Hardware failure refers to hardware components breaking down due to age or wear and tear.
A Software bug is a fault in a computer program that causes it to produce unexpected or undesirable results.
Software bugs can cause programs to respond slowly, inefficiently or worse.
Mobile Offices are customised vehicles that include a working space with relevant devices and an Internet Connection.
A Virtual Office does not exist physically. This is done online and offers a range of services that enables the employees and business owners to work from anywhere.
Virtual Offices are accessed through the Internet.
Office Automation refers to all hardware and software needed to create, collect, store, manipulate and communicate information to accomplish simple and everyday tasks.
BYOD stands for Bring Your Own Device and refers to the practice of employees bringing their own devices to work.
Social Engineering is defined as the act of manipulating people into giving out confidential information with a view to committing some sort of computer fraud.
Phishing is the deceitful attempt to obtain sensitive information from an unsuspecting victim such as usernames and passwords.
Spear Phishing is designed to target a specific user.
A Trojan horse is a seemingly harmless program that when activated, causes harm to a computer system.
Data Misuse is when data is used for a different purpose than the original reason it was collected.
Botnets refers to criminals creating a networked collection of zombie computers which can be remotely controlled to perform large-scale malicious acts.
Pharming is an attack intended to redirect a Web site's traffic to another, bogus site.
Ransomware is a type of malware and prevents the user from accessing their computer system until they paid a ransom through an online payment system like Bitcoin.
e-Commerce is the buying and selling of goods online.
big Data is extremely large sets of data that is often diverse. this could be text, video or sounds and requires complex processing to make sense of the data.
Power Settings which are used to control the amount of power that is used by the CPU and other components.
Examples of power Settings which can be used to manage your computer's power usage include 'sleep', setting brightness and using the balance power option.
A Cable Lock is one example of a strategy that can be used to physically protect your computer.
AUP stands for Acceptable Use Policy
AUP policy criteria include: rules for logging in / rules on how to keeps things tidy / rules for data usage / rules to govern internet usage.
Information Overload can be reduced by filtering e-mails / learning to use search tools effectively and learning to compare and analyzing sources.
TWO methods of making a document available for access, besides copying into a USB Flash Drive are CLOUD STORAGE and FILE SHARING PLATFORMS