1. Know the difference between Off shoring and Outsourcing-Given in an example:**Outsourcing is a business’ use of an outside company to take over portions of its workload.Spam Filtering: Email; Spam Filtering (Email filtering) is the processing of e-mail to organize it according to specified criteria. Most often this refers to the automatic processing of incoming messages, but the term also applies to the intervention of human intelligence in addition to anti-spam techniques, and to outgoing emails as well as those being received. Surveilence: Observing People; controlled surveillance technologies combined with ubiquitous networks and powerful information processing systems have made it possible to gather huge quantities of information, video, audio, and communications signals and process them to reveal personal information.3. What is the study of Ethics?-deals with what is generally considered right or wrong in regards to computer use.-personal computer ethics are highly subjective except in issues of local, state, and federal law, where ethical issues are clearly defined-Professional computer ethics involve the ethical issues faced by professionals in their use of computer systems as part of their jobs.-Governmental computer ethics include the added responsibility of guiding the influence of technology on the population.4. What is Globalization?-refers to changes in societies and the world economy resulting from dramatically increased international trade and cultural exchange. The largest contributors to globalization are computers, a global telecommunication infrastructure, and the Internet.Make our products worldwide. Putting a restaurant in Shanga5. Know that blogs, v-logs, and podcasts are consumer generated medias. Mainstream media example: CNN news6. Be aware of the issues concerning censorship and electronic surveillance on the internet.-Computer-controlled surveillance technologies combined with ubiquitous networks and powerful information processing systems have made it possible to gather huge quantities of information, video, audio, and communications signals and process them to reveal personal information. National Security vs. Civil Rights-Censorship: is when a government or authority controls speech and other forms of expression.7. What is a Zombie Computer?- computer used for hacking, immoral access. A computer that carries out actions (often malicious) under the remote control of a hacker either directly or through spyware or a virus is called a zombie computer8. Know these terms: Virus, firewall, Spyware, and Worm.-Virus/Worm: Malware… malicious softwareSpyware: Advertises information and sends them elsewhere… is software installed on a computer without the user’s knowledge to either monitor the user or allow an outside party to control the computer.Firewall: is network hardware and software that examines all incoming data packets and filters out ones that are potentially dangerous.Virus is a program that attaches itself to a file, spreads to other files, and delivers a destructive action called a payload.Worm: does not attach itself to other files but rather acts as a free agent, replicating itself numerous times in an effort to overwhelm systems.9. Know some of the causes of Carpal Tunnel Syndrome (Keyboard use for example)- excessive keyboard use; is the aggravation of the pathway for nerves that travel through the wrist. Keyboard use excessive typingExcessive computer use can lead to stress, and addiction.10. What are phishing scamsAn email someone sends you to long into somewhere to get information like you sign in. combines both spoofed e-mail and a spoofed Web site in order to trick a person into providing private information.11. Know the difference between a firewall , popup blocker, and spywareFirewall: is network hardware and software that examines all incoming data packets and filters out ones that are potentially dangerous.Popup Blocker: prevents unwanted popups or adsSpyware: is software installed on a computer without the user’s knowledge to either monitor the user or allow an outside party to control the computer.12. What security levels are available on wifi networks and what the default settings are?High, medium, or none at all. NONE AT ALL.13. What is “War Driving” in reference to wireless networks?Driving around looking for a wireless connection14. Know routine safeguards for protection against data destroyed by malicious software and hacking attempts.Good password, antispyware, antispam, update computer, operating system up to date, don’t go to bad websites15. What is encryption?-Encryption uses high-level math functions and computer algorithms to encode data. Mathematical formula Encryption is a security technique that uses high-level mathematical functions and computer algorithms to encode data so that it is unintelligible to all but the intended recipient. Data stored on a PC can be encrypted and set so that a second password is required to decrypt it.16. How does biometrics work and how can they be used to secure computers.Using some form of your fingerprint, voice, retinal scan, footprint. It is the science and technology of authentication by scanning and measuring a person’s unique physical features such as fingerprints, retinal patterns, and facial characteristics.17. How to select a safe password.-strong by including words that are unrelated to your interests, and include upper and lowercase letters, numbers, and symbols-unique – don’t use the same password for your bank account as you do for your email account-changed regularly – change your password twice a year18. Ethics and laws concerning sharing of MP3 and other copyright material.If i download a bootleg and use it for personal use is it against the law? Yes. If I make a copy of a videogame, its against the law19. Read about Security Holes, Software Patches, and Cryptography-Security holes are software bugs that allow violations of information security.-Software patches are corrections to the software bugs that cause security holes.Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and is the practice and study of hiding information20. What is considered intellectual property?A patent v. copy right, trade secret-refers to a
View Full Document