Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
2 01 Bct Terms
1. BCT Section 2.01 Terms
Technology Issues
1. Tech & Education Internet, long distance learning, simulations and
computer based programs
2. Tech & Science AI, genetic engineering and virtual reality
3. Tech & Work Multinational Economy and electronic commerce
4. Technology Careers Business and office, Administrative assistants, desktop
publisher/graphic designer, network support and
administrator, PC support specialist, manager of
information systems, database administrator, software
engineer and webmaster
5. Administrative Assistant Performs a large number of clerical and administrative
tasks in order for a business or organization to run
effectively and efficiently.
6. Graphic Designer Conveys image through visual solutions that promote
something
7. Network Administrator Ensure that networks stay operational
8. PC Support Fixes PCs
9. Web Master Webmasters make websites
10. Database Administrator Set up computer database systems
11. Software Engineer Develop and test software
12. Computer Crime A criminal act committed through the use of a
computer
13. Computer Fraud Conduct that involves manipulation of a computer or
computer data in order to obtain money, property or
value dishonestly of to cause loss
14. Computer Hacking Involves invading someone else’s computer
15. Theft of Computer Time An employee uses a company’s computer for personal
use such as running a small business, keeping records
of an outside organization, or keeping personal records
2. 16. Data Diddling Changing data before it is entered into the computer or
after it has been entered into the computer
17. Computer Virus A virus is a program that has been written to cause
corruption to a computer
18. Worm Makes many copies of itself, resulting in the
consumption of many resources that slows down or
actually halts tasks
19. Time Bomb Virus that does not cause damage until a certain date
or until the system has been booted a certain number
of times
20. Logic Bomb Virus triggered by appearance or disappearance of
specific data
21. Trojan Horse Virus that does something different from what its
supposed to do
22. Privacy & Security Issues Any time you submit information on the Internet, it is
possible for the information to be gathered by many
persons and used for various situations including being
sold. Information can be gathered from online sources
such as schools, banks, hospitals, insurance companies,
and many other sources.
23. Security Measures 1. Passwords
2. Electronic Identification Cards
3. Firewalls
4. Antivirus Software
5. Selective Hiring Process