Chapter 5 & 6 (Information Ethics, Security, Databases)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

What is information ethics?

The rules and moral issues about how information technologies are used, including how information is created, collected, shared, and processed.

2
New cards

What is privacy?

The right to control your personal information and not be observed without your permission.

3
New cards

What is confidentiality?

Making sure information is only seen by people who are allowed to see it.

4
New cards

What is intellectual property?

Creative work that has value and is protected by copyright, trademark, or patent laws.

5
New cards

What is pirated software?

Software that is copied, used, or shared without the owner’s permission.

6
New cards

What is digital rights management (DRM)?

Technology used to control how digital media is used to prevent illegal copying or sharing.

7
New cards

What is information security?

Protecting information from being misused by people inside or outside an organization.

8
New cards

What is downtime?

When a system is not working or available to use.

9
New cards

What is a hacker?

Someone with tech skills who breaks into computers or networks, either for profit or challenge.

10
New cards

Name three types of hackers.

hite-hat hacker (ethical), black-hat hacker (illegal), and hacktivist (for activism).

11
New cards

What is spyware?

Software that secretly collects user data and sends it to someone else without permission.

12
New cards

What is ransomware?

Software that locks or encrypts your files and demands money to unlock them.

13
New cards

What is Simplelocker?

An example of ransomware that encrypts files and demands payment to unlock them.

14
New cards

What is a polymorphic virus?

A virus that changes its form or code each time it spreads to avoid detection.

15
New cards

What is information governance?

Managing and controlling how company data is available, used, and protected.

16
New cards

What is a database?

An organized collection of data about things like people, places, or transactions.

17
New cards

What is a database management system (DBMS)?

Software that lets users create, read, update, and delete data in a database while managing security and access.

18
New cards

What is transactional data?

Data from daily business activities like sales or purchases, used to run day-to-day operations.

19
New cards

What is analytical data?

Data used to analyze and make business decisions, not for daily operations.

20
New cards

What are the five traits of high-quality data?

Accuracy, completeness, consistency, timeliness, and uniqueness.

21
New cards

What does data consistency mean?

Data values are the same across different systems or records, and summaries match details.

22
New cards

What does data completeness mean?

All necessary data is included and nothing important is missing.

23
New cards

What are integrity constraints?

Rules in a database that ensure data is accurate and reliable.

24
New cards

What is a primary key?

A unique identifier for each record in a table.

25
New cards

What is a foreign key?

A field that links one table to another by matching a primary key from the other table.

26
New cards

What are the main concepts of the relational database model?

Entities, attributes, keys, and relationships.

27
New cards

What is Query-By-Example (QBE)?

A tool that lets users create database queries by filling out a form instead of writing code.

28
New cards

Why is eliminating redundant data important?

It improves data quality, reduces errors, and saves storage space.