I.T(officially)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/30

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

What does computer ethics deal with?

Moral principles that govern the use of computers and technology, including issues of privacy, intellectual property rights, and societal impact.

2
New cards

Define unethical practice.

Any action, behaviour, or decision that violates moral principles, societal norms, professional standards, or legal standards.

3
New cards

What is cyberbullying?

The use of electronic communication to bully, harass, or intimidate others, typically through social media or online forums.

4
New cards

List three emotional impacts of cyberbullying.

Emotional distress, anxiety, depression, and may lead to suicidal thoughts.

5
New cards

What is cyberstalking?

The repeated harassment or threatening of someone using electronic communication, causing fear or emotional distress.

6
New cards

What are the legal consequences of cyberstalking?

Cyberstalking is a criminal offense and can lead to restraining orders or imprisonment.

7
New cards

What is software piracy?

Unauthorized copying, distribution, or use of software without the permission of the copyright holder.

8
New cards

What is softlifting?

When a purchaser of a computer makes copies of the software on that machine and distributes them to others.

9
New cards

What does peer-to-peer (P2P) file sharing involve?

Normal users connecting directly to share files, which can include sharing copyrighted works without rights.

10
New cards

What are some consequences of engaging in software piracy?

Legal issues, economic impact on the software industry, and security risks due to lack of updates.

11
New cards

Define trolling.

Deliberately provoking or antagonizing others online by posting inflammatory or disruptive messages.

12
New cards

What does sexting refer to?

Sending or receiving sexually explicit messages, photos, or videos through phones or digital devices.

13
New cards

Who is a bystander?

A person who does nothing when witnessing an event or action happening.

14
New cards

What is an 'upstander'?

A person who supports and stands up for someone else.

15
New cards

What does it mean to escalate?

To increase or make something more intense.

16
New cards

What does de-escalate mean?

To decrease or make something less intense.

17
New cards

Define target in the context of unethical behavior.

A person who is the object of an intentional action.

18
New cards

What is an offender?

A person who has malicious intent to hurt or damage someone.

19
New cards

What does OSHA stand for?

Occupational Safety and Health Act

20
New cards

Why is OSHA in jamaica?

In Jamaica, government agencies like the Ministry of Labour and Social

Security and the Occupational Safety and Health Department (OSHD) enforce health and safety regulations across all industries, including Information and Communication Technology

(ICT)/Information Technology (IT), through the Jamaica

Occupational Safety and Health Act (OSHA).

21
New cards

OSHA Purpose?

OSHA’s purpose and scope is to provide a legal framework to prevent occupational accidents, diseases, and hazards, ensuring a safe and healthy work environment for all employees, including those in the ICT sector.

It outlines the duties of employers to maintain safety standards and conduct risk assessments, while also setting responsibilities for employees to follow safety guidelines.

22
New cards

Workplace Safety? (OSHD)

The OSHD enforces standards for physical workspaces, ensuring proper ergonomics (chairs, desks, computer screens) to prevent injuries from prolonged sitting and computer use. They regulate lighting, ventilation, and workspace layouts to enhance safety and comfort, especially in IT environments like offices and data centers.

OSHD ensures that these facilities meet safety standards for electrical systems, fire prevention, and environmental controls (such as temperature and humidity management) to protect both equipment and workers

23
New cards

ICT equipment safety (OSHA)

Regular inspections are conducted to ensure compliance

with electrical safety standards and the correct setup of workstations (computer

screens, keyboards, etc.) to avoid strain and injuries.cxcccxxc

24
New cards

E waste management (OSHA)

ICT companies must follow proper disposal practices for electronic waste, such as computers and servers, ensuring hazardous materials don’t harm workers or the environment.

25
New cards

Training and Compliance

OSHA mandates that employees receive regular health and safety training, including handling equipment, fire safety, and ergonomic practices. Health and safety officers are appointed within workplaces to oversee compliance.

26
New cards

Enforcement and Inspections

The OSHD conducts regular inspections, issues compliance orders, and investigates workplace accidents. Employers face penalties for non-compliance, which may include fines or shutdowns

27
New cards

File?

A file is a collection of related information or data that is stored as a unit and assigned a unique name. Files can contain a wide variety of data, including text, images, audio, video, programs, and more. Each file is typically stored on a storage medium, such as a hard drive.

28
New cards

File Organization?

This involves structuring files into directories or folders based on logical criteria such as purpose, topic, date, or project.

29
New cards

File Naming

Assigning appropriate and descriptive names to files to aid in easy identification and retrieval.

30
New cards

File Access Control

Managing permissions and access rights to ensure that only

authorized users can access and modify certain files.

31
New cards