Created by Daf (murrayd17)
almost 9 years ago
|
||
Question | Answer |
Cloud computing | This is when a computer uses services provided by another organisation’s computer systems. |
Ubiquitous Computing | The growing trend towards embedding microprocessors in everyday objects so they can communicate information. The words pervasive and ubiquitous mean "existing everywhere." |
RFID - Radio Frequency IDentification | A data collection technology that uses electronic tags for storing and monitoring data. Used for security. |
Cloud storage | This is when a computer’s storage, access and retrieval facilities are hosted by another computer system. |
Databases | A collection of information that is organized so that it can easily be accessed, managed, and updated. |
Table | A two-dimensional representation of data in a database. |
Record | A group of selected data which are associated in some way. |
Field | A single piece of data within a record. |
Primary Key | A single unique key used to identify each record in a table. |
Foreign Key | A field which can be used to cross-reference and access associated information across many tables. |
Boolian | Yes or No. |
SQL - Structured Query Language | A special-purpose programming language designed for managing data held in a DBMS, or for stream processing in a relational data stream management system (RDSMS). |
DDL - Data Definition Language | A standard for commands that define the different structures in a database. DDL statements create, modify, and remove database objects such as tables, indexes, and users. |
DML - Data Manipulation Language | The software that allows you to create a Database. Used to retrieve, store, edit, delete, insert and update data in database. |
DBMS - Database Management System | A computer software application that interacts with the user, other applications, and the database itself to capture and analyse data. A general-purpose DBMS is designed to allow the definition, creation, querying, update, and administration of databases. |
Hack | To illegally gain unauthorized access to data in a system or computer. |
Identity Theft | When someone steals your personal details in order to use them to open bank accounts and get credit cards, loans, a passport or a driving licence in your name. |
Opportunist | A person who takes advantage of opportunities as and when they arise, regardless of planning or principle. In terms of internet technology an online opportunist uses various methods to fool and take advantage of users. They find an unattended computer which has been left logged in to a system may view, steal or damage information, programs or even hardware. |
Virus | A piece of computer code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. |
Malware - Malicious Software | A hostile, intrusive or annoying piece of software or program code. |
Trojan | A serious form of computer malware which infects software with virus's. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. |
Phishing | The fraudulent practice of attempting to gain access to passwords, financial details and other such privileged information by sending false emails. |
Password Control | A string of characters that allows access to a computer, interface, or system. |
Access Levels | These can be set by Network managers to allow individuals access to various files in a the network. |
Anti Virus Software | Sometimes known as anti-malware software, is computer software used to prevent, detect and remove malicious software. |
Firewall | Security Software which protects a network or system from unauthorized access with a firewall. |
Encryption | The most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. |
Accidental Damage | This may be caused by a natural disaster ,such as flooding, mischief or accidental mishap, and can result in losing all of a computer’s data. |
Physical Barriers | In this instance, Something physical that attempts to stop data from being stolen. Examples of this are Security Guards, Locked Doors, ID's, safes etc. |
Legislation | laws, considered collectively. |
Copyright, Designs and Patents Act 1988 | The current UK copyright law. It gives the creators of literary, dramatic, musical and artistic works the right to control the ways in which their material may be used. |
Computer Misuse Act 1990 | Enables hackers to be prosecuted under the law. It recognised the following new offences: 1.Unauthorised access to computer material . 2.Unauthorised access with intent to commit or facilitate a crime. 3.Unauthorised modification of computer material. 4. Making, supplying or obtaining anything which can be used in computer misuse offences. |
Data Protection Act 1998 | An Act of Parliament of the United Kingdom of Great Britain and Northern Ireland which defines UK law on the processing of data on identifiable living people. It is the main piece of legislation that governs the protection of personal data in the UK. |
8 Principles of the Data Protection Act | |
Freedom Of Information Act 2000 | Provides public access to information held by public authorities. It does this in two ways: public authorities are obliged to publish certain information about their activities; and. members of the public are entitled to request information from public authorities. |
Want to create your own Flashcards for free with GoConqr? Learn more.