The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
2 0 Terms
1. BCT Section 2.01 Terms
Technology Issues
1. Tech & Education The use of technology in education
2. Tech & Science The use of technology in science
3. Tech & Work The use of technology in work
4. Technology Careers Careers that involve working with technology
5. Administrative Assistant A person hired to aid an executive by coordinating
such office services and procedures
6. Graphic Designer The practice or profession of designing of print or
electronic forms of visual information.
7. Network Administrator A person who manages a communication network
within an organization
8. PC Support A person who works with minicomputer applications
9. Web Master A person who designs or maintains a website
10. Database Administrator A person responsible for the design and management
of one or more databases
11. Software Engineer A person who designs and writes and tests computer
programs
12. Computer Crime Crimes committed with the use of computers
13. Computer Fraud Conduct that involves the manipulation of a computer
or computer data
14. Computer Hacking Involves invading someone else’s computer
15. Theft of Computer Time An employee uses a company’s computer for personal
use
16. Data Diddling Changing data before it is entered into the computer
or after it has been entered into the computer
17. Computer Virus A virus is a program that has been written to cause
corruption of data on a computer.
18. Worm Virus that makes many copies of it’s self resulting in
the consumption of system resources that slows down
or actually halts tasks.
2. 19. Time Bomb Virus that does not cause its damage until a certain
date or until the system has been booted a certain
number of times.
20. Logic Bomb Virus triggered by the appearance or disappearance of
specified data.
21. Trojan Horse Virus that does something different from what it is
expected to do. That hides in other files.
22. Privacy & Security Issues Any time you submit information on the Internet, it is
possible for the information to be gathered by many
persons and used for various situations including being
sold
23. Security Measures Passwords, fire walls, anti virus software