ITE Unit Seven

¡Supera tus tareas y exámenes ahora con Quizwiz!

middleware

Software used to connect two otherwise separate applications, such as a Web server and a database management system.

entity

Something (such as a person, object, or event) that is important to a business or organization; typically becomes a database table in a database system for that business or organization.

. ______ _____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for workrelated or crime-prevention purposes.

Video Surveillance

Unsolicited, bulk e-mail sent over the Internet is ____.

spam

etrash

Electronic trash or waste, such as discarded computer components

Observing or reviewing employees' actions while they are on the job is _____.

Employee Monitoring

The network database model is the most widely used model today.

False

Using usernames and passwords is a data validation technique.

False

Very few major U.S. companies monitor the online activities of their employees

False

Color copying money is an example of ____.

Filter

assistive technology

Hardware and software specifically designed for use by individuals with physical disabilities.

ergonomic hardware

Hardware, typically an input or output device, that is designed to be more ergonomically correct than its nonergonomic counterpart.

column

In a database, a field.

row

In a database, a record.

table

In a relational database, a collection of related records or rows.

The rights of individuals and companies to control how information about them is collected and used.

Information privacy

normalization

The process of evaluating and correcting the structure of a database table to minimize data redundancy

code of conduct

A policy, often for a school or business, that specifies allowable use of resources, such as computers and other equipment.

code of ethics

A policy, often for an organization or industry, that specifies overall moral guidelines adopted by that organization or industry.

structured query language (SQL)

A popular query language standard for information retrieval in relational databases

ENERGY STAR

A program developed by the U.S. Department of Energy and the Environmental Protection Agency (EPA) to encourage the development of energy-saving devices.

query

A request to see information from a database that matches specific criteria.

field

A single category of data to be stored in a database, such as customer names or employee telephone numbers. Also called a column.

index

A small table containing a primary key and the location of the record belonging to that key; used to locate records in a database.

primary key

A specific field in a database table that uniquely identifies the records in that table.

burnout

A state of fatigue or frustration usually brought on by overwork.

digital watermark

A subtle alteration of digital content that is not noticeable when the work is viewed or played but that identifies the copyright holder.

Full disk encryption

A technology that encrypts everything stored on a storage medium automatically, without any user interaction.[

multidimensional database (MDDB)

A type of database designed to be used with data warehousing.

relational database management system (RDBMS)

A type of database system in which data is stored in tables related by common fields; the most widely used database model today.

object-oriented database management system (OODBMS)'

A type of database system in which multiple types of data are stored as objects along with their related code.

hybrid XML/relational database

A type of database system that can store and retrieve both XML data and relational data.

repetitive stress injury (RSI)

A type of injury, such as carpal tunnel syndrome, that is caused by performing the same physical movements over and over again.

database management system (DBMS)

A type of software program used to create, maintain, and access databases.

Disaster recovery plan

A written plan that describes the steps a company will take following the occurrence of a disaster

computer hoax

An inaccurate statement or story spread through the use of computers

carpal tunnel syndrome (CTS)

A painful and crippling condition affecting the hands and wrist that can be caused by computer use.

eco-label

A certification, usually by a government agency, that identifies a device as meeting minimal environmental performance specifications.

attribute

A characteristic of an entity.

database

A collection of related data that is stored in a manner enabling information to be retrieved as needed; in a relational database, a collection of related tables.

record

A collection of related fields in a database. Also called a row.

DeQuervain's tendonitis

A condition in which the tendons on the thumb side of the wrist are swollen and irritated.

multiuser database system

A database designed to be accessed by multiple users.

single-user database system

A database located on a single computer and designed to be accessed by a single user.

centralized database system

A database system in which all of the data used by the system is located on a single computer

distributed database system

A database system in which the data used by the system is located on multiple computers that are connected via a network.

client-server database system

A database system where the database is located on a server and accessed by client devices.

in-memory database (IMDB)

A database that stores all data in memory instead of on a hard drive.

Ruggedized device

A device (such as a portable computer or mobile phone) that is designed to withstand much more physical abuse than its conventional counterpart

Uninterruptible power supply (UPS)

A device containing a built-in battery that provides continuous power to a computer and other connected components when the electricity goes out

docking station

A device designed to easily connect a portable computer to conventional hardware, such as a keyboard, mouse, monitor, and printer.

notebook stand

A device that elevates the display of a notebook or tablet computer to a better viewing height; can contain USB ports to connect additional hardware

Surge suppressor

A device that protects a computer system from damage due to electrical fluctuations

patent

A form of protection for an invention that can be granted by the government; gives exclusive rights of an invention to its inventor for 20 years.

report

A formatted way of looking at information retrieved from a database table or the results of a query.

form

A formatted way of viewing and editing a table in a database.

Self-encrypting hard drive

A hard drive that uses full disk encryption (FDE)

indexed organization

A method for organizing data on a storage medium or in a database that uses an index to specify the exact storage location.

direct organization

A method of arranging data on a storage medium that uses hashing to specify the exact storage location.

_____ _____ Software can be used to record an individual's computer usage, such as capturing images of the screen, recording the actual keystrokes used, or creating a summary of Web sites and programs accessed.

Computer Monitoring

Freeware

Copyrighted software that may be used free of charge

metadata

Data about data, such as the data contained in a data dictionary

Assigning a field the property of "required."

Data definition

When the database does not allow a user to enter a letter in a phone number field

Data integrity

Requiring users to log on to a database system via a fingerprint reader

Data security

Marketing database

Marketing database

ethics

Overall standards of moral conduct.

plagiarism'

Presenting someone else's work as your own.

data security

Protecting the data located in a database against destruction and misuse.

data privacy'

Protecting the privacy of the data located in a database.

data validation

The process of ensuring that data entered into a database is valid (matches the data definition)

computer ethics

Standards of moral conduct as they relate to computer use.

business ethics

Standards of moral conduct that guide a business's policies, decisions, and actions.

A device that protects a computer system from damage due to electrical fluctuations is ____.

Surge suppressor

Presence technology

Technology that enables one computing device (such as a computer or mobile phone) to locate and identify the current status of another device on the same network

cybersquatting

The act of registering a domain name with the intent to profit from the goodwill of a trademark belonging to someone else.

digital manipulation

The alteration of digital content, usually text or photographs. digital rights management (DRM) software Software used to protect and manage the rights of creators of digital content, such as art, music, photographs, and movies.

System failure

The complete malfunction of a computer system

digital divide

The gap between those who have access to technology and those who do not.

copyright

The legal right to sell, publish, or distribute an original artistic or literary work; it is held by the creator of a work as soon as it exists in physical form.

intellectual property rights

The legal rights to which creators of original creative works (such as artistic or literary works, inventions, corporate logos, and more) are entitled.

Internet addiction

The problem of overusing, or being unable to stop using, the Internet.

data definition

The process of describing the properties of data that is to be included in a database table.

data dictionary

The repository of all data definitions in a database. data integrity The accuracy of data

ergonomics

The science of fitting a work environment to the people who work there

Hardware theft

The theft of computer hardware

Software piracy

The unauthorized copying of a computer program

green computing

The use of computers in an environmentally friendly manner

Digital counterfeiting

The use of computers or other types of digital equipment to make illegal copies of currency, checks, collectibles, and other items.

Opt out

To request that you be removed from marketing activities or that your information not be shared with other companies

. Normalization is used to minimize data redundancy

True

Dynamic Web pages commonly use databases.

True

Electronic profiling is the act of using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits

True

Encryption can be used for privacy purposes, in addition to security purposes.

True

In a relational database, more than one table can be included in a database.

True

When _____ organization is used, a hashing procedure determines where data is stored

direct

In a student information database, Name would be considered a(n) _______________, while all of Jennifer Mitchell's information would be a(n)___________.

field or column; row or record

Data _______ refers to accuracy of data.

integrity

The term front end and back end refer to ______ database systems

client-server

end-user database

consist of data developed by individual end-users. Examples of these are collections of documents, spreadsheets, presentations, multimedia, and other files.


Conjuntos de estudio relacionados

Romeo and Juliet Acts 1-3 Important Quotes

View Set

The steps in the Tutorial Process

View Set

Chapter 14 Material Requirements Planning (MRP) and ERP

View Set

FINA 427- Corporate Finance Capital structure, Leverage and Divisional Cost of Capital

View Set

Government: 3.01 Legislative Branch

View Set

Perfectly competitive firm's supply curve

View Set

California RE License - Real Estate Practices

View Set

Conflict Resolution UNIT 5 - CHALLENGE 3

View Set