Social Implications

Cards (25)

  • Hardware failure refers to hardware components breaking down due to age or wear and tear.
  • A Software bug is a fault in a computer program that causes it to produce unexpected or undesirable results.
  • Software bugs can cause programs to respond slowly, inefficiently or worse.
  • Mobile Offices are customised vehicles that include a working space with relevant devices and an Internet Connection.
  • A Virtual Office does not exist physically. This is done online and offers a range of services that enables the employees and business owners to work from anywhere.
  • Virtual Offices are accessed through the Internet.
  • Office Automation refers to all hardware and software needed to create, collect, store, manipulate and communicate information to accomplish simple and everyday tasks.
  • BYOD stands for Bring Your Own Device and refers to the practice of employees bringing their own devices to work.
  • Social Engineering is defined as the act of manipulating people into giving out confidential information with a view to committing some sort of computer fraud.
  • Phishing is the deceitful attempt to obtain sensitive information from an unsuspecting victim such as usernames and passwords.
  • Spear Phishing is designed to target a specific user.
  • A Trojan horse is a seemingly harmless program that when activated, causes harm to a computer system.
  • Data Misuse is when data is used for a different purpose than the original reason it was collected.
  • Botnets refers to criminals creating a networked collection of zombie computers which can be remotely controlled to perform large-scale malicious acts.
  • Pharming is an attack intended to redirect a Web site's traffic to another, bogus site.
  • Ransomware is a type of malware and prevents the user from accessing their computer system until they paid a ransom through an online payment system like Bitcoin.
  • e-Commerce is the buying and selling of goods online.
  • big Data is extremely large sets of data that is often diverse. this could be text, video or sounds and requires complex processing to make sense of the data.
  • Power Settings which are used to control the amount of power that is used by the CPU and other components.
  • Examples of power Settings which can be used to manage your computer's power usage include 'sleep', setting brightness and using the balance power option.
  • A Cable Lock is one example of a strategy that can be used to physically protect your computer.
  • AUP stands for Acceptable Use Policy
  • AUP policy criteria include: rules for logging in / rules on how to keeps things tidy / rules for data usage / rules to govern internet usage.
  • Information Overload can be reduced by filtering e-mails / learning to use search tools effectively and learning to compare and analyzing sources.
  • TWO methods of making a document available for access, besides copying into a USB Flash Drive are CLOUD STORAGE and FILE SHARING PLATFORMS