SlideShare a Scribd company logo
1 of 2
BCT Section 2.01 Terms
                          Technology Issues
1. Tech & Education           The use of technology in education

2. Tech & Science             The use of technology in science

3. Tech & Work                The use of technology in work

4. Technology Careers         Careers that involve working with technology

5. Administrative Assistant   A person hired to aid an executive by coordinating
                              such office services and procedures
6. Graphic Designer           The practice or profession of designing of print or
                              electronic forms of visual information.
7. Network Administrator      A person who manages a communication network
                              within an organization
8. PC Support                 A person who works with minicomputer applications

9. Web Master                 A person who designs or maintains a website

10. Database Administrator    A person responsible for the design and management
                              of one or more databases
11. Software Engineer         A person who designs and writes and tests computer
                              programs
12. Computer Crime            Crimes committed with the use of computers

13. Computer Fraud            Conduct that involves the manipulation of a computer
                              or computer data
14. Computer Hacking          Involves invading someone else’s computer

15. Theft of Computer Time    An employee uses a company’s computer for personal
                              use
16. Data Diddling             Changing data before it is entered into the computer
                              or after it has been entered into the computer
17. Computer Virus            A virus is a program that has been written to cause
                              corruption of data on a computer.
18. Worm                      Virus that makes many copies of it’s self resulting in
                              the consumption of system resources that slows down
                              or actually halts tasks.
19. Time Bomb                   Virus that does not cause its damage until a certain
                                date or until the system has been booted a certain
                                number of times.
20. Logic Bomb                  Virus triggered by the appearance or disappearance of
                                specified data.
21. Trojan Horse                Virus that does something different from what it is
                                expected to do. That hides in other files.
22. Privacy & Security Issues   Any time you submit information on the Internet, it is
                                possible for the information to be gathered by many
                                persons and used for various situations including being
                                sold
23. Security Measures           Passwords, fire walls, anti virus software

More Related Content

What's hot

Internet of Things Security Risks for Businesses
Internet of Things Security Risks for BusinessesInternet of Things Security Risks for Businesses
Internet of Things Security Risks for BusinessesMike Ryan
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaChinnu Shimna
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Enterprise Security and Cyber Security Cases
Enterprise Security and Cyber Security CasesEnterprise Security and Cyber Security Cases
Enterprise Security and Cyber Security CasesHakan Yüksel
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introductionAfna Crcs
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYRc Os
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
1 security goals
1   security goals1   security goals
1 security goalsdrewz lin
 
Cyber security
Cyber securityCyber security
Cyber securitySakib Sami
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authenticationEdgar Mwangangi
 
Network basic security
Network basic  securityNetwork basic  security
Network basic securityMohamed Radji
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeBrijesh Joshi
 

What's hot (18)

2 01 Hw
2 01 Hw2 01 Hw
2 01 Hw
 
Internet of Things Security Risks for Businesses
Internet of Things Security Risks for BusinessesInternet of Things Security Risks for Businesses
Internet of Things Security Risks for Businesses
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
Network security
Network securityNetwork security
Network security
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Enterprise Security and Cyber Security Cases
Enterprise Security and Cyber Security CasesEnterprise Security and Cyber Security Cases
Enterprise Security and Cyber Security Cases
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introduction
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
1 security goals
1   security goals1   security goals
1 security goals
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from office
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Calzado deportivos
Calzado deportivosCalzado deportivos
Calzado deportivosJose Brito
 
Presentasi page 1
Presentasi page 1Presentasi page 1
Presentasi page 1VeRany R. R
 
Presentacion final sep
Presentacion final sepPresentacion final sep
Presentacion final sepralarconm
 
Documento 1.pdf juan manuel.pd fpayan
Documento 1.pdf juan manuel.pd fpayanDocumento 1.pdf juan manuel.pd fpayan
Documento 1.pdf juan manuel.pd fpayanjuanmanuelsolis
 
Education Informational
Education InformationalEducation Informational
Education InformationalShadoka
 
Requisitos Del Aprendj Significativo
Requisitos Del Aprendj SignificativoRequisitos Del Aprendj Significativo
Requisitos Del Aprendj Significativopazgonzalo
 
SIMPLEX VOLUME ANALYSIS BASED ON TRIANGULAR FACTORIZATION: A FRAMEWORK FOR HY...
SIMPLEX VOLUME ANALYSIS BASED ON TRIANGULAR FACTORIZATION: A FRAMEWORK FOR HY...SIMPLEX VOLUME ANALYSIS BASED ON TRIANGULAR FACTORIZATION: A FRAMEWORK FOR HY...
SIMPLEX VOLUME ANALYSIS BASED ON TRIANGULAR FACTORIZATION: A FRAMEWORK FOR HY...grssieee
 
ענת רפואה מכחישה הטסות קופים באל על
ענת רפואה מכחישה הטסות קופים באל עלענת רפואה מכחישה הטסות קופים באל על
ענת רפואה מכחישה הטסות קופים באל עלTehiya Ben Zur
 
שינוי מטרות עמותת תנו לחיות לחיות מאי 2012
שינוי מטרות עמותת תנו לחיות לחיות מאי 2012שינוי מטרות עמותת תנו לחיות לחיות מאי 2012
שינוי מטרות עמותת תנו לחיות לחיות מאי 2012Tehiya Ben Zur
 

Viewers also liked (17)

Calzado deportivos
Calzado deportivosCalzado deportivos
Calzado deportivos
 
Virus informatico
Virus informaticoVirus informatico
Virus informatico
 
Presentasi page 1
Presentasi page 1Presentasi page 1
Presentasi page 1
 
Presentacion final sep
Presentacion final sepPresentacion final sep
Presentacion final sep
 
karina garcia
karina garciakarina garcia
karina garcia
 
Documento 1.pdf juan manuel.pd fpayan
Documento 1.pdf juan manuel.pd fpayanDocumento 1.pdf juan manuel.pd fpayan
Documento 1.pdf juan manuel.pd fpayan
 
Education Informational
Education InformationalEducation Informational
Education Informational
 
Requisitos Del Aprendj Significativo
Requisitos Del Aprendj SignificativoRequisitos Del Aprendj Significativo
Requisitos Del Aprendj Significativo
 
SIMPLEX VOLUME ANALYSIS BASED ON TRIANGULAR FACTORIZATION: A FRAMEWORK FOR HY...
SIMPLEX VOLUME ANALYSIS BASED ON TRIANGULAR FACTORIZATION: A FRAMEWORK FOR HY...SIMPLEX VOLUME ANALYSIS BASED ON TRIANGULAR FACTORIZATION: A FRAMEWORK FOR HY...
SIMPLEX VOLUME ANALYSIS BASED ON TRIANGULAR FACTORIZATION: A FRAMEWORK FOR HY...
 
Karina 3
Karina 3Karina 3
Karina 3
 
Doc2
Doc2Doc2
Doc2
 
Imagen1 penal.4
Imagen1 penal.4Imagen1 penal.4
Imagen1 penal.4
 
ענת רפואה מכחישה הטסות קופים באל על
ענת רפואה מכחישה הטסות קופים באל עלענת רפואה מכחישה הטסות קופים באל על
ענת רפואה מכחישה הטסות קופים באל על
 
POWERPOINT
POWERPOINTPOWERPOINT
POWERPOINT
 
Herramientas de word utilizadas
Herramientas de word utilizadasHerramientas de word utilizadas
Herramientas de word utilizadas
 
Planestic
Planestic Planestic
Planestic
 
שינוי מטרות עמותת תנו לחיות לחיות מאי 2012
שינוי מטרות עמותת תנו לחיות לחיות מאי 2012שינוי מטרות עמותת תנו לחיות לחיות מאי 2012
שינוי מטרות עמותת תנו לחיות לחיות מאי 2012
 

Similar to 2 0 Terms

2 01 Terms Technology Issues
2 01 Terms Technology Issues2 01 Terms Technology Issues
2 01 Terms Technology Issueserikabonati
 
2 01 Hw Finished
2 01 Hw Finished2 01 Hw Finished
2 01 Hw FinishedTerminatorV
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรSoftware Park Thailand
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)DnaSylCotter
 
Across Down 1- Duplicate that can be used if the original is lost- dam.pdf
Across Down 1- Duplicate that can be used if the original is lost- dam.pdfAcross Down 1- Duplicate that can be used if the original is lost- dam.pdf
Across Down 1- Duplicate that can be used if the original is lost- dam.pdfyrajjoshi
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxNitishChoudhary23
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 

Similar to 2 0 Terms (20)

2 01 Terms Technology Issues
2 01 Terms Technology Issues2 01 Terms Technology Issues
2 01 Terms Technology Issues
 
2 01 Hw
2 01 Hw2 01 Hw
2 01 Hw
 
2 01 Hw Finished
2 01 Hw Finished2 01 Hw Finished
2 01 Hw Finished
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
It ppt new
It ppt newIt ppt new
It ppt new
 
Technology
TechnologyTechnology
Technology
 
Cloud security
Cloud securityCloud security
Cloud security
 
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
 
Across Down 1- Duplicate that can be used if the original is lost- dam.pdf
Across Down 1- Duplicate that can be used if the original is lost- dam.pdfAcross Down 1- Duplicate that can be used if the original is lost- dam.pdf
Across Down 1- Duplicate that can be used if the original is lost- dam.pdf
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
CC_ SECURITY ISSUES by a_khoshnoudi @IUST
 CC_ SECURITY ISSUES  by a_khoshnoudi @IUST CC_ SECURITY ISSUES  by a_khoshnoudi @IUST
CC_ SECURITY ISSUES by a_khoshnoudi @IUST
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

2 0 Terms

  • 1. BCT Section 2.01 Terms Technology Issues 1. Tech & Education The use of technology in education 2. Tech & Science The use of technology in science 3. Tech & Work The use of technology in work 4. Technology Careers Careers that involve working with technology 5. Administrative Assistant A person hired to aid an executive by coordinating such office services and procedures 6. Graphic Designer The practice or profession of designing of print or electronic forms of visual information. 7. Network Administrator A person who manages a communication network within an organization 8. PC Support A person who works with minicomputer applications 9. Web Master A person who designs or maintains a website 10. Database Administrator A person responsible for the design and management of one or more databases 11. Software Engineer A person who designs and writes and tests computer programs 12. Computer Crime Crimes committed with the use of computers 13. Computer Fraud Conduct that involves the manipulation of a computer or computer data 14. Computer Hacking Involves invading someone else’s computer 15. Theft of Computer Time An employee uses a company’s computer for personal use 16. Data Diddling Changing data before it is entered into the computer or after it has been entered into the computer 17. Computer Virus A virus is a program that has been written to cause corruption of data on a computer. 18. Worm Virus that makes many copies of it’s self resulting in the consumption of system resources that slows down or actually halts tasks.
  • 2. 19. Time Bomb Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. 20. Logic Bomb Virus triggered by the appearance or disappearance of specified data. 21. Trojan Horse Virus that does something different from what it is expected to do. That hides in other files. 22. Privacy & Security Issues Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold 23. Security Measures Passwords, fire walls, anti virus software