Professional Documents
Culture Documents
Assignment
August 26, 2015
I.
What these acronyms stand for? (for the purpose of quiz, understand these
terms)
1. DDP
2. DRP
3. IP
4. Dos
5. DDos
6. SYN
7. IRC
8. LAN
9. IPS
10.
11.
12.
13.
14.
AES
DES
RSA
CA
PKI
15.
16.
17.
W
18.
19.
IP
20.
P
21.
22.
P
23.
P
EDI
EFT
WW
URL
TCP/
SNM
SSL
NNT
HTT
24.
L
25.
26.
27.
S
28.
29.
30.
31.
32.
S
33.
HTM
WAN
POS
DBM
DDL
DML
SQL
DBA
IDM
GPC
34.
SDL
C
35.
CAA
TTs
36.
DFD
37.
OOD
38.
3GL
39.
COB
OL
40.
FOR
TRAN
41.
GUI
42.
SPL
43.
L
44.
45.
O
46.
S
47.
48.
E
49.
50.
XBR
XML
COS
GDI
GVM
BCS
ITF
GAS
27.
An internet facility that links user sites locally and around the world.
28.
It is the address that defines the path to a facility or file on the web.
29.
These are rules and standards governing the design of hardware and
software that permit users of networks, which different vendors have
manufactured, to communicate and share data.
30.
Basic protocol that permits communication between internet sites.
31.
A protocol used to transfer text files, programs, spreadsheets, and
databases across the internet
32.
The document format used to produce web pages. It defines the page
layout, fonts, and graphic elements as well as hypertext links to other
documents on the web.
33.
The physical arrangement of the components of the network.
34.
They are networks often confined to a single room in a building, or they
may link several building within a close geographic area.
35.
Networks which exceed the geographic limitations of the LAN.
36.
That which results when two or more signals are transmitted
simultaneously which destroys both messages.
37.
A program (usually destructive) that attaches itself to a legitimate
program to penetrate the operating system and destroy application programs,
data files, and the operating system itself.
38.
A software program that virtually burrows into the computers memory and
replicates itself into areas of idle memory.
39.
A destructive program, such as a virus, that some predetermined event
riggers.
40.
A software program that allows unauthorized access to a system without
going through the normal log-on procedure.
41.
A program whose purpose is to capture ID, and passwords from
unsuspecting user.
42.
Data files that contain records with no structured relationships to other
files.
43.
Replication of essentially the same data in multiple files which results to
certain problems in a flat-file environment.
44.
It identifies the names and the relationship of all data elements, records,
and files that constitute the database.
45.
Database view describing the structures of data records, the linkages
between files, and the physical arrangement and sequence of records in a file.
46.
Database view which describes the entire database. It represents the
database logically and abstractly, rather than the way it is physically stored.
47.
Database view which defines the users section of the database the
portion that an individual user is authorized to access.
48.
The proprietary programming language that a particular DBMS uses to
retrieve, process and store data.
49.
The standard query language for both mainframe and microcomputer
DBMS considered as the fourth-generation, non-procedural language with many
commands that allow users to input, retrieve, and modify data easily.
50.
A function of the Database Administrator which describes every data
element in the database. This enable all users to share a common view of the
data resource, thus greatly facilitating the analysis of user needs.
51.
The lowest level of the database, and the only level that exists in physical
form.
52.
They allow records to be located, stored, and retrieved, and enables
movement from one record to another.
53.
It refers to the way records are physically arranged on the secondary
storage device.
54.
The technique used to locate records and to navigate through the
database.
55.
It is an abstract representation of the data about entities, including
resources (assets), events (transactions), and agents (personnel or customers,
etc.) and their relationships in an organization.
56.
A single item of data, such as customers name, account balance, or
address.
57.
A database representation of an individual resource, event, or agent about
which we choose to collect data.
58.
Formed when data attributes that logically defined an entity are grouped
together.
59.
Set of record types that an organization needs to support its business
processes.
60.
Record types that constitute a database exist in relation to other record
types.
61.
Distributed database which splits the central database into segments or
partitions that are distributed to their primary users.
62.
These controls are designed to prevent unauthorized individuals from
viewing, retrieving, corrupting, or destroying the entitys data.
63.
Controls which ensure that in the event of data loss due to unauthorized
access, equipment failure, or physical disaster the organization can recover its
database.
64.
Procedures which allows the user to create a personal security program or
routine to provide more positive user identification than a single password.
65.
Devices which measure various personal characteristics, such as
fingerprints, voice prints, retina prints, or signature characteristics.
66.
Controls in place to prevent users from inferring, through query features,
specific data values that they otherwise are unauthorized to access.
67.
A commercial system that are completely finished and tested systems that
are ready for implementation, These are often general-purpose systems or
systems customized to a specific industry.
68.
A system which provide a basic system structure on which to build. They
come with all the primary processing modules programmed.
69.
Its objective is to link individual system projects or applications to the
strategic objectives of the firm.
70.
In this phase of systems development process, database structures are
created and populated with data, equipment is purchased and installed,
employees are trained, the system is documented, and the new system is
installed.