Page 385 - Informatics_Practices_Fliipbook_Class12
P. 385

Glossary






            ✥   Adware: An adware is a software that displays advertisements to users of the Internet and mobile applications.
            ✥   Alternate Keys: A candidate key that is not chosen as the primary key is called an alternate key.
            ✥   Attribute: An attribute defines the characteristics of an entity.
            ✥   Bar Graph: Bar graphs, often known as bar charts, are a common method for displaying categorical data.
            ✥   BETWEEN Operator: The BETWEEN operator checks whether a value is within a specified range (inclusive of both lower limit
               and upper limit values).
            ✥   Boot sector virus: A boot sector virus is a virus that affects the boot sector of the disks.
            ✥   Bridge: A bridge is a multiport device that connects two or more local area networks (LANs) to form an extensive network.
            ✥   broadcasting: broadcasting is a general term that transforms an object of lower dimension into an object of a higher dimension.
            ✥   Bus Topology: In bus topology, various nodes are connected to a long cable, called backbone cable.
            ✥   Bus Topology: In bus topology, various nodes are connected to a long cable, called backbone cable.
            ✥   Candidate key: A set of attributes that uniquely identify each tuple in a relation is called its candidate key.
            ✥   Constraint: Constraint specifies the restrictions imposed on the data stored.
            ✥   Cookies: When the user browses the Internet, the web server sends the data to the browser to be stored in the browser
               directory. This small piece of data is known as a cookie and is also termed as a browser cookie and web cookie.
            ✥   Copyright Infringement: The use or creation  of  copyright-protected works without  the owner’s consent is  copyright
               infringement.
            ✥   Copyright: When an author or an organisation sets a work in a physical form of expression, they have a copyright on it that
               prevents others from claiming its ownership.
            ✥   Cyber Bullying: When a victim is bullied online, on social media, or in gaming communities, that is known as cyberbullying.
            ✥   Cyber Trolls: Trolls are comments or posts that insult or defame other users or their content.
            ✥   Cybercrime: Cybercrimes are crimes related to the misuse of resources available on the Internet.
            ✥   Data Definition Language (DDL): Data Definition Language (DDL) is used for describing database structure.
            ✥   Data Manipulation Language (DML): DML is used to retrieve and modify data.
            ✥   Date Functions: Date functions enable us to deal with date and time information.
            ✥   Denial of Service: A Denial of Service, or DOS attack renders a machine or network resource unavailable either temporarily
               or permanently to its intended users.

            ✥   Digital Footprint: A digital footprint is a trail of personal data that one leaves behind while using the Internet.
            ✥   Digital Rights Management: Digital Rights Management (DRM) is a way to control and limit access to intellectual property by
               using technology.
            ✥   Eavesdropping: Attacks that steal data being transmitted over a communication channel are known as eavesdropping, sniffing,
               or snooping.
            ✥   Entity set: The set of all tuples in a relation is known as the entity set.
            ✥   Entity: An entity is a real-world object about which data is stored in the database.
            ✥   Ethernet cards: Ethernet cards, also known as Ethernet adaptors, connect networks using cables.
            ✥   Fabrication: Illegitimate information is inserted along with authentic data.
            ✥   Foreign keys: Foreign keys are used to enforce the integrity of the database across the tables.
            ✥   Hacking: Hacking is the act of gaining unauthorised access to a computer system or network in order to steal information
               (such as a password or private files) or damage the system or network.
            ✥   HTML: HyperText Markup Language (HTML) is used to design web pages.
            ✥   Identity Theft: When someone steals your personal information to commit fraud, it is known as identity theft (ID theft).
            ✥   IN Operator: IN operator checks whether a value exists in the given list of values.
            ✥   Intellectual Property Rights (IPR): The work done by a person or an organisation using their mind and creativity is called
               intellectual property.


                                                                                                      Glossary   371
   380   381   382   383   384   385   386   387   388   389   390