Home > Preview
The flashcards below were created by user
on FreezingBlue Flashcards.
What are information systems?
Information systems are software applications that facilitate the organization and analysis of data.
Give an example of an information system.
Spreadsheet software allows users to place raw data in tables and then utilize formulas and basic graphical mechanisms to generate calculations and illustrations from it.
Database structures are a/an _______________ to a distributed information system based on files.
What are the three layers of data in a database system?
- From outside in:
- Database (the stored data of the system)
- Database management system (system of programs controlling how data is accessed)
- Application software (system of programs specifying how to present data to the user)
In a database, what are tuples and attributes?
Tuples are rows (records) and columns are attributes (fields).
What does the SELECT operator do in a database?
It is a query. It removes rows (from your view) that don't meet the criteria. Or, it determines which tuples have particular attributes.
What does the PROJECT operator do in a database?
It limits the view of the database to particular columns (attributes).
What does the relational operator JOIN do?
It combines multiple tables that have common attributes.
What is meant by 'concurrency control'?
It refers to the possibility of the loss of data integrity due to concurrent access to data from multiple access points. It can be avoided by locking records, and by setting rollback points to recover database to its state prior to transaction being processed.
What is encryption?
It is encoding a message in such a way that only the receiving station can decode it.
What are the steps to sending a message with public-key encryption?
- 1) create message
- 2) look up recipient's public key
- 3) encrypt message with recipient's public key
- 4) transmit encrypted message
- 5) decrypt message with recipient's private key
What is meant by authentication?
Authentication is validating that the message sender is who it appears to me.
What are the steps to sending a message for the purpose of key-based authentication?
- 1) create message
- 2) encrypt message with sender's private key
- 3) transmit encrypted message
- 4) decrypt message with sender's public key
What would you like to do?
Home > Flashcards > Print Preview