professional practices ta review

0.0(0)
studied byStudied by 0 people
0.0(0)
linked notesView linked note
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

What is Digital Rights Management (DRM)?

A collection of techniques used to control the use of intellectual property in digital formats.

2
New cards

What does the Digital Millennium Copyright Act (DMCA) prohibit?

It prohibits circumventing technological access controls like DRM and provides a 'safe harbor' for websites against copyright infringement lawsuits.

3
New cards

What is Creative Commons?

A licensing framework that enables authors to specify what permissions they grant to the public for the use of their work.

4
New cards

What is Free Software?

Software that allows people to copy, use, and modify it, emphasizing freedom of use rather than lack of cost.

5
New cards

What is Copyleft?

A concept where software can be freely used, modified, and shared, but all derivative works must be distributed under the same free terms.

6
New cards

What is a Patent Troll?

A company that acquires patents to profit by licensing them or suing other companies for infringement.

7
New cards

What defines Hacking?

The intentional, unauthorized access to computer systems.

8
New cards

What is Hacktivism?

The use of hacking to promote a political cause, such as using a Denial-of-Service attack to shut down a website in protest.

9
New cards

What is a Denial-of-Service (DoS) Attack?

An attack designed to shut down a website or service by overwhelming it with traffic, focusing on disruption rather than theft.

10
New cards

Who is a Gray Hat Hacker?

A hacker who finds vulnerabilities in a system and publishes their findings before or without notifying the system's owners.

11
New cards

What is Stuxnet?

A sophisticated worm that targeted and damaged physical industrial equipment, specifically a uranium enrichment plant in Iran.

12
New cards

What does the Computer Fraud and Abuse Act (CFAA) criminalize?

Unauthorized access to computer systems.

13
New cards

What is a Honey Pot in cybersecurity?

A website, system, or decoy server set up to attract and record hackers, allowing their methods to be studied.

14
New cards

What is Phishing?

Using fraudulent e-mails disguised as legitimate communications to 'fish' for personal and financial information.

15
New cards

What is Pharming?

A technique that redirects users from a legitimate website to a fake one without their awareness, often by poisoning the Domain Name Server (DNS).

16
New cards

What is Vishing?

Voice phishing; using fraudulent phone calls or texts to steal information.

17
New cards

What is Telecommuting?

Working from home using a computer that is electronically linked to one's place of employment.

18
New cards

What is Offshoring?

The practice of moving business processes or services to another country, usually to reduce costs.

19
New cards

What does the Electronic Communications Privacy Act (ECPA) prohibit?

It prohibits the interception of email but allows employers to monitor communications on company-owned systems.

20
New cards

What is GPS Tracking in a workplace context?

Using GPS to track an employee's location, which can be seen as an invasion of personal boundaries.

21
New cards

What is the Wisdom of the Crowd?

The idea that information from millions of participants can be useful, but it can also be easily manipulated.

22
New cards

What is a Filter Bubble?

The result of algorithms filtering content based on a user's past behavior, reinforcing existing beliefs.

23
New cards

What does Abdicating Responsibility refer to?

A 'mental laziness' where people let computers make decisions instead of using human judgment.

24
New cards

What are Computer Models used for?

Simulations that allow companies to test products and explore hypothetical outcomes.

25
New cards

What is the Digital Divide?

The gap in technology access, now defined by the quality and level of service available.

26
New cards

Who are Neo-Luddites?

Critics of technology who argue that computers cause social disintegration and isolation.

27
New cards

What is the Technological Singularity?

A theoretical point in time when artificial intelligence advances beyond human comprehension.

28
New cards

What is Decentralized Decision-Making?

A noncoercive approach to technology decisions aimed at reducing mistakes and manipulation by large companies.