Professional Documents
Culture Documents
Converts Assembly Language (Mnemonic) To Machine Language
Converts Assembly Language (Mnemonic) To Machine Language
Phishing Unknown person sends mail in a trustworthy way asking sensitive information
Trojan Horse A malicious computer program which pretends to be a useful application
Eavesdropping Capturing small packets transmitted and reading the data content
Macro Virus infects a software program and series of actions begin automatically when program opened
Worms malware computer program that replicates itself in order to spread to other computers
Logic Bomb a malicious program that is appended to an application and is triggered by a specific event
Drive By Attack hackers look for insecure websites and plant a malicious script into the source code
Spyware malicious programs collect information about users and sends the data to a remote user
Birthday Attack attack against hash algorithms used to verify integrity of a message, software or digital signature
Metamorphic viruses that rewrite themselves completely each time they are to infect new executables
Rollback undoing of partly completed database changes
Commit final step when it has determined that a transaction has been completed successfully
ACID Atomicity, Consistency, Isolation, Durability
SubSchema name given to the view of database that appears to an application program
Trigger special type of stored procedure that automatically executes when an event occurs
Data Mining term used to describe the process of forecasting in data
BLOB Binary Long Object
Brownfield terms used for a software that is built from an existing program
SCCM System Center Configuration Manager
Agile the way in which multiple teams of developers collaborate on a software project
Applet program capable of running on any computer regardless of the operating system
Code Rot Software Decay, Bit Rot, Software Erosion
h = O(log n) average case time complexity for finding the height of the binary tree