ITE Unit Seven
middleware
Software used to connect two otherwise separate applications, such as a Web server and a database management system.
entity
Something (such as a person, object, or event) that is important to a business or organization; typically becomes a database table in a database system for that business or organization.
. ______ _____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for workrelated or crime-prevention purposes.
Video Surveillance
Unsolicited, bulk e-mail sent over the Internet is ____.
spam
etrash
Electronic trash or waste, such as discarded computer components
Observing or reviewing employees' actions while they are on the job is _____.
Employee Monitoring
The network database model is the most widely used model today.
False
Using usernames and passwords is a data validation technique.
False
Very few major U.S. companies monitor the online activities of their employees
False
Color copying money is an example of ____.
Filter
assistive technology
Hardware and software specifically designed for use by individuals with physical disabilities.
ergonomic hardware
Hardware, typically an input or output device, that is designed to be more ergonomically correct than its nonergonomic counterpart.
column
In a database, a field.
row
In a database, a record.
table
In a relational database, a collection of related records or rows.
The rights of individuals and companies to control how information about them is collected and used.
Information privacy
normalization
The process of evaluating and correcting the structure of a database table to minimize data redundancy
code of conduct
A policy, often for a school or business, that specifies allowable use of resources, such as computers and other equipment.
code of ethics
A policy, often for an organization or industry, that specifies overall moral guidelines adopted by that organization or industry.
structured query language (SQL)
A popular query language standard for information retrieval in relational databases
ENERGY STAR
A program developed by the U.S. Department of Energy and the Environmental Protection Agency (EPA) to encourage the development of energy-saving devices.
query
A request to see information from a database that matches specific criteria.
field
A single category of data to be stored in a database, such as customer names or employee telephone numbers. Also called a column.
index
A small table containing a primary key and the location of the record belonging to that key; used to locate records in a database.
primary key
A specific field in a database table that uniquely identifies the records in that table.
burnout
A state of fatigue or frustration usually brought on by overwork.
digital watermark
A subtle alteration of digital content that is not noticeable when the work is viewed or played but that identifies the copyright holder.
Full disk encryption
A technology that encrypts everything stored on a storage medium automatically, without any user interaction.[
multidimensional database (MDDB)
A type of database designed to be used with data warehousing.
relational database management system (RDBMS)
A type of database system in which data is stored in tables related by common fields; the most widely used database model today.
object-oriented database management system (OODBMS)'
A type of database system in which multiple types of data are stored as objects along with their related code.
hybrid XML/relational database
A type of database system that can store and retrieve both XML data and relational data.
repetitive stress injury (RSI)
A type of injury, such as carpal tunnel syndrome, that is caused by performing the same physical movements over and over again.
database management system (DBMS)
A type of software program used to create, maintain, and access databases.
Disaster recovery plan
A written plan that describes the steps a company will take following the occurrence of a disaster
computer hoax
An inaccurate statement or story spread through the use of computers
carpal tunnel syndrome (CTS)
A painful and crippling condition affecting the hands and wrist that can be caused by computer use.
eco-label
A certification, usually by a government agency, that identifies a device as meeting minimal environmental performance specifications.
attribute
A characteristic of an entity.
database
A collection of related data that is stored in a manner enabling information to be retrieved as needed; in a relational database, a collection of related tables.
record
A collection of related fields in a database. Also called a row.
DeQuervain's tendonitis
A condition in which the tendons on the thumb side of the wrist are swollen and irritated.
multiuser database system
A database designed to be accessed by multiple users.
single-user database system
A database located on a single computer and designed to be accessed by a single user.
centralized database system
A database system in which all of the data used by the system is located on a single computer
distributed database system
A database system in which the data used by the system is located on multiple computers that are connected via a network.
client-server database system
A database system where the database is located on a server and accessed by client devices.
in-memory database (IMDB)
A database that stores all data in memory instead of on a hard drive.
Ruggedized device
A device (such as a portable computer or mobile phone) that is designed to withstand much more physical abuse than its conventional counterpart
Uninterruptible power supply (UPS)
A device containing a built-in battery that provides continuous power to a computer and other connected components when the electricity goes out
docking station
A device designed to easily connect a portable computer to conventional hardware, such as a keyboard, mouse, monitor, and printer.
notebook stand
A device that elevates the display of a notebook or tablet computer to a better viewing height; can contain USB ports to connect additional hardware
Surge suppressor
A device that protects a computer system from damage due to electrical fluctuations
patent
A form of protection for an invention that can be granted by the government; gives exclusive rights of an invention to its inventor for 20 years.
report
A formatted way of looking at information retrieved from a database table or the results of a query.
form
A formatted way of viewing and editing a table in a database.
Self-encrypting hard drive
A hard drive that uses full disk encryption (FDE)
indexed organization
A method for organizing data on a storage medium or in a database that uses an index to specify the exact storage location.
direct organization
A method of arranging data on a storage medium that uses hashing to specify the exact storage location.
_____ _____ Software can be used to record an individual's computer usage, such as capturing images of the screen, recording the actual keystrokes used, or creating a summary of Web sites and programs accessed.
Computer Monitoring
Freeware
Copyrighted software that may be used free of charge
metadata
Data about data, such as the data contained in a data dictionary
Assigning a field the property of "required."
Data definition
When the database does not allow a user to enter a letter in a phone number field
Data integrity
Requiring users to log on to a database system via a fingerprint reader
Data security
Marketing database
Marketing database
ethics
Overall standards of moral conduct.
plagiarism'
Presenting someone else's work as your own.
data security
Protecting the data located in a database against destruction and misuse.
data privacy'
Protecting the privacy of the data located in a database.
data validation
The process of ensuring that data entered into a database is valid (matches the data definition)
computer ethics
Standards of moral conduct as they relate to computer use.
business ethics
Standards of moral conduct that guide a business's policies, decisions, and actions.
A device that protects a computer system from damage due to electrical fluctuations is ____.
Surge suppressor
Presence technology
Technology that enables one computing device (such as a computer or mobile phone) to locate and identify the current status of another device on the same network
cybersquatting
The act of registering a domain name with the intent to profit from the goodwill of a trademark belonging to someone else.
digital manipulation
The alteration of digital content, usually text or photographs. digital rights management (DRM) software Software used to protect and manage the rights of creators of digital content, such as art, music, photographs, and movies.
System failure
The complete malfunction of a computer system
digital divide
The gap between those who have access to technology and those who do not.
copyright
The legal right to sell, publish, or distribute an original artistic or literary work; it is held by the creator of a work as soon as it exists in physical form.
intellectual property rights
The legal rights to which creators of original creative works (such as artistic or literary works, inventions, corporate logos, and more) are entitled.
Internet addiction
The problem of overusing, or being unable to stop using, the Internet.
data definition
The process of describing the properties of data that is to be included in a database table.
data dictionary
The repository of all data definitions in a database. data integrity The accuracy of data
ergonomics
The science of fitting a work environment to the people who work there
Hardware theft
The theft of computer hardware
Software piracy
The unauthorized copying of a computer program
green computing
The use of computers in an environmentally friendly manner
Digital counterfeiting
The use of computers or other types of digital equipment to make illegal copies of currency, checks, collectibles, and other items.
Opt out
To request that you be removed from marketing activities or that your information not be shared with other companies
. Normalization is used to minimize data redundancy
True
Dynamic Web pages commonly use databases.
True
Electronic profiling is the act of using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits
True
Encryption can be used for privacy purposes, in addition to security purposes.
True
In a relational database, more than one table can be included in a database.
True
When _____ organization is used, a hashing procedure determines where data is stored
direct
In a student information database, Name would be considered a(n) _______________, while all of Jennifer Mitchell's information would be a(n)___________.
field or column; row or record
Data _______ refers to accuracy of data.
integrity
The term front end and back end refer to ______ database systems
client-server
end-user database
consist of data developed by individual end-users. Examples of these are collections of documents, spreadsheets, presentations, multimedia, and other files.
