1. BCT Section 2.01 Terms
Technology Issues
1. Tech & Education Makes Education,
Internet,
Distance, Learning,
Computer-Based Learning, and
Simulations possible
2. Tech & Science Artificial Intelligence
Genetic, Engineering,
Virtual Reality
3. Tech & Work Multinational Economy,
Electronic Commerce
4. Technology Careers 1. Business & Office
2. Administrative Assistant
3. Desktop Publisher/Graphic Designer
4. Network Support and Administration
5. PC Support Specialist
6. Manager of Information Systems
7. Database Administrator
8. Software Engineer
9. Web Master
5. Administrative Assistant A secretary is an administrative assistant in business office
administration.
6. Graphic Designer someone who specializes in graphic design
7. Network Administrator Network administrator is a modern profession responsible for
the maintenance of computer hardware and software that
comprises a computer network
8. PC Support Someone who you can call to learn things about a computer ex:
how to set up a computer or a printer
9. Web Master a technician who designs or maintains a website
10. Database Administrator A database administrator (DBA) is a person responsible for the
design, implementation, maintenance and repair of an
organization's database
11. Software Engineer programmer: a person who designs and writes and tests
computer programs
12. Computer Crime A criminal act committed through the use of a computer. It can
also involve the theft of a computer and any equipment
associated with the computer.
13. Computer Fraud Conduct that involves the manipulation of a computer or
computer data in order to obtain money, property, or value
dishonestly or to cause loss.
14. Computer Hacking Involves invading someone else’s computer, usually for personal
gain or just the satisfaction of invasion.
15. Theft of Computer Time An employee uses a company’s computer for personal use such
as running a small business, keeping records of an outside
organization, or keeping personal records.
2. 16. Data Diddling Changing data before it is entered into the computer or after is
has been entered into the computer.
17. Computer Virus A virus is a program that has been written to cause corruption
of data on a computer.
18. Worm Makes many copies of itself, resulting in the consumption of
system resources that slows down or actually halts tasks.
19. Time Bomb Virus that does not cause its damage until a certain date or until
the system has been booted a certain number of times.
20. Logic Bomb Virus triggered by the appearance or disappearance of specified
data.
21. Trojan Horse Virus that does something different from what it is expected to
do.
22. Privacy & Security Issues Any time you submit information on the Internet, it is possible
for the information to be gathered by many persons and used for
various situations including being sold. Information can be
gathered from online sources such as schools, banks, hospitals,
insurance companies, and many other sources.
23. Security Measures 1. Passwords
2. Electronic Identification Cards
3. Firewalls
4. Antivirus Software
5. Selective Hiring Process