1/23
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Information technology people
They must understand the relevant social, ethical, and professional issues that surround their activities.
computer industry
As the _______ has developed increasingly powerful processors at lower costs, microprocessors have become ubiquitous.
microprocessors
It has become ubiquitous.
microprocessors
They are used to control automated assembly lines, traffic signal systems, and retail inventory systems and are embedded in consumer products such as automobile fuel-injection systems, kitchen appliances, audio systems, cell phones, and electronic games.
Computers and networks
_____ and ______ are everywhere in the workplace.
wireless networks and widespread Internet access
Word and document processing, electronic mail, and office automation are integrated with desktop computers, printers, database systems, and other tools using _____ and ________.
Expensive Upgrades for hardware and Software
Extensive Training for Workers
Such changes ultimately make office work much more efficient.
What are the disadvantages with this?
Computer-integrated manufacturing (CIM)
a technology arising from the application of computer science to manufacturing.
Computer-integrated manufacturing (CIM)
emphasizes that all aspects of manufacturing should be not only computerized as much as possible but also linked together via a network.
smartphones
The rapid growth of ______ has revolutionized the telephone industry.
the reluctance to pay twice for telephone service
Individuals often abandoned their landlines in favor of going completely mobile.
What was the major driver for this decision?
telephone system
The ____________ itself is simply a multilevel computer network that includes radio wave links and satellite transmission, along with software switches to route calls to their destinations.
Banking and commerce
individuals and organizations can interact with their bank accounts online, performing fund transfers and issuing checks from the comfort of their homes or offices.
Intruders can intercept packets traveling on a network and decrypts them to obtain confidential information and access financial transactions.
Security Challenges
Trust
Knowledge
Privacy
Individual Autonomy
These issues, however, take on a heightened concern when the technologies in question are financed through the profit-motive.