SlideShare a Scribd company logo
1 of 2
BCT Section 2.01 Terms
                          Technology Issues
1. Tech & Education           The use of technology in education

2. Tech & Science             The use of technology in science

3. Tech & Work                The use of technology in work

4. Technology Careers         Careers that involve working with technology

5. Administrative Assistant   A person hired to aid an executive by coordinating
                              such office services and procedures
6. Graphic Designer           The practice or profession of designing of print or
                              electronic forms of visual information.
7. Network Administrator      A person who manages a communication network
                              within an organization
8. PC Support                 A person who works with minicomputer applications

9. Web Master                 A person who designs or maintains a website

10. Database Administrator    A person responsible for the design and management
                              of one or more databases
11. Software Engineer         A person who designs and writes and tests computer
                              programs
12. Computer Crime            Crimes committed with the use of computers

13. Computer Fraud            Conduct that involves the manipulation of a computer
                              or computer data
14. Computer Hacking          Involves invading someone else’s computer

15. Theft of Computer Time    An employee uses a company’s computer for personal
                              use
16. Data Diddling             Changing data before it is entered into the computer
                              or after it has been entered into the computer
17. Computer Virus            A virus is a program that has been written to cause
                              corruption of data on a computer.
18. Worm                      Virus that makes many copies of it’s self resulting in
                              the consumption of system resources that slows down
                              or actually halts tasks.
19. Time Bomb                   Virus that does not cause its damage until a certain
                                date or until the system has been booted a certain
                                number of times.
20. Logic Bomb                  Virus triggered by the appearance or disappearance of
                                specified data.
21. Trojan Horse                Virus that does something different from what it is
                                expected to do. That hides in other files.
22. Privacy & Security Issues   Any time you submit information on the Internet, it is
                                possible for the information to be gathered by many
                                persons and used for various situations including being
                                sold
23. Security Measures           Passwords, fire walls, anti virus software

More Related Content

What's hot

Internet of Things Security Risks for Businesses
Internet of Things Security Risks for BusinessesInternet of Things Security Risks for Businesses
Internet of Things Security Risks for BusinessesMike Ryan
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaChinnu Shimna
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Enterprise Security and Cyber Security Cases
Enterprise Security and Cyber Security CasesEnterprise Security and Cyber Security Cases
Enterprise Security and Cyber Security CasesHakan Yüksel
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introductionAfna Crcs
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYRc Os
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
1 security goals
1   security goals1   security goals
1 security goalsdrewz lin
 
Cyber security
Cyber securityCyber security
Cyber securitySakib Sami
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authenticationEdgar Mwangangi
 
Network basic security
Network basic  securityNetwork basic  security
Network basic securityMohamed Radji
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeBrijesh Joshi
 

What's hot (18)

2 01 Hw
2 01 Hw2 01 Hw
2 01 Hw
 
Internet of Things Security Risks for Businesses
Internet of Things Security Risks for BusinessesInternet of Things Security Risks for Businesses
Internet of Things Security Risks for Businesses
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
Network security
Network securityNetwork security
Network security
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Enterprise Security and Cyber Security Cases
Enterprise Security and Cyber Security CasesEnterprise Security and Cyber Security Cases
Enterprise Security and Cyber Security Cases
 
SYSTEM SECURITY - Chapter 1 introduction
SYSTEM SECURITY - Chapter 1   introductionSYSTEM SECURITY - Chapter 1   introduction
SYSTEM SECURITY - Chapter 1 introduction
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
1 security goals
1   security goals1   security goals
1 security goals
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
Covid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from officeCovid 19 guide how to secure your data while working away from office
Covid 19 guide how to secure your data while working away from office
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Diapositivas de angel benchmarking
Diapositivas de angel benchmarkingDiapositivas de angel benchmarking
Diapositivas de angel benchmarkingangelhv444
 
Professiya parikmaher
Professiya parikmaherProfessiya parikmaher
Professiya parikmaherDimon4
 
Звіт табору "Ромашка" - 2015
Звіт табору "Ромашка" - 2015Звіт табору "Ромашка" - 2015
Звіт табору "Ромашка" - 2015Оксана Гатыло
 
English 3 corte_2_exam_study_guide
English 3 corte_2_exam_study_guideEnglish 3 corte_2_exam_study_guide
English 3 corte_2_exam_study_guideAnGiie SanChez
 
Exportaciones y servicios de mensajeria
Exportaciones y servicios de mensajeriaExportaciones y servicios de mensajeria
Exportaciones y servicios de mensajeriaSanthii Sastoque
 
Tỏi đen chống oxy hóa
Tỏi đen chống oxy hóaTỏi đen chống oxy hóa
Tỏi đen chống oxy hóaCong Tai
 

Viewers also liked (13)

Diapositivas de angel benchmarking
Diapositivas de angel benchmarkingDiapositivas de angel benchmarking
Diapositivas de angel benchmarking
 
Professiya parikmaher
Professiya parikmaherProfessiya parikmaher
Professiya parikmaher
 
Звіт табору "Ромашка" - 2015
Звіт табору "Ромашка" - 2015Звіт табору "Ромашка" - 2015
Звіт табору "Ромашка" - 2015
 
superlerr
superlerrsuperlerr
superlerr
 
English 3 corte_2_exam_study_guide
English 3 corte_2_exam_study_guideEnglish 3 corte_2_exam_study_guide
English 3 corte_2_exam_study_guide
 
Exportaciones y servicios de mensajeria
Exportaciones y servicios de mensajeriaExportaciones y servicios de mensajeria
Exportaciones y servicios de mensajeria
 
отчет по 23 февраля копия
отчет по 23 февраля   копияотчет по 23 февраля   копия
отчет по 23 февраля копия
 
Garden Season Extenders Summary - How to Maximize your Garden Output, without...
Garden Season Extenders Summary - How to Maximize your Garden Output, without...Garden Season Extenders Summary - How to Maximize your Garden Output, without...
Garden Season Extenders Summary - How to Maximize your Garden Output, without...
 
Tỏi đen chống oxy hóa
Tỏi đen chống oxy hóaTỏi đen chống oxy hóa
Tỏi đen chống oxy hóa
 
Presentacion
PresentacionPresentacion
Presentacion
 
Documento 1
Documento 1Documento 1
Documento 1
 
Dank.
Dank.Dank.
Dank.
 
Value chain presentation
Value chain presentationValue chain presentation
Value chain presentation
 

Similar to 2 03 Hw

2 01 Terms Technology Issues
2 01 Terms Technology Issues2 01 Terms Technology Issues
2 01 Terms Technology Issueserikabonati
 
2 01 Hw Finished
2 01 Hw Finished2 01 Hw Finished
2 01 Hw FinishedTerminatorV
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรSoftware Park Thailand
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)DnaSylCotter
 
Across Down 1- Duplicate that can be used if the original is lost- dam.pdf
Across Down 1- Duplicate that can be used if the original is lost- dam.pdfAcross Down 1- Duplicate that can be used if the original is lost- dam.pdf
Across Down 1- Duplicate that can be used if the original is lost- dam.pdfyrajjoshi
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxNitishChoudhary23
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 

Similar to 2 03 Hw (20)

2 01 Terms Technology Issues
2 01 Terms Technology Issues2 01 Terms Technology Issues
2 01 Terms Technology Issues
 
2 01 Hw
2 01 Hw2 01 Hw
2 01 Hw
 
2 01 Hw Finished
2 01 Hw Finished2 01 Hw Finished
2 01 Hw Finished
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
It ppt new
It ppt newIt ppt new
It ppt new
 
Technology
TechnologyTechnology
Technology
 
Cloud security
Cloud securityCloud security
Cloud security
 
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
 
Across Down 1- Duplicate that can be used if the original is lost- dam.pdf
Across Down 1- Duplicate that can be used if the original is lost- dam.pdfAcross Down 1- Duplicate that can be used if the original is lost- dam.pdf
Across Down 1- Duplicate that can be used if the original is lost- dam.pdf
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
CC_ SECURITY ISSUES by a_khoshnoudi @IUST
 CC_ SECURITY ISSUES  by a_khoshnoudi @IUST CC_ SECURITY ISSUES  by a_khoshnoudi @IUST
CC_ SECURITY ISSUES by a_khoshnoudi @IUST
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
 

Recently uploaded

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

2 03 Hw

  • 1. BCT Section 2.01 Terms Technology Issues 1. Tech & Education The use of technology in education 2. Tech & Science The use of technology in science 3. Tech & Work The use of technology in work 4. Technology Careers Careers that involve working with technology 5. Administrative Assistant A person hired to aid an executive by coordinating such office services and procedures 6. Graphic Designer The practice or profession of designing of print or electronic forms of visual information. 7. Network Administrator A person who manages a communication network within an organization 8. PC Support A person who works with minicomputer applications 9. Web Master A person who designs or maintains a website 10. Database Administrator A person responsible for the design and management of one or more databases 11. Software Engineer A person who designs and writes and tests computer programs 12. Computer Crime Crimes committed with the use of computers 13. Computer Fraud Conduct that involves the manipulation of a computer or computer data 14. Computer Hacking Involves invading someone else’s computer 15. Theft of Computer Time An employee uses a company’s computer for personal use 16. Data Diddling Changing data before it is entered into the computer or after it has been entered into the computer 17. Computer Virus A virus is a program that has been written to cause corruption of data on a computer. 18. Worm Virus that makes many copies of it’s self resulting in the consumption of system resources that slows down or actually halts tasks.
  • 2. 19. Time Bomb Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. 20. Logic Bomb Virus triggered by the appearance or disappearance of specified data. 21. Trojan Horse Virus that does something different from what it is expected to do. That hides in other files. 22. Privacy & Security Issues Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold 23. Security Measures Passwords, fire walls, anti virus software