SlideShare a Scribd company logo
1 of 2
BCT Section 2.01 Terms
                          Technology Issues
1. Tech & Education           1.   Education
                              2.   Internet
                              3.   Distance Learning
                              4.   Computer-Based Learning
                              5.   Simulations

2. Tech & Science             1. Artificial Intelligence
                              2. Genetic Engineering
                              3. Virtual Reality


3. Tech & Work                1. Multinational Economy
                              2. Electronic Commerce

4. Technology Careers         1.   Business & Office
                              2.   Administrative Assistant
                              3.   Desktop Publisher/Graphic Designer
                              4.   Network Support and Administration
                              5.   PC Support Specialist
                              6.   Manager of Information Systems
                              7.   Database Administrator
                              8.   Software Engineer
                              9.   Web Master



5. Administrative Assistant   A secretary that organizes things.

6. Graphic Designer           Graphic designers generate the visual presentation and design of
                              goods, including websites, detergent boxes, album covers, and dog
                              food cans.
7. Network Administrator      Network administrator is a modern professional responsible
                              for the maintenance of computer hardware and software that
                              comprises a computer network.
8. PC Support                 Helping people work on their computer.

9. Web Master                 A person responsible for maintaining a website(s).


10. Database Administrator    A person responsible for the design, implementation, maintenance
                              and repair of an organization's database.

11. Software Engineer         A software engineer is in charge of assembling extensive amounts
                              of code into working applications, as well as updating and fixing
                              problems in existing software.
12. Computer Crime            A criminal act committed through the use of a computer. It can also
                              involve the theft of a computer and any equipment associated with the
                              computer.
13. Computer Fraud            Conduct that involves the manipulation of a computer or computer data in order to obtain
                              money, property, or value dishonestly or to cause loss.
nvolves invading someone else’s computer, usually for personal gain or just the satisfaction
14. Computer Hacking            of invasion.


                                An employee uses a company’s computer for personal use such as running a
15. Theft of Computer Time      small business, keeping records of an outside organization, or keeping personal
                                records.
                                Changing data before it is entered into the computer or after is has been entered
16. Data Diddling               into the computer.


17. Computer Virus              A virus is a program that has been written to cause corruption of data on
                                a computer.

                                Makes many copies of itself, resulting in the consumption of system resources that slows
18. Worm                        down or actually halts tasks.


                                Virus that does not cause its damage until a certain date or until the system has been
19. Time Bomb                   booted a certain number of times.


                                - Virus triggered by the appearance or disappearance of specified data.
20. Logic Bomb

                                Virus that does something different from what it is expected to do.
21. Trojan Horse

22. Privacy & Security Issues   Any time you submit information on the Internet, it is possible for the
                                information to be gathered by many persons and used for various
                                situations including being sold. Information can be gathered from online
                                sources such as schools, banks, hospitals, insurance companies, and
                                many other sources.
23. Security Measures           1.   Passwords
                                2.   Electronic Identification Cards
                                3.   Firewalls
                                4.   Antivirus Software
                                5.   Selective Hiring Process

More Related Content

What's hot

Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final21_zaheer
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Online reputation
Online reputationOnline reputation
Online reputationesl2m
 
Name parul
Name parulName parul
Name parulParul231
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityFizaril Amzari Omar
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 

What's hot (19)

2 01 Terms
2 01 Terms2 01 Terms
2 01 Terms
 
Hamza
HamzaHamza
Hamza
 
COmPuter
COmPuterCOmPuter
COmPuter
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Information Security Awareness Session -2020
Information Security Awareness Session -2020Information Security Awareness Session -2020
Information Security Awareness Session -2020
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Computer security
Computer securityComputer security
Computer security
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Name parul
Name parulName parul
Name parul
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
One of 2 protect your business
One of 2 protect your businessOne of 2 protect your business
One of 2 protect your business
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 

Similar to Bct 2 01 Terms

4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...ijccsa
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)ijccsa
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Lesson 01 introduction to computer
Lesson 01   introduction to computerLesson 01   introduction to computer
Lesson 01 introduction to computerRodz Tech
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรSoftware Park Thailand
 

Similar to Bct 2 01 Terms (20)

2 01 Hw
2 01 Hw2 01 Hw
2 01 Hw
 
2 0 Terms
2 0 Terms2 0 Terms
2 0 Terms
 
2 03 Hw
2 03 Hw2 03 Hw
2 03 Hw
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Cyber Law .pdf
Cyber Law .pdfCyber Law .pdf
Cyber Law .pdf
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Technology
TechnologyTechnology
Technology
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Lesson 01 introduction to computer
Lesson 01   introduction to computerLesson 01   introduction to computer
Lesson 01 introduction to computer
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
It ppt new
It ppt newIt ppt new
It ppt new
 
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
 

Bct 2 01 Terms

  • 1. BCT Section 2.01 Terms Technology Issues 1. Tech & Education 1. Education 2. Internet 3. Distance Learning 4. Computer-Based Learning 5. Simulations 2. Tech & Science 1. Artificial Intelligence 2. Genetic Engineering 3. Virtual Reality 3. Tech & Work 1. Multinational Economy 2. Electronic Commerce 4. Technology Careers 1. Business & Office 2. Administrative Assistant 3. Desktop Publisher/Graphic Designer 4. Network Support and Administration 5. PC Support Specialist 6. Manager of Information Systems 7. Database Administrator 8. Software Engineer 9. Web Master 5. Administrative Assistant A secretary that organizes things. 6. Graphic Designer Graphic designers generate the visual presentation and design of goods, including websites, detergent boxes, album covers, and dog food cans. 7. Network Administrator Network administrator is a modern professional responsible for the maintenance of computer hardware and software that comprises a computer network. 8. PC Support Helping people work on their computer. 9. Web Master A person responsible for maintaining a website(s). 10. Database Administrator A person responsible for the design, implementation, maintenance and repair of an organization's database. 11. Software Engineer A software engineer is in charge of assembling extensive amounts of code into working applications, as well as updating and fixing problems in existing software. 12. Computer Crime A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the computer. 13. Computer Fraud Conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss.
  • 2. nvolves invading someone else’s computer, usually for personal gain or just the satisfaction 14. Computer Hacking of invasion. An employee uses a company’s computer for personal use such as running a 15. Theft of Computer Time small business, keeping records of an outside organization, or keeping personal records. Changing data before it is entered into the computer or after is has been entered 16. Data Diddling into the computer. 17. Computer Virus A virus is a program that has been written to cause corruption of data on a computer. Makes many copies of itself, resulting in the consumption of system resources that slows 18. Worm down or actually halts tasks. Virus that does not cause its damage until a certain date or until the system has been 19. Time Bomb booted a certain number of times. - Virus triggered by the appearance or disappearance of specified data. 20. Logic Bomb Virus that does something different from what it is expected to do. 21. Trojan Horse 22. Privacy & Security Issues Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold. Information can be gathered from online sources such as schools, banks, hospitals, insurance companies, and many other sources. 23. Security Measures 1. Passwords 2. Electronic Identification Cards 3. Firewalls 4. Antivirus Software 5. Selective Hiring Process