Page 385 - Informatics_Practices_Fliipbook_Class12
P. 385
Glossary
✥ Adware: An adware is a software that displays advertisements to users of the Internet and mobile applications.
✥ Alternate Keys: A candidate key that is not chosen as the primary key is called an alternate key.
✥ Attribute: An attribute defines the characteristics of an entity.
✥ Bar Graph: Bar graphs, often known as bar charts, are a common method for displaying categorical data.
✥ BETWEEN Operator: The BETWEEN operator checks whether a value is within a specified range (inclusive of both lower limit
and upper limit values).
✥ Boot sector virus: A boot sector virus is a virus that affects the boot sector of the disks.
✥ Bridge: A bridge is a multiport device that connects two or more local area networks (LANs) to form an extensive network.
✥ broadcasting: broadcasting is a general term that transforms an object of lower dimension into an object of a higher dimension.
✥ Bus Topology: In bus topology, various nodes are connected to a long cable, called backbone cable.
✥ Bus Topology: In bus topology, various nodes are connected to a long cable, called backbone cable.
✥ Candidate key: A set of attributes that uniquely identify each tuple in a relation is called its candidate key.
✥ Constraint: Constraint specifies the restrictions imposed on the data stored.
✥ Cookies: When the user browses the Internet, the web server sends the data to the browser to be stored in the browser
directory. This small piece of data is known as a cookie and is also termed as a browser cookie and web cookie.
✥ Copyright Infringement: The use or creation of copyright-protected works without the owner’s consent is copyright
infringement.
✥ Copyright: When an author or an organisation sets a work in a physical form of expression, they have a copyright on it that
prevents others from claiming its ownership.
✥ Cyber Bullying: When a victim is bullied online, on social media, or in gaming communities, that is known as cyberbullying.
✥ Cyber Trolls: Trolls are comments or posts that insult or defame other users or their content.
✥ Cybercrime: Cybercrimes are crimes related to the misuse of resources available on the Internet.
✥ Data Definition Language (DDL): Data Definition Language (DDL) is used for describing database structure.
✥ Data Manipulation Language (DML): DML is used to retrieve and modify data.
✥ Date Functions: Date functions enable us to deal with date and time information.
✥ Denial of Service: A Denial of Service, or DOS attack renders a machine or network resource unavailable either temporarily
or permanently to its intended users.
✥ Digital Footprint: A digital footprint is a trail of personal data that one leaves behind while using the Internet.
✥ Digital Rights Management: Digital Rights Management (DRM) is a way to control and limit access to intellectual property by
using technology.
✥ Eavesdropping: Attacks that steal data being transmitted over a communication channel are known as eavesdropping, sniffing,
or snooping.
✥ Entity set: The set of all tuples in a relation is known as the entity set.
✥ Entity: An entity is a real-world object about which data is stored in the database.
✥ Ethernet cards: Ethernet cards, also known as Ethernet adaptors, connect networks using cables.
✥ Fabrication: Illegitimate information is inserted along with authentic data.
✥ Foreign keys: Foreign keys are used to enforce the integrity of the database across the tables.
✥ Hacking: Hacking is the act of gaining unauthorised access to a computer system or network in order to steal information
(such as a password or private files) or damage the system or network.
✥ HTML: HyperText Markup Language (HTML) is used to design web pages.
✥ Identity Theft: When someone steals your personal information to commit fraud, it is known as identity theft (ID theft).
✥ IN Operator: IN operator checks whether a value exists in the given list of values.
✥ Intellectual Property Rights (IPR): The work done by a person or an organisation using their mind and creativity is called
intellectual property.
Glossary 371

