Exam2 - FC4 - The flashcards are formatted for printing....

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
Spyware Spyware
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Technology that gather information about a person or organization without their knowledge; embedded on computers and collects information to pass along. Typically software that is secretly installed on a computer and relays information to a third party.
Background image of page 2
Extensible Market Language Utilities
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Used to catch spyware (systems software). i.e. XML
Background image of page 4
XML XML
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
A markup language that defines the format and the content of data (HTML only specifies format). Specifies what an item of data is, not just how it should be formatted; used to both store and exchange data.
Background image of page 6
Flat Files XML
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Used to transfer data from one system to another; systems do not have to be compatible; uses “to” and “from” tags. Two dimensional tables with rows and columns.
Background image of page 8
Reduce Redundancy Redundancy
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Have multiple sources of data for the same thing; good for backups, but bad for databases because of the inconsistency. Store a pointer, but data is in a separate file, separating customer information and orders; consistent (i.e. email entered once).
Background image of page 10
Hierarchical, Network, or Object-Oriented Database Relational Database Model
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/08/2011 for the course ISM 3011C taught by Professor Robertszymanski during the Spring '11 term at University of Central Florida.

Page1 / 45

Exam2 - FC4 - The flashcards are formatted for printing....

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online