1. BCT Section 2.01 Terms
Technology Issues
1. Tech & Education 1. Education
2. Internet
3. Distance Learning
4. Computer-Based Learning
5. Simulations
2. Tech & Science 1. Artificial Intelligence
2. Genetic Engineering
3. Virtual Reality
3. Tech & Work 1. Multinational Economy
2. Electronic Commerce
4. Technology Careers 1. Business & Office
2. Administrative Assistant
3. Desktop Publisher/Graphic Designer
4. Network Support and Administration
5. PC Support Specialist
6. Manager of Information Systems
7. Database Administrator
8. Software Engineer
9. Web Master
5. Administrative Assistant A secretary that organizes things.
6. Graphic Designer Graphic designers generate the visual presentation and design of
goods, including websites, detergent boxes, album covers, and dog
food cans.
7. Network Administrator Network administrator is a modern professional responsible
for the maintenance of computer hardware and software that
comprises a computer network.
8. PC Support Helping people work on their computer.
9. Web Master A person responsible for maintaining a website(s).
10. Database Administrator A person responsible for the design, implementation, maintenance
and repair of an organization's database.
11. Software Engineer A software engineer is in charge of assembling extensive amounts
of code into working applications, as well as updating and fixing
problems in existing software.
12. Computer Crime A criminal act committed through the use of a computer. It can also
involve the theft of a computer and any equipment associated with the
computer.
13. Computer Fraud Conduct that involves the manipulation of a computer or computer data in order to obtain
money, property, or value dishonestly or to cause loss.
2. nvolves invading someone else’s computer, usually for personal gain or just the satisfaction
14. Computer Hacking of invasion.
An employee uses a company’s computer for personal use such as running a
15. Theft of Computer Time small business, keeping records of an outside organization, or keeping personal
records.
Changing data before it is entered into the computer or after is has been entered
16. Data Diddling into the computer.
17. Computer Virus A virus is a program that has been written to cause corruption of data on
a computer.
Makes many copies of itself, resulting in the consumption of system resources that slows
18. Worm down or actually halts tasks.
Virus that does not cause its damage until a certain date or until the system has been
19. Time Bomb booted a certain number of times.
- Virus triggered by the appearance or disappearance of specified data.
20. Logic Bomb
Virus that does something different from what it is expected to do.
21. Trojan Horse
22. Privacy & Security Issues Any time you submit information on the Internet, it is possible for the
information to be gathered by many persons and used for various
situations including being sold. Information can be gathered from online
sources such as schools, banks, hospitals, insurance companies, and
many other sources.
23. Security Measures 1. Passwords
2. Electronic Identification Cards
3. Firewalls
4. Antivirus Software
5. Selective Hiring Process