click below
click below
Normal Size Small Size show me how
Data An Exam 2
Question | Answer |
---|---|
Big Data | The vast amount of data that are created and stored that have grown beyond the capabilities of traditional data processing tools and applications. |
Database | An organized collection of data |
Database Management System | A set of programs that control the creation, maintenance, and use of databases |
Field | In a relational database, stores data about a single characteristic of a record |
Foreign Key | In a relational database, a field (or fields) that references the primary key of a related table |
Primary Key | In a relational database, the unique identifier of a record |
Record | In a relational database, a set of related fields |
Relational Database | A data store that organizes data in connected two-dimensional tables |
Data Visualization | A visual representation of data with the goal of clearly communicating or better understanding the meaning of the data |
Decision | A choice among alternatives |
Decision Alternative | A method for transforming the current condition into the desired state |
Decision Criteria | Objective measures of decision requirements and goals that discriminate among the alternatives |
Decision Goal | Desired decision solution requirements that go beyond the minimum, essential requirements |
Document Management System | A system that assists with managing, locating, retrieving, and tracking documents |
Goal-Seek Analysis | An analysis that determines the value of a particular input variable that will produce the desired output |
Reporting Tools | Information systems tools that allow users to create reports without knowing special commands |
Requirement (Decision) | A condition that any acceptable solution must provide |
Semi structured Decision | A decision for which some elements are structured and others are unstructured |
Structured Decision | A decision that is routine and repetitive and often has well-defined procedures for making it |
Unstructured Decision | A decision that is novel and therefore has no agreed-upon, well-understood procedure for making i |
What If Analysis | An analysis that involves seeing how changes in one or more input variables impact the value of one or more outcome variables. Also known as sensitivity analysis |
Authentication | A process by which the identity of a transacting party is verified |
Bitcoins | A cryptocurrency or currency that utilizes encryption based on the blockchain technology |
Blockchain | A network where transactions can be tracked but do not require trust between the transacting parties, thus allowing anonymity |
Cipher | An algorithm used to encrypt and decrypt plaintext |
DNA Recognition | A type of security that analyzes segments from an individual’s DNA |
Ear Recognition | A type of security that analyzes ear features or patterns |
Encryption | The application of a mathematical algorithm to a message or information that scrambles that message or information to make it unreadable |
Facial Recognition | A type of security that analyzes facial features or patterns |
Hacktivism | A type of hacking in which hackers try to find information that, if revealed, will advance human causes |
Key Pair | A linked public key and private key |
Password Crackers | Software used to recover forgotten passwords |
Plaintext | Original message before it is encrypted |
Risk Management | The process of identifying, assessing, and prioritizing the security risks an organization may face and deciding whether to accept, mitigate, or share the security risks |
Spamming | Sending emails to many individuals at once, sending unsolicited commercial email to individuals, or targeting one individual computer or network and sending thousands of messages to it |
Spoofing | Pretending to be someone else (or another computer) to enter a system or gain attention |
Stealth Virus | A more advanced virus that changes its own bit pattern to become undetectable by virus scanners |
Theft and Fraud Threats | Threats related to the loss of systems or data due to theft or fraudulent activities |
Trojan Horses | Viruses embedded into a legitimate file |
Virus | A computer program designed to perform unwanted events |
Worms | Viruses that propagate themselves throughout networks with no user intervention required |
What is a SELECT keyword? | Utilized to return a result of set of rows from one or more tables in a database |
What is a FROM keyword? | Utilized to specify which table to select from |
What is a WHERE keyword? | Utilized to specify criteria that field values must meet for the records that contain the values to be included in the search results |
What is an ORDER BY keyword? | Utilized to sort the result-set, can be specified in ascending or descending order by using ASC and DESC keywords |
What is a DESC keyword? | Utilized to sort in descending order |
What is a DISTINCT keyword? | Utilized to return unique values |
What is an AS keyword? | Utilized to rename a column or table with an alias |
What is an AND operator? | Used to filter records based on more than one condition |
What is an OR operator? | Used to display a record if any of the conditions are true |
What is a NOT operator? | Used in front of conditional statements to select rows for which that statement is false |
What is an IN operator? | Used to specify multiple values in a where clause |
What is a % wildcard? | Represents zero or more characters |
What is an _ wildcard? | Represents a single character, matches just a single character |
What is an [] wildcard? | Represents any single character within the brackets, specify set of characters any which must match a character in a specified location |
What is a ^ wildcard? | Represents any character not in the brackets, negates other wildcards |
= | Equality |
<> | Nonequality |
!= | Nonequality |
< | Less than |
<= | Less than or equal to |
!< | Not less than |
> | Greater than |
>= | Greater than or equal to |
!> | Not greater than |
Between | Between two specified values |
Is Null | Is a Null Value |