SECTION 3: SOCIAL AND ECONOMIC IMPACT OF ICT,

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:02 AM on 5/8/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

18 Terms

1
New cards

Copyright Infringement

Copyright infringement occurs when copyrighted material is copied

2
New cards

Denial of Service (DoS) Attack

A denial of service attack overloads a computer system or network to make it unavailable to users. Hackers may flood a website with traffic to force it offline.

3
New cards

Software Piracy

Software piracy involves illegally copying

4
New cards

Music Piracy

Music piracy involves illegally downloading or sharing music without paying for it or obtaining permission. Unauthorized music-sharing websites contribute to piracy.

5
New cards

Financial Abuse

Financial abuse involves using technology to steal or misuse money and financial information. Online credit card fraud is an example of financial abuse.

6
New cards

Electronic Eavesdropping

Electronic eavesdropping involves secretly monitoring digital communications without permission. Hackers may intercept emails or phone calls illegally.

7
New cards

Industrial Espionage

Industrial espionage is the illegal collection of confidential business information from competitors. Companies may target trade secrets or product designs.

8
New cards

Propaganda

Propaganda uses biased or misleading information to influence public opinion or behavior. Social media platforms are sometimes used to spread propaganda.

9
New cards

Intrusion Detection System (IDS)

An intrusion detection system monitors network activity to identify suspicious behavior or attacks. Organizations use IDS software to improve cybersecurity.

10
New cards

Authentication System

An authentication system verifies the identity of users before allowing access to systems or data. Passwords and fingerprint scans are common authentication methods.

11
New cards

Password Policy

A password policy sets rules for creating and managing secure passwords. Strong password policies usually require long passwords with symbols and numbers.

12
New cards

Backup Procedures

Backup procedures involve regularly creating copies of important files to prevent data loss. Businesses often schedule automatic backups daily or weekly.

13
New cards

Network Engineer

A network engineer designs

14
New cards

Computer Programmer

A computer programmer writes and tests code used to create software applications and systems. Programmers use languages such as C and Python to develop programs.

15
New cards

Database Administrator

A database administrator manages and secures databases to ensure information is organized and accessible. They also perform backups and maintain database performance.

16
New cards

Software Developer

A software developer designs and creates software applications for computers and mobile devices. Examples include developing games

17
New cards

Web Developer

A web developer creates and maintains websites and web applications. They work with web technologies such as HTML and CSS.

18
New cards

Social Media Specialist

A social media specialist manages online content and communication for organizations on social platforms. They help businesses engage with customers and promote products online.