BCT Section 2.01 Terms
                          Technology Issues
1. Tech & Education           Internet, long distance learning,. Simulations and
                              computer based pograms.
2. Tech & Science             AI, genetic engineering and virtual reality

3. Tech & Work                Multinational Economy and electronic commerce

4. Technology Careers         Business and office, Administrative assistants, desktop
                              publisher/graphic designer, network support and
                              administrator, PC support specialist, manager of
                              information systems, database administrator, software
                              engineer and webmaster.
5. Administrative Assistant   Performs a large number of clerical and administrative
                              tasks in order for a business or organization to run
                              effectively and efficiently.
6. Graphic Designer           Conveys image through visual solutions that promote
                              something.
7. Network Administrator      Ensure that networks stay operational.

8. PC Support                 Fixes PCs

9. Web Master                 Webmasters make websites

10. Database Administrator    Set up computer database systems

11. Software Engineer         Develop and test software

12. Computer Crime            A criminal act committed through the use of a
                              computer
13. Computer Fraud            Conduct that involves manipulation of a computer or
                              computer data in order to obtain money, property or
                              value dishonestly of to cause loss.
14. Computer Hacking          Involves invading someone else’s computer.

15. Theft of Computer Time    An employee uses a company’s computer for personal
                              use such as running a small business, keeping records
                              of an outside organization, or keep personal records.
16. Data Diddling             Changing data before it is entered into the computer or
                              after it has been entered into the computer.
17. Computer Virus              A virus is a program that has been written to cause
                                corruption to a computer.
18. Worm                        Makes many copies of itself, resulting in the
                                consumption of many resources that slows down or
                                actually halts tasks.
19. Time Bomb                   Virus that does not cause damage until a certain date
                                or until the system has been booted a certain number
                                of times.
20. Logic Bomb                  Virus triggered by appearance or disappearance of
                                specific data
21. Trojan Horse                Virus that does something different from what its
                                supposed to do
22. Privacy & Security Issues   Any time you submit information on the Internet, it is
                                possible for the information to be gathered by many
                                persons and used for various situations including being
                                sold. Information can be gathered from online sources
                                such as schools, banks, hospitals, insurance companies,
                                and many other sources.
23. Security Measures           1. Passwords
                                2. Electronic Identification Cards
                                3. Firewalls
                                4. Antivirus Software
                                5. Selective Hiring Process

2 01 Hw

  • 1.
    BCT Section 2.01Terms Technology Issues 1. Tech & Education Internet, long distance learning,. Simulations and computer based pograms. 2. Tech & Science AI, genetic engineering and virtual reality 3. Tech & Work Multinational Economy and electronic commerce 4. Technology Careers Business and office, Administrative assistants, desktop publisher/graphic designer, network support and administrator, PC support specialist, manager of information systems, database administrator, software engineer and webmaster. 5. Administrative Assistant Performs a large number of clerical and administrative tasks in order for a business or organization to run effectively and efficiently. 6. Graphic Designer Conveys image through visual solutions that promote something. 7. Network Administrator Ensure that networks stay operational. 8. PC Support Fixes PCs 9. Web Master Webmasters make websites 10. Database Administrator Set up computer database systems 11. Software Engineer Develop and test software 12. Computer Crime A criminal act committed through the use of a computer 13. Computer Fraud Conduct that involves manipulation of a computer or computer data in order to obtain money, property or value dishonestly of to cause loss. 14. Computer Hacking Involves invading someone else’s computer. 15. Theft of Computer Time An employee uses a company’s computer for personal use such as running a small business, keeping records of an outside organization, or keep personal records. 16. Data Diddling Changing data before it is entered into the computer or after it has been entered into the computer.
  • 2.
    17. Computer Virus A virus is a program that has been written to cause corruption to a computer. 18. Worm Makes many copies of itself, resulting in the consumption of many resources that slows down or actually halts tasks. 19. Time Bomb Virus that does not cause damage until a certain date or until the system has been booted a certain number of times. 20. Logic Bomb Virus triggered by appearance or disappearance of specific data 21. Trojan Horse Virus that does something different from what its supposed to do 22. Privacy & Security Issues Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold. Information can be gathered from online sources such as schools, banks, hospitals, insurance companies, and many other sources. 23. Security Measures 1. Passwords 2. Electronic Identification Cards 3. Firewalls 4. Antivirus Software 5. Selective Hiring Process