SlideShare a Scribd company logo
1 of 2
BCT Section 2.01 Terms
           Technology Issues

1. Tech & Education                     Makes Education,
                                    Internet,
                                    Distance, Learning,
                                    Computer-Based Learning, and
                                    Simulations possible
2. Tech & Science                   Artificial Intelligence
                                    Genetic, Engineering,
                                    Virtual Reality
3. Tech & Work                      Multinational Economy,
                                    Electronic Commerce
4. Technology Careers               1. Business & Office
                                    2. Administrative Assistant
                                    3. Desktop Publisher/Graphic Designer
                                    4. Network Support and Administration
                                    5. PC Support Specialist
                                    6. Manager of Information Systems
                                    7. Database Administrator
                                    8. Software Engineer
                                    9. Web Master
5. Administrative Assistant         A secretary is an administrative assistant in business office
                                    administration.
6. Graphic Designer                 someone who specializes in graphic design

7. Network Administrator            Network administrator is a modern profession responsible for
                                    the maintenance of computer hardware and software that
                                    comprises a computer network
8. PC Support                       Someone who you can call to learn things about a computer ex:
                                    how to set up a computer or a printer
9. Web Master                       a technician who designs or maintains a website

10. Database Administrator          A database administrator (DBA) is a person responsible for the
                                    design, implementation, maintenance and repair of an
                                    organization's database
11. Software Engineer               programmer: a person who designs and writes and tests
                                    computer programs
12. Computer Crime                  A criminal act committed through the use of a computer. It can
                                    also involve the theft of a computer and any equipment
                                    associated with the computer.
13. Computer Fraud                  Conduct that involves the manipulation of a computer or
                                    computer data in order to obtain money, property, or value
                                    dishonestly or to cause loss.
14. Computer Hacking                Involves invading someone else’s computer, usually for personal
                                    gain or just the satisfaction of invasion.
15. Theft of Computer Time          An employee uses a company’s computer for personal use such
                                    as running a small business, keeping records of an outside
                                    organization, or keeping personal records.
16. Data Diddling               Changing data before it is entered into the computer or after is
                                has been entered into the computer.
17. Computer Virus              A virus is a program that has been written to cause corruption
                                of data on a computer.
18. Worm                        Makes many copies of itself, resulting in the consumption of
                                system resources that slows down or actually halts tasks.
19. Time Bomb                   Virus that does not cause its damage until a certain date or until
                                the system has been booted a certain number of times.
20. Logic Bomb                  Virus triggered by the appearance or disappearance of specified
                                data.
21. Trojan Horse                Virus that does something different from what it is expected to
                                do.
22. Privacy & Security Issues   Any time you submit information on the Internet, it is possible
                                for the information to be gathered by many persons and used for
                                various situations including being sold. Information can be
                                gathered from online sources such as schools, banks, hospitals,
                                insurance companies, and many other sources.
23. Security Measures           1. Passwords
                                2. Electronic Identification Cards
                                3. Firewalls
                                4. Antivirus Software
                                5. Selective Hiring Process

More Related Content

What's hot

Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacymalik1972
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityFizaril Amzari Omar
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Anna Stirling
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Securing information system
Securing information systemSecuring information system
Securing information systemTanjim Rasul
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final21_zaheer
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 

What's hot (19)

2 01 Terms
2 01 Terms2 01 Terms
2 01 Terms
 
2 0 Terms
2 0 Terms2 0 Terms
2 0 Terms
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
One of 2 protect your business
One of 2 protect your businessOne of 2 protect your business
One of 2 protect your business
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Securing information system
Securing information systemSecuring information system
Securing information system
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Information Security Awareness Session -2020
Information Security Awareness Session -2020Information Security Awareness Session -2020
Information Security Awareness Session -2020
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Online reputation
Online reputationOnline reputation
Online reputation
 

Viewers also liked

BiB - Before it Begins
BiB - Before it BeginsBiB - Before it Begins
BiB - Before it BeginsWesurfer
 
Bct Section 1.2 Terms
Bct Section 1.2 TermsBct Section 1.2 Terms
Bct Section 1.2 Termswildnhj
 
UAA_Tarea_TIC
UAA_Tarea_TICUAA_Tarea_TIC
UAA_Tarea_TICEl_Magno
 
Portfolio bonobos
Portfolio bonobosPortfolio bonobos
Portfolio bonobosmcfuqua
 
2013希望閱讀小作家《穿越時空的愛》_秀琪小朋友
2013希望閱讀小作家《穿越時空的愛》_秀琪小朋友2013希望閱讀小作家《穿越時空的愛》_秀琪小朋友
2013希望閱讀小作家《穿越時空的愛》_秀琪小朋友reading CW
 
Contents feedback
Contents feedbackContents feedback
Contents feedbackShari Allan
 
Tool Box Talk - Human Induced Failures 2
Tool Box Talk  - Human Induced Failures  2Tool Box Talk  - Human Induced Failures  2
Tool Box Talk - Human Induced Failures 2Ricky Smith CMRP, CMRT
 
Integration structurelle et_sociale_des_ressortissants
Integration structurelle et_sociale_des_ressortissantsIntegration structurelle et_sociale_des_ressortissants
Integration structurelle et_sociale_des_ressortissantsro con
 
Les outils de Blogger
Les outils de BloggerLes outils de Blogger
Les outils de Bloggeraoun_michel
 
Estimulacion temprana_Cynthiallamosalazar
Estimulacion temprana_CynthiallamosalazarEstimulacion temprana_Cynthiallamosalazar
Estimulacion temprana_Cynthiallamosalazarcynthiallamo2510
 

Viewers also liked (16)

BiB - Before it Begins
BiB - Before it BeginsBiB - Before it Begins
BiB - Before it Begins
 
Bct Section 1.2 Terms
Bct Section 1.2 TermsBct Section 1.2 Terms
Bct Section 1.2 Terms
 
Segunda investigacion
Segunda investigacionSegunda investigacion
Segunda investigacion
 
Slide de la empresa
Slide de la empresaSlide de la empresa
Slide de la empresa
 
Ibmsql 01
Ibmsql 01Ibmsql 01
Ibmsql 01
 
UAA_Tarea_TIC
UAA_Tarea_TICUAA_Tarea_TIC
UAA_Tarea_TIC
 
Portfolio bonobos
Portfolio bonobosPortfolio bonobos
Portfolio bonobos
 
Act eco
Act ecoAct eco
Act eco
 
2013希望閱讀小作家《穿越時空的愛》_秀琪小朋友
2013希望閱讀小作家《穿越時空的愛》_秀琪小朋友2013希望閱讀小作家《穿越時空的愛》_秀琪小朋友
2013希望閱讀小作家《穿越時空的愛》_秀琪小朋友
 
Contents feedback
Contents feedbackContents feedback
Contents feedback
 
Tool Box Talk - Human Induced Failures 2
Tool Box Talk  - Human Induced Failures  2Tool Box Talk  - Human Induced Failures  2
Tool Box Talk - Human Induced Failures 2
 
Integration structurelle et_sociale_des_ressortissants
Integration structurelle et_sociale_des_ressortissantsIntegration structurelle et_sociale_des_ressortissants
Integration structurelle et_sociale_des_ressortissants
 
Les outils de Blogger
Les outils de BloggerLes outils de Blogger
Les outils de Blogger
 
Evjf carine V2
Evjf carine V2Evjf carine V2
Evjf carine V2
 
Mother’S Day
Mother’S DayMother’S Day
Mother’S Day
 
Estimulacion temprana_Cynthiallamosalazar
Estimulacion temprana_CynthiallamosalazarEstimulacion temprana_Cynthiallamosalazar
Estimulacion temprana_Cynthiallamosalazar
 

Similar to 2.01 And 2.02

4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...ijccsa
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
 
V mware vdi environment
V mware vdi environmentV mware vdi environment
V mware vdi environmentajitambekar
 
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรSoftware Park Thailand
 
Power point lesson 01
Power point lesson 01Power point lesson 01
Power point lesson 01heidirobison
 
Power point lesson 01
Power point lesson 01Power point lesson 01
Power point lesson 01heidirobison
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking - Mark - Fullbright
 
Lesson 01 introduction to computer
Lesson 01   introduction to computerLesson 01   introduction to computer
Lesson 01 introduction to computerRodz Tech
 

Similar to 2.01 And 2.02 (20)

2 01 Hw
2 01 Hw2 01 Hw
2 01 Hw
 
2 03 Hw
2 03 Hw2 03 Hw
2 03 Hw
 
Technology
TechnologyTechnology
Technology
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
V mware vdi environment
V mware vdi environmentV mware vdi environment
V mware vdi environment
 
Hamza
HamzaHamza
Hamza
 
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
 
Power point lesson 01
Power point lesson 01Power point lesson 01
Power point lesson 01
 
Power point lesson 01
Power point lesson 01Power point lesson 01
Power point lesson 01
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
 
Lesson 01 introduction to computer
Lesson 01   introduction to computerLesson 01   introduction to computer
Lesson 01 introduction to computer
 
It ppt new
It ppt newIt ppt new
It ppt new
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

2.01 And 2.02

  • 1. BCT Section 2.01 Terms Technology Issues 1. Tech & Education Makes Education, Internet, Distance, Learning, Computer-Based Learning, and Simulations possible 2. Tech & Science Artificial Intelligence Genetic, Engineering, Virtual Reality 3. Tech & Work Multinational Economy, Electronic Commerce 4. Technology Careers 1. Business & Office 2. Administrative Assistant 3. Desktop Publisher/Graphic Designer 4. Network Support and Administration 5. PC Support Specialist 6. Manager of Information Systems 7. Database Administrator 8. Software Engineer 9. Web Master 5. Administrative Assistant A secretary is an administrative assistant in business office administration. 6. Graphic Designer someone who specializes in graphic design 7. Network Administrator Network administrator is a modern profession responsible for the maintenance of computer hardware and software that comprises a computer network 8. PC Support Someone who you can call to learn things about a computer ex: how to set up a computer or a printer 9. Web Master a technician who designs or maintains a website 10. Database Administrator A database administrator (DBA) is a person responsible for the design, implementation, maintenance and repair of an organization's database 11. Software Engineer programmer: a person who designs and writes and tests computer programs 12. Computer Crime A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the computer. 13. Computer Fraud Conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. 14. Computer Hacking Involves invading someone else’s computer, usually for personal gain or just the satisfaction of invasion. 15. Theft of Computer Time An employee uses a company’s computer for personal use such as running a small business, keeping records of an outside organization, or keeping personal records.
  • 2. 16. Data Diddling Changing data before it is entered into the computer or after is has been entered into the computer. 17. Computer Virus A virus is a program that has been written to cause corruption of data on a computer. 18. Worm Makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks. 19. Time Bomb Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. 20. Logic Bomb Virus triggered by the appearance or disappearance of specified data. 21. Trojan Horse Virus that does something different from what it is expected to do. 22. Privacy & Security Issues Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold. Information can be gathered from online sources such as schools, banks, hospitals, insurance companies, and many other sources. 23. Security Measures 1. Passwords 2. Electronic Identification Cards 3. Firewalls 4. Antivirus Software 5. Selective Hiring Process