SlideShare uma empresa Scribd logo
1 de 2
BCT Section 2.01 Terms
                          Technology Issues
1. Tech & Education           Education, internet, simulations, distance learning,
                              computer based learning.
2. Tech & Science             Artificial intelligence, genetic engineering, virtual
                              reality.
3. Tech & Work                Multinational economy,

4. Technology Careers         A career that has to do with technology.

5. Administrative Assistant   Helps the administrator with certain tasks and is the
                              backup to the administrator him/herself.
6. Graphic Designer           A profession that involves designing graphical
                              animations for consumers like other companies.
7. Network Administrator      Someone who is in charge of a specific network.

8. PC Support                 A company or any kind of information that helps you
                              with problems that come up on your computer.
9. Web Master                 Person responsible for maintaining a website.

10. Database Administrator    Responsible for an organization’s database.

11. Software Engineer         Develops, creates, and edits the design of software.

12. Computer Crime            When something dealing with

13. Computer Fraud            The manipulation of the computer or computer data.

14. Computer Hacking          When your computer is broken into and personal
                              information from the computer is accessed.
15. Theft of Computer Time    An employee using a work computer for their own
                              personal use.
16. Data Diddling             Changing data before it is entered into the computer.

17. Computer Virus            A threat to your computer that can do multiple
                              harmful things to effect your computers performance.
18. Worm                      A virus that makes copies of its self at slows down the
                              computers performance by taking away certain
                              resources.
19. Time Bomb                   A virus that goes off at a specific time or data.

20. Logic Bomb                  A virus or threat that goes off when you open up
                                specific data or information.
21. Trojan Horse                A virus that does something different than what it is
                                expected to do.
22. Privacy & Security Issues   Any time you insert data into the internet there is a
                                possibility that it could be gathered by another person.
23. Security Measures           Passwords, electronic identification cards, firewalls,
                                anti virus software, and selective hiring process.

Mais conteúdo relacionado

Mais procurados

2 01 Hw Finished
2 01 Hw Finished2 01 Hw Finished
2 01 Hw Finished
TerminatorV
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
Samudin Kassan
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
malik1972
 

Mais procurados (19)

2 0 Terms
2 0 Terms2 0 Terms
2 0 Terms
 
2 01 Hw Finished
2 01 Hw Finished2 01 Hw Finished
2 01 Hw Finished
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Information Security Awareness Session -2020
Information Security Awareness Session -2020Information Security Awareness Session -2020
Information Security Awareness Session -2020
 
Internet of things: dispelling common myths
Internet of things: dispelling common myths Internet of things: dispelling common myths
Internet of things: dispelling common myths
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Krishna cyber safety
Krishna cyber safetyKrishna cyber safety
Krishna cyber safety
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
 
COmPuter
COmPuterCOmPuter
COmPuter
 

Destaque (8)

The Internet N U
The Internet N UThe Internet N U
The Internet N U
 
Tech Terms
Tech TermsTech Terms
Tech Terms
 
THE INTERNET 101
THE INTERNET 101 THE INTERNET 101
THE INTERNET 101
 
Tech terms
Tech termsTech terms
Tech terms
 
Ip address
Ip addressIp address
Ip address
 
About ip address
About ip addressAbout ip address
About ip address
 
Internet Terms and Definitions
Internet Terms and DefinitionsInternet Terms and Definitions
Internet Terms and Definitions
 
25 Internet Terms YSK - Color
25 Internet Terms YSK - Color25 Internet Terms YSK - Color
25 Internet Terms YSK - Color
 

Semelhante a 2 01 Terms

3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
hazirma
 
The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security
NCC Group
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
hazirma
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
Kaley Hair
 

Semelhante a 2 01 Terms (20)

2 01 Hw
2 01 Hw2 01 Hw
2 01 Hw
 
2 03 Hw
2 03 Hw2 03 Hw
2 03 Hw
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security The Mobile Internet of Things and Cyber Security
The Mobile Internet of Things and Cyber Security
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Presentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptxPresentation1_CYBERCRIME.pptx
Presentation1_CYBERCRIME.pptx
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
Hamza
HamzaHamza
Hamza
 
The Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A PrimerThe Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A Primer
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
SecTor '09 - When Web 2.0 Attacks!
SecTor '09 - When Web 2.0 Attacks!SecTor '09 - When Web 2.0 Attacks!
SecTor '09 - When Web 2.0 Attacks!
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Mais de Aaron Vrba

Mais de Aaron Vrba (11)

2 03 Terms
2 03 Terms2 03 Terms
2 03 Terms
 
Web Quest #2
Web Quest #2Web Quest #2
Web Quest #2
 
Web Quest Assignment #1
Web Quest Assignment #1Web Quest Assignment #1
Web Quest Assignment #1
 
Bct 1 3 Terms
Bct 1 3 TermsBct 1 3 Terms
Bct 1 3 Terms
 
Bct Section 1 2 Terms
Bct Section 1 2 TermsBct Section 1 2 Terms
Bct Section 1 2 Terms
 
The U
The UThe U
The U
 
Sales manager Chick Fil A
Sales manager Chick Fil ASales manager Chick Fil A
Sales manager Chick Fil A
 
Subway
SubwaySubway
Subway
 
Make your own business
Make your own businessMake your own business
Make your own business
 
Bill G
Bill GBill G
Bill G
 
Russia
RussiaRussia
Russia
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

2 01 Terms

  • 1. BCT Section 2.01 Terms Technology Issues 1. Tech & Education Education, internet, simulations, distance learning, computer based learning. 2. Tech & Science Artificial intelligence, genetic engineering, virtual reality. 3. Tech & Work Multinational economy, 4. Technology Careers A career that has to do with technology. 5. Administrative Assistant Helps the administrator with certain tasks and is the backup to the administrator him/herself. 6. Graphic Designer A profession that involves designing graphical animations for consumers like other companies. 7. Network Administrator Someone who is in charge of a specific network. 8. PC Support A company or any kind of information that helps you with problems that come up on your computer. 9. Web Master Person responsible for maintaining a website. 10. Database Administrator Responsible for an organization’s database. 11. Software Engineer Develops, creates, and edits the design of software. 12. Computer Crime When something dealing with 13. Computer Fraud The manipulation of the computer or computer data. 14. Computer Hacking When your computer is broken into and personal information from the computer is accessed. 15. Theft of Computer Time An employee using a work computer for their own personal use. 16. Data Diddling Changing data before it is entered into the computer. 17. Computer Virus A threat to your computer that can do multiple harmful things to effect your computers performance. 18. Worm A virus that makes copies of its self at slows down the computers performance by taking away certain resources.
  • 2. 19. Time Bomb A virus that goes off at a specific time or data. 20. Logic Bomb A virus or threat that goes off when you open up specific data or information. 21. Trojan Horse A virus that does something different than what it is expected to do. 22. Privacy & Security Issues Any time you insert data into the internet there is a possibility that it could be gathered by another person. 23. Security Measures Passwords, electronic identification cards, firewalls, anti virus software, and selective hiring process.