SlideShare a Scribd company logo
BCT Section 2.01 Terms
                          Technology Issues
1. Tech & Education           is a study of technology, which provides an
                              opportunity for students to learn about the
                              processes and knowledge related to technology
2. Tech & Science             1. Artificial Intelligence
                              2. Genetic Engineering
                              3. Virtual Reality

3. Tech & Work                1. Multinational Economy
                              2. Electronic Commerce

4. Technology Careers         1.   Business & Office
                              2.   Administrative Assistant
                              3.   Desktop Publisher/Graphic Designer
                              4.   Network Support and Administration
                              5.   PC Support Specialist
                              6.   Manager of Information Systems
                              7.   Database Administrator
                              8.   Software Engineer
                              9.   Web Master

5. Administrative Assistant   A secretary is an administrative assistant in
                              business office administration
6. Graphic Designer           someone who specializes in graphic design

7. Network Administrator      Network administrator is a modern profession
                              responsible for the maintenance of computer
                              hardware and software that comprises a
                              computer network.
8. PC Support                 Support for file transfer and terminal emulation
                              between a PC and Multics. Feature in MR11.0?
                              See MOWSE.
9. Web Master                 A webmaster (portmanteau of web and
                              postmaster), also called a web architect, web
                              developer, site author, website administrator.
10. Database Administrator     database administrator (DBA) is a person
                              responsible for the design, implementation,
                              maintenance and repair of an organization's
                              database.
11. Software Engineer         programmer: a person who designs and writes
                              and tests computer programs
12. Computer Crime              Computer crime issues have become high-
                                profile, particularly those surrounding hacking,
                                copyright infringement through warez.. etc.
13. Computer Fraud              A fraud committed with the aid of, or directly
                                involving, a data processing system or network
14. Computer Hacking            In computing, a hacker is a person in one of
                                several distinct (but not completely disjoint)
                                communities and subcultures).
15. Theft of Computer Time      An employee uses a company’s computer for
                                personal use such as running a small business,
                                keeping records of an outside organization, or
                                keeping personal records.
16. Data Diddling               Changing data before it is entered into the
                                computer or after is has been entered into the
                                computer.
17. Computer Virus              A virus is a program that has been written to
                                cause corruption of data on a computer.
18. Worm                        Makes many copies of itself, resulting in the
                                consumption of system resources that slows
                                down or actually halts tasks.
19. Time Bomb                   Virus that does not cause its damage until a
                                certain date or until the system has been booted
                                a certain number of times.
20. Logic Bomb                  Virus    triggered    by    the   appearance   or
                                disappearance of specified data.
21. Trojan Horse                 Virus that does something different from what it
                                is expected to do.
22. Privacy & Security Issues   Any time you submit information on the Internet,
                                it is possible for the information to be gathered
                                by many persons and used for various situations
                                including being sold. Information can be
                                gathered from online sources such as schools,
                                banks, hospitals, insurance companies, and
                                many other sources.
23. Security Measures           1. Passwords
                                2. Electronic Identification Cards
                                3. Firewalls
                                4. Antivirus Software
                                5. Selective Hiring Process

More Related Content

DOC
2 01 Hw
DOC
2.01 And 2.02
DOC
2 01 Hw Finished
DOC
Bct 2 01 Terms
DOC
2 01 And 2 02 terms
DOC
2 01 Hw
DOC
2 01 Bct Terms
DOC
2 01 Hw
2 01 Hw
2.01 And 2.02
2 01 Hw Finished
Bct 2 01 Terms
2 01 And 2 02 terms
2 01 Hw
2 01 Bct Terms
2 01 Hw

What's hot (20)

DOC
2 01 Terms
PDF
Computer Security and Safety, Ethics & Privacy
PPTX
PDF
Type of Security Threats and its Prevention
PPTX
cyber_security
DOCX
Kent philip neri (lab 2)
DOCX
Kent philip neri (lab 2)
PPTX
CH. 5 Computer Security and Safety, Ethics and Privacy
PPTX
One of 2 protect your business
PPTX
DOCX
Markbrakent war
DOCX
Kent philipneri
PDF
Cybersecurity Employee Training
PDF
001 ho basic computer
PDF
Cyber Security Awareness
PPTX
Computer Security and Ethics
DOC
Computer security and_privacy
PDF
Chapter 4 Computer Science :: Computer Ethics and Security
PPTX
Discovering Computers: Chapter 11
PPTX
Information Security Awareness Session -2020
2 01 Terms
Computer Security and Safety, Ethics & Privacy
Type of Security Threats and its Prevention
cyber_security
Kent philip neri (lab 2)
Kent philip neri (lab 2)
CH. 5 Computer Security and Safety, Ethics and Privacy
One of 2 protect your business
Markbrakent war
Kent philipneri
Cybersecurity Employee Training
001 ho basic computer
Cyber Security Awareness
Computer Security and Ethics
Computer security and_privacy
Chapter 4 Computer Science :: Computer Ethics and Security
Discovering Computers: Chapter 11
Information Security Awareness Session -2020
Ad

Similar to 2 01 Terms Technology Issues (20)

DOC
2 01 Hw
DOC
2 0 Terms
DOC
2 03 Hw
DOC
PPTX
It ppt new
PPTX
4.2.1 computer security risks
PPT
3.2.1 computer security risks
PPT
I.T Security Threats
PDF
Web security 2012
DOCX
Phone hack
DOCX
PPTX
2014CyberSecurityProject
PDF
Email hacker
PDF
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
PDF
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
DOCX
PART I. glaiza may oroceo yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy...
PDF
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
PPTX
Chapter 3_Cyber Security-ccdf.pptx
PDF
The Basics of Protecting Against Computer Hacking
PPTX
vyber security on different fields bullying .pptx
2 01 Hw
2 0 Terms
2 03 Hw
It ppt new
4.2.1 computer security risks
3.2.1 computer security risks
I.T Security Threats
Web security 2012
Phone hack
2014CyberSecurityProject
Email hacker
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
PART I. glaiza may oroceo yyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyyy...
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
Chapter 3_Cyber Security-ccdf.pptx
The Basics of Protecting Against Computer Hacking
vyber security on different fields bullying .pptx
Ad

More from erikabonati (8)

DOC
Searching Quest Web3
DOC
2 03&2 04 Hw
DOC
2 03&2 04 Hw
DOC
Bct Terms 1 3 (2)
DOC
Bct Terms 1 3 (2)
DOC
Bct Terms 1 3 (2)
DOC
BCT Section 1.3 & 1.4 Terms
PPT
Erika Bonati Sections 1.3 Project 3
Searching Quest Web3
2 03&2 04 Hw
2 03&2 04 Hw
Bct Terms 1 3 (2)
Bct Terms 1 3 (2)
Bct Terms 1 3 (2)
BCT Section 1.3 & 1.4 Terms
Erika Bonati Sections 1.3 Project 3

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Electronic commerce courselecture one. Pdf
Big Data Technologies - Introduction.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Review of recent advances in non-invasive hemoglobin estimation
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
sap open course for s4hana steps from ECC to s4
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Unlocking AI with Model Context Protocol (MCP)
Reach Out and Touch Someone: Haptics and Empathic Computing
MYSQL Presentation for SQL database connectivity
Advanced methodologies resolving dimensionality complications for autism neur...
Building Integrated photovoltaic BIPV_UPV.pdf
The AUB Centre for AI in Media Proposal.docx
Machine learning based COVID-19 study performance prediction
Per capita expenditure prediction using model stacking based on satellite ima...
20250228 LYD VKU AI Blended-Learning.pptx
Programs and apps: productivity, graphics, security and other tools
Spectral efficient network and resource selection model in 5G networks
Electronic commerce courselecture one. Pdf

2 01 Terms Technology Issues

  • 1. BCT Section 2.01 Terms Technology Issues 1. Tech & Education is a study of technology, which provides an opportunity for students to learn about the processes and knowledge related to technology 2. Tech & Science 1. Artificial Intelligence 2. Genetic Engineering 3. Virtual Reality 3. Tech & Work 1. Multinational Economy 2. Electronic Commerce 4. Technology Careers 1. Business & Office 2. Administrative Assistant 3. Desktop Publisher/Graphic Designer 4. Network Support and Administration 5. PC Support Specialist 6. Manager of Information Systems 7. Database Administrator 8. Software Engineer 9. Web Master 5. Administrative Assistant A secretary is an administrative assistant in business office administration 6. Graphic Designer someone who specializes in graphic design 7. Network Administrator Network administrator is a modern profession responsible for the maintenance of computer hardware and software that comprises a computer network. 8. PC Support Support for file transfer and terminal emulation between a PC and Multics. Feature in MR11.0? See MOWSE. 9. Web Master A webmaster (portmanteau of web and postmaster), also called a web architect, web developer, site author, website administrator. 10. Database Administrator database administrator (DBA) is a person responsible for the design, implementation, maintenance and repair of an organization's database. 11. Software Engineer programmer: a person who designs and writes and tests computer programs
  • 2. 12. Computer Crime Computer crime issues have become high- profile, particularly those surrounding hacking, copyright infringement through warez.. etc. 13. Computer Fraud A fraud committed with the aid of, or directly involving, a data processing system or network 14. Computer Hacking In computing, a hacker is a person in one of several distinct (but not completely disjoint) communities and subcultures). 15. Theft of Computer Time An employee uses a company’s computer for personal use such as running a small business, keeping records of an outside organization, or keeping personal records. 16. Data Diddling Changing data before it is entered into the computer or after is has been entered into the computer. 17. Computer Virus A virus is a program that has been written to cause corruption of data on a computer. 18. Worm Makes many copies of itself, resulting in the consumption of system resources that slows down or actually halts tasks. 19. Time Bomb Virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. 20. Logic Bomb Virus triggered by the appearance or disappearance of specified data. 21. Trojan Horse Virus that does something different from what it is expected to do. 22. Privacy & Security Issues Any time you submit information on the Internet, it is possible for the information to be gathered by many persons and used for various situations including being sold. Information can be gathered from online sources such as schools, banks, hospitals, insurance companies, and many other sources. 23. Security Measures 1. Passwords 2. Electronic Identification Cards 3. Firewalls 4. Antivirus Software 5. Selective Hiring Process