify a record -ex: Employee Number, Student ID, Social Security Number
Record a collection of fields about a specific entity
Key a field in a record that is used to identify the record
Primary key a field within a database that uniquely identifies the record
Relation Database organizes data into multiple tables that are related by common fields -one to many relationship
Database Tools software and techniques for analyzing, maintaining, and manipulating data in a database
Schema database schema is a graphical representation of the structure of a database -primary key match with relative key
Database Dictionary provides a detail description of each field and table in a database
Structural Query Language (SQL) popular data manipulation language used by the vast majority of database programmers and administrators for manipulating data to meet the need of the user
Industrial Database large database that functions as the cornerstone of information systems in businesses and enterprises
Data Warehouse very large database that holds important information of various sources
Data Mining extracting data information from a data warehouse or data mart
Distributed Database takes available data stored in multiple locations and makes it appear in a single location
Data Center a climate-controlled building or set of buildings that house servers that store and deliver mission-critical information and services
Data Administrator (DBA) a skilled and trained computer professional who directs all activities related to an organization's database
Created by: NickUD
Popular Business sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards