Untitled Flashcards Set

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

good

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

Cache Memory

A small-sized type of volatile computer memory that provides high-speed data access to the processor and stores frequently used computer programs, applications, and data.

2
New cards

Cache Replacement Policies

Strategies used to determine which items to discard from cache when new data is added, including Least Recently Used (LRU), First-In-First-Out (FIFO), and Least Frequently Used (LFU).

3
New cards

Access Control

The process of granting or denying specific requests for accessing resources in a computing environment based on permissions.

4
New cards

Authentication

The process of verifying the identity of a user or system, typically through username/password combinations, biometric data, or security tokens.

5
New cards

Secure OS Design

The practice of designing operating systems with security principles at their core to protect against unauthorized access and attacks.

6
New cards

Malware

Malicious software designed to harm, exploit, or otherwise compromise the integrity, confidentiality, or availability of computers and their users.

7
New cards

Defense Mechanisms

Techniques or methods used to protect computer systems from malware, including antivirus software, firewalls, and intrusion detection systems.

8
New cards

Database Management System (DBMS)

Software that provides a systematic way to create, retrieve, update, and manage data in databases.

9
New cards

Relational Database Management System (RDBMS)

A type of DBMS that is based on the relational model, where data is organized in tables and relationships between tables are defined.

10
New cards

SQL (Structured Query Language)

A standard programming language used for managing and manipulating relational databases.

11
New cards

NoSQL

A class of database management systems that do not follow the traditional relational model, designed to handle large volumes of unstructured or semi-structured data.

12
New cards

DML (Data Manipulation Language)

A subset of SQL that deals with manipulating data in a database, such as inserting, updating, and deleting data.

13
New cards

DDL (Data Definition Language)

A subset of SQL that is used to define and manage all database structures, including tables, indexes, and schemas.

14
New cards

DCL (Data Control Language)

A subset of SQL used to control access to data within a database, specifically granting or revoking permissions.

15
New cards

TCL (Transaction Control Language)

A set of SQL commands used to manage transactions in a database, ensuring the integrity of data, such as COMMIT and ROLLBACK.

16
New cards

Functional Dependency

A relationship that exists when one attribute uniquely determines another attribute in a relation, often used in normalization.

17
New cards

Normalization

The process of organizing data in a database to reduce redundancy and improve data integrity.

18
New cards

Normal Forms

A set of guidelines to ensure database schema normalization, including First Normal Form (1NF), Second Normal Form (2NF), and Third Normal Form (3NF).

OSZAR »