Chapter 6 ITECH
logs
(files that record activities and events) periodically, employers can determine whether there was inappropriate use by an employee.
intellectual property
Legal concepts have been created and refined to help protect or products of the mind.
privacy policy
On the companies websites that clearly states what information is collected from users and what is done with that information.
copyright
One of the foundation blocks of intellectual property law and a legal concept that grants rights and control to the owner of any published work (e.g., book, song, painting, etc.).
paperless
One of the most significant activities that helps reduce waste, which is a decreased reliance on paper.
Turing test
One popular test of a machine's ability to think
thread
Placing forums posts in an appropriate (topic containing related posts).
DRM (digital rights management)
Software can often be found with modifications that disable technology such as copy protection.
offshoring
When companies outsource functions to another country, it is referred
fair use
a limited set of circumstances where others can use portions of copyrighted material without obtaining permission.
Information systems managers
are responsible for managing a diverse team of IT professionals that include programmers, network administrators, and many others.
Humanoid robots
are those that are created to imitate the appearance or capabilities of humans.
public domain
can be downloaded and used without obtaining permission. Example: Most photos from the U.S. Government.
Green computing
concentrates on reducing the environmental impact of computers and their widespread use.
web developer
creates and maintains websites for organizations.
help desk
department that can quickly troubleshoot systems, as well as provide technical support to employees.
computer support specialist
excels when it comes to installing, configuring, and supporting computer systems.
Nanotechnology
involves the creation or manipulation of matter at the smallest possible scale.
Artificial intelligence (AI)
involves the development of intelligent systems.
Do not track
is a browser feature that attempts to stop websites from automatically sharing details about your visit with other companies.
acceptable use policy (AUP)
is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.
Private browsing
is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window.
Biotechnology
is an application of biology that uses living organisms to manufacture new products or improve existing ones.
database administrator (DBA)
is responsible for configuring, maintaining, and securing an organization's database.
network administrator
is responsible for configuring, securing, and maintaining networks and communication systems.
software engineer
is responsible for the development of computer software.
Whistleblowing
is the act of alerting the public about harmful activities that are being hidden by an organization.
Ethics
is the philosophical study of morality. It is a rational analysis of the voluntary, moral choices that individuals make.
Telecommuting
is the process of working for a company without being physically present at the company's office.
Creative Commons
license allows authors to set conditions for the free use and distribution of their work.
piracy
means acquiring or exchanging copies of protected digital creations without payment to or permission from their creator.
Outsourcing
occurs when an organization transfers some aspect of its business to a third party.
Automation
occurs when computers or machines can perform the work that was once done by a human.
flaming
refers to social interactions that exhibit anger and/or insults aimed at another individual.
netiquette
refers to the set of online behaviors that are considered polite and proper.
digital divide
refers to the technology gap that exists between different social and economic classes.
Hibernate
saves more electricity by copying the contents of RAM to your hard drive.
Anonymity software
such as Tor and Anonymizer, will help mask your IP address from websites.
empathy
the ability to recognize, understand, and share the feelings of others.
Sleep
uses only enough electricity to keep the contents of your RAM active.
power management
utilities to place computers and devices in low-power states when they are not being used.
digital footprints
which is a trail of your data, activity, and even the locations where devices are used.
trolling
which is the act of being annoying and antagonistic to a group of individuals.
systems analyst
who specializes in developing plans and recommendations that meet the software and system needs of an organization.