Unformatted text preview:

07 15 2010 1 Know the difference between Off shoring and Outsourcing Given in an example Outsourcing is a business use of an outside company to take over portions of its workload Offshoring is a business practice that relocates an entire production line to another location typically in another country in order to enjoy cheaper labor lower taxes and other forms of lower overhead Nike entire production line overseas 2 Know what Content Filtering software Spam Filtering and Surveillance Software are Content Filtering Filtering you from seeing information they do not want you to see works with the Web browser to check each Web site for indecent materials defined by the installer of the software and only allows decent Web pages to be displayed prevent you from seeing information parents don t want Spam Filtering Email Spam Filtering Email filtering is the processing of e mail to organize it according to specified criteria Most often this refers to the automatic processing of incoming messages but the term also applies to the intervention of human intelligence in addition to anti spam techniques and to outgoing emails as well as those being received Surveilence Observing People controlled surveillance technologies combined with ubiquitous networks and powerful information processing systems have made it possible to gather huge quantities of information video audio and communications signals and process them to reveal personal information 3 What is the study of Ethics deals with what is generally considered right or wrong in regards to computer use personal computer ethics are highly subjective except in issues of local state and federal law where ethical issues are clearly defined Professional computer ethics involve the ethical issues faced by professionals in their use of computer systems as part of their jobs Governmental computer ethics include the added responsibility of guiding the influence of technology on the population 4 What is Globalization refers to changes in societies and the world economy resulting from dramatically increased international trade and cultural exchange The largest contributors to globalization are computers a global telecommunication infrastructure and the Internet Make our products worldwide Putting a restaurant in Shanga 5 Know that blogs v logs and podcasts are consumer generated medias Mainstream media example CNN news 6 Be aware of the issues concerning censorship and electronic surveillance on the internet Computer controlled surveillance technologies combined with ubiquitous networks and powerful information processing systems have made it possible to gather huge quantities of information video audio and communications signals and process them to reveal personal information National Security vs Civil Rights Censorship is when a government or authority controls speech and other forms of expression 7 What is a Zombie Computer computer used for hacking immoral access A computer that carries out actions often malicious under the remote control of a hacker either directly or through spyware or a virus is called a zombie computer 8 Know these terms Virus firewall Spyware and Worm Virus Worm Malware malicious software Spyware Advertises information and sends them elsewhere is software installed on a computer without the user s knowledge to either monitor the user or allow an outside party to control the computer Firewall is network hardware and software that examines all incoming data packets and filters out ones that are potentially dangerous Virus is a program that attaches itself to a file spreads to other files and delivers a destructive action called a payload Worm does not attach itself to other files but rather acts as a free agent replicating itself numerous times in an effort to overwhelm systems 9 Know some of the causes of Carpal Tunnel Syndrome Keyboard use for example excessive keyboard use is the aggravation of the pathway for nerves that travel through the wrist Keyboard use excessive typing Excessive computer use can lead to stress and addiction 10 What are phishing scams An email someone sends you to long into somewhere to get information like you sign in combines both spoofed e mail and a spoofed Web site in order to trick a person into providing private information 11 Know the difference between a firewall popup blocker and spyware Firewall is network hardware and software that examines all incoming data packets and filters out ones that are potentially dangerous Popup Blocker prevents unwanted popups or ads Spyware is software installed on a computer without the user s knowledge to either monitor the user or allow an outside party to control the computer 12 What security levels are available on wifi networks and what the default settings are High medium or none at all NONE AT ALL 13 What is War Driving in reference to wireless networks Driving around looking for a wireless connection 14 Know routine safeguards for protection against data destroyed by malicious software and hacking attempts Good password antispyware antispam update computer operating system up to date don t go to bad websites 15 What is encryption Encryption uses high level math functions and computer algorithms to encode data Mathematical formula Encryption is a security technique that uses high level mathematical functions and computer algorithms to encode data so that it is unintelligible to all but the intended recipient Data stored on a PC can be encrypted and set so that a second password is required to decrypt it 16 How does biometrics work and how can they be used to secure computers Using some form of your fingerprint voice retinal scan footprint It is the science and technology of authentication by scanning and measuring a person s unique physical features such as fingerprints retinal patterns and facial characteristics 17 How to select a safe password strong by including words that are unrelated to your interests and include upper and lowercase letters numbers and symbols unique don t use the same password for your bank account as you do for your email account changed regularly change your password twice a year 18 Ethics and laws concerning sharing of MP3 and other copyright material If i download a bootleg and use it for personal use is it against the law Yes If I make a copy of a videogame its against the law 19 Read about Security Holes Software Patches and Cryptography Security holes are software bugs that allow violations of information security


View Full Document

FSU CGS 2100 - TEST 2 SG

Documents in this Course
Exam 1

Exam 1

12 pages

Notes

Notes

8 pages

Exam 2

Exam 2

16 pages

Chapter 1

Chapter 1

10 pages

Exam 2

Exam 2

12 pages

Chapter 7

Chapter 7

12 pages

Exam 1

Exam 1

12 pages

Exam 1

Exam 1

9 pages

Notes

Notes

15 pages

Chapter 1

Chapter 1

12 pages

Midterm

Midterm

12 pages

Exam 2

Exam 2

3 pages

Exam 2

Exam 2

10 pages

EXAM 2

EXAM 2

22 pages

Exam 2

Exam 2

1 pages

Exam 2

Exam 2

1 pages

Exam 2

Exam 2

2 pages

Exam 2

Exam 2

2 pages

EXAM 2

EXAM 2

2 pages

Chapter 6

Chapter 6

14 pages

Chapter 1

Chapter 1

28 pages

Exam 2

Exam 2

9 pages

Test 1

Test 1

12 pages

Exam 2

Exam 2

14 pages

Exam 2

Exam 2

16 pages

Test 1

Test 1

12 pages

Exam 1

Exam 1

14 pages

Exam 1

Exam 1

14 pages

EXAM

EXAM

14 pages

Chapter 1

Chapter 1

36 pages

Exam 2

Exam 2

10 pages

Load more
Download TEST 2 SG
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view TEST 2 SG and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view TEST 2 SG 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?