SlideShare a Scribd company logo
BCT Section 2.01 Terms
                          Technology Issues
1. Tech & Education           The use of technology in education

2. Tech & Science             The use of technology in science

3. Tech & Work                The use of technology in work

4. Technology Careers         Careers that involve working with technology

5. Administrative Assistant   A person hired to aid an executive by coordinating
                              such office services and procedures
6. Graphic Designer           The practice or profession of designing of print or
                              electronic forms of visual information.
7. Network Administrator      A person who manages a communication network
                              within an organization
8. PC Support                 A person who works with minicomputer applications

9. Web Master                 A person who designs or maintains a website

10. Database Administrator    A person responsible for the design and management
                              of one or more databases
11. Software Engineer         A person who designs and writes and tests computer
                              programs
12. Computer Crime            Crimes committed with the use of computers

13. Computer Fraud            Conduct that involves the manipulation of a computer
                              or computer data
14. Computer Hacking          Involves invading someone else’s computer

15. Theft of Computer Time    An employee uses a company’s computer for personal
                              use
16. Data Diddling             Changing data before it is entered into the computer
                              or after it has been entered into the computer
17. Computer Virus            A virus is a program that has been written to cause
                              corruption of data on a computer.
18. Worm                      Virus that makes many copies of it’s self resulting in
                              the consumption of system resources that slows down
                              or actually halts tasks.
19. Time Bomb                   Virus that does not cause its damage until a certain
                                date or until the system has been booted a certain
                                number of times.
20. Logic Bomb                  Virus triggered by the appearance or disappearance of
                                specified data.
21. Trojan Horse                Virus that does something different from what it is
                                expected to do. That hides in other files.
22. Privacy & Security Issues   Any time you submit information on the Internet, it is
                                possible for the information to be gathered by many
                                persons and used for various situations including being
                                sold
23. Security Measures           Passwords, fire walls, anti virus software

More Related Content

DOC
2 01 Hw
DOC
Bct 2 01 Terms
DOC
2 01 Hw
DOC
2 01 Bct Terms
DOC
2 01 Hw
DOC
2.01 And 2.02
DOC
2 01 And 2 02 terms
DOC
2 01 Terms
2 01 Hw
Bct 2 01 Terms
2 01 Hw
2 01 Bct Terms
2 01 Hw
2.01 And 2.02
2 01 And 2 02 terms
2 01 Terms

What's hot (17)

DOC
2 01 Hw
PPTX
Cybersecurity
PPTX
Information Security Awareness, Petronas Marketing Sudan
PPTX
Threats to Information Resources - MIS - Shimna
PDF
Network security
PPTX
ICT and end user security awareness slides
PPTX
Enterprise Security and Cyber Security Cases
PPT
SYSTEM SECURITY - Chapter 1 introduction
DOCX
CLASS VII COMPUTER SECURITY
PDF
What is Network Security?
PPTX
Cyber-savvy Cyber-safety
PPT
1 security goals
PPT
Cyber security
PPT
Network security desighn principles and authentication
PPTX
Network basic security
PDF
Covid 19 guide how to secure your data while working away from office
PPTX
Cyber security
2 01 Hw
Cybersecurity
Information Security Awareness, Petronas Marketing Sudan
Threats to Information Resources - MIS - Shimna
Network security
ICT and end user security awareness slides
Enterprise Security and Cyber Security Cases
SYSTEM SECURITY - Chapter 1 introduction
CLASS VII COMPUTER SECURITY
What is Network Security?
Cyber-savvy Cyber-safety
1 security goals
Cyber security
Network security desighn principles and authentication
Network basic security
Covid 19 guide how to secure your data while working away from office
Cyber security
Ad

Viewers also liked (17)

PPTX
Calzado deportivos
PPTX
Virus informatico
PPTX
Presentasi page 1
PPT
Presentacion final sep
PPTX
karina garcia
PDF
Documento 1.pdf juan manuel.pd fpayan
PPTX
Education Informational
PPT
Requisitos Del Aprendj Significativo
PDF
SIMPLEX VOLUME ANALYSIS BASED ON TRIANGULAR FACTORIZATION: A FRAMEWORK FOR HY...
PPTX
Karina 3
PDF
Imagen1 penal.4
PDF
ענת רפואה מכחישה הטסות קופים באל על
PPTX
POWERPOINT
PPTX
Herramientas de word utilizadas
PPTX
Planestic
PDF
שינוי מטרות עמותת תנו לחיות לחיות מאי 2012
Calzado deportivos
Virus informatico
Presentasi page 1
Presentacion final sep
karina garcia
Documento 1.pdf juan manuel.pd fpayan
Education Informational
Requisitos Del Aprendj Significativo
SIMPLEX VOLUME ANALYSIS BASED ON TRIANGULAR FACTORIZATION: A FRAMEWORK FOR HY...
Karina 3
Imagen1 penal.4
ענת רפואה מכחישה הטסות קופים באל על
POWERPOINT
Herramientas de word utilizadas
Planestic
שינוי מטרות עמותת תנו לחיות לחיות מאי 2012
Ad

Similar to 2 0 Terms (20)

DOC
2 01 Terms Technology Issues
DOC
2 01 Hw
DOC
2 01 Hw Finished
PPT
3.2.1 computer security risks
PPTX
4.2.1 computer security risks
PPTX
It ppt new
PPT
dataprivacyactof2012r-180802030546sada.ppt
PPTX
Technology
PPTX
DOCX
PART I. glaiza may oroceo yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy...
PDF
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
DOC
PDF
Watch Guard Reputation Enabled Defense (White Paper)Dna
PDF
Across Down 1- Duplicate that can be used if the original is lost- dam.pdf
PPTX
Presentation1_CYBERCRIME.pptx
PPTX
2014CyberSecurityProject
PPT
Lecture 3
PPTX
Cyber Crime
PPTX
Computer security and privacy
PPTX
104- HCSCA108 Common Server Types and Threats based on issue 1.00.pptx
2 01 Terms Technology Issues
2 01 Hw
2 01 Hw Finished
3.2.1 computer security risks
4.2.1 computer security risks
It ppt new
dataprivacyactof2012r-180802030546sada.ppt
Technology
PART I. glaiza may oroceo yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy...
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
Watch Guard Reputation Enabled Defense (White Paper)Dna
Across Down 1- Duplicate that can be used if the original is lost- dam.pdf
Presentation1_CYBERCRIME.pptx
2014CyberSecurityProject
Lecture 3
Cyber Crime
Computer security and privacy
104- HCSCA108 Common Server Types and Threats based on issue 1.00.pptx

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Mushroom cultivation and it's methods.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
A Presentation on Touch Screen Technology
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
project resource management chapter-09.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
August Patch Tuesday
Programs and apps: productivity, graphics, security and other tools
MIND Revenue Release Quarter 2 2025 Press Release
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Mushroom cultivation and it's methods.pdf
1 - Historical Antecedents, Social Consideration.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Group 1 Presentation -Planning and Decision Making .pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
DP Operators-handbook-extract for the Mautical Institute
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Unlocking AI with Model Context Protocol (MCP)
A Presentation on Touch Screen Technology
cloud_computing_Infrastucture_as_cloud_p
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Digital-Transformation-Roadmap-for-Companies.pptx
project resource management chapter-09.pdf
Approach and Philosophy of On baking technology
Zenith AI: Advanced Artificial Intelligence
August Patch Tuesday

2 0 Terms

  • 1. BCT Section 2.01 Terms Technology Issues 1. Tech & Education The use of technology in education 2. Tech & Science The use of technology in science 3. Tech & Work The use of technology in work 4. Technology Careers Careers that involve working with technology 5. Administrative Assistant A person hired to aid an executive by coordinating such office services and procedures 6. Graphic Designer The practice or profession of designing of print or electronic forms of visual information. 7. Network Administrator A person who manages a communication network within an organization 8. PC Support A person who works with minicomputer applications 9. Web Master A person who designs or maintains a website 10. Database Administrator A person responsible for the design and management of one or more databases 11. Software Engineer A person who designs and writes and tests computer programs 12. Computer Crime Crimes committed with the use of computers 13. Computer Fraud Conduct that involves the manipulation of a computer or computer data 14. Computer Hacking Involves invading someone else’s computer 15. Theft of Computer Time An employee uses a company’s computer for personal use 16. Data Diddling Changing data before it is entered into the computer or after it has been entered into the computer 17. Computer Virus A virus is a program that has been written to cause corruption of data on a computer. 18. Worm Virus that makes many copies of it’s self resulting in the consumption of system resources that slows down or actually halts tasks.
  • 2. 19. Time Bomb Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. 20. Logic Bomb Virus triggered by the appearance or disappearance of specified data. 21. Trojan Horse Virus that does something different from what it is expected to do. That hides in other files. 22. Privacy & Security Issues Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold 23. Security Measures Passwords, fire walls, anti virus software