IT Fundamentals Ethics Vocabulary Test 1

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

acceptable use policy

1 / 15

16 Terms

1

acceptable use policy

a set of guidelines or rules adopted by a school or other organization that governs Internet, network, and information technology use

New cards
2

computer crime

a crime committed using a computer, usually to gain access to restricted files, systems, or information; these crimes can resemble trespassing, vandalism, or theft

New cards
3

computer virus

a small, intentionally, created computer program that causes damage to computer workstations, personal computers, or computer networks; this is a generic term that also includes worms, trojan horses, and bombs

New cards
4

data privacy

the concept that an individual has a right to say who has personal information about him or her and how that information is used; with the spread of digital information gathering and recordkeeping, it is becoming more difficult to maintain

New cards
5

flame

an emotionally, often profane, response to an action or statement in a chat-room, electronic discussion group, or newsgroup

New cards
6

hacker/cracker

an individual who gain unauthorized access to computerized information or computer systems; the term “cracker” implies there is malicious intent to the access

New cards
7

intellectual property rights

the concept that a person’s ideas, writings, and constructions (like computer software) that may not exist in a physical sense should be treated as property and the creators or owners of this property have rights to its sale, use, and control

New cards
8

netiquette

a term taken from a combination of “network” and “etiquette”’ that means a code of polite, thoughtful, or respectful behaviors to be followed while using networks, including the Internet

New cards
9

newbie

a new user of networked resources

New cards
10

peer-to-peer file sharing

a type of file that allows computer users with the same program to connect with each other and access files from one another’s hard drives rather from a central server; napster, gnutella, kazaa, and limewire are examples of this type of software

New cards
11

plagiarism

the use of another’s ideas or words as one’s own

New cards
12

spoofing

the use of another’s identity when online

New cards
13

virtual space

the environment created by computer networks in which data is stored and communication transpires; also termed “‘cyberspace”

New cards
14

piracy

illegal using, copying, sharing (etc.) computer software protected by copyright laws

New cards
15

counterfeiting

creating fake softwares, hardwares, parts, programs, etc.

New cards
16
New cards

Explore top notes

note Note
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 66 people
Updated ... ago
4.2 Stars(5)
note Note
studied byStudied by 15 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 19 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 44 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 66 people
Updated ... ago
4.8 Stars(4)
note Note
studied byStudied by 260 people
Updated ... ago
4.5 Stars(4)

Explore top flashcards

flashcards Flashcard24 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard44 terms
studied byStudied by 3 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard59 terms
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard28 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard46 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard39 terms
studied byStudied by 21 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard32 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard23 terms
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)