IT Fundamentals chapter 1

Primary tabs

Andrea Rose's picture

Basic terms for the IT Fundamentals Adult Ed course Chapter 1

Bookmark to learn: Login to use bookmarks.

Bookmark to learn: Login to use bookmarks.

Add to collection ... add IT Fundamentals chapter 1 to your collections:

Help using Flashcards ...just like in real life ;)

  1. Look at the card, do you know this one? Click to flip the card and check yourself.
  2. Mark card Right or Wrong, this card will be removed from the deck and your score kept.
  3. At any point you can Shuffle, Reveal cards and more via Deck controls.
  4. Continue to reveal the wrong cards until you have correctly answered the entire deck. Good job!
  5. Via the Actions button you can Shuffle, Unshuffle, Flip all Cards, Reset score, etc.
  6. Come back soon, we'll keep your score.
    “Repetition is the mother of all learning.”
  7. Signed in users can Create, Edit, Import, Export decks and more!.

Bookmark to learn: Login to use bookmarks.

Share via these services ...

Email this deck:

Right: #
Wrong: #
# Right & # Wrong of #

Ethics

Personal behaviors that build responsibility and trust. Computer ethics requires more than just avoiding unlawful acts but also upholding standards such as confidentiality, human dignity, civility, and property rights.

Artificial Intelligence

An area of computer science that focuses on intelligent machines.

Intellectual Property

Content that is owned by a copyright holder.

Dark Web

A network of encrypted content that allows users to engage in untraceable activity.

Green Computing

Environmentally sound policies that prescribe energy efficiency, recycling, and eco-friendly disposal of electronic equipment.

Ergonomics

The study of how people function most effectively in their work environment.

Blue Light

A range of the visible light spectrum, typically used to refer to light emitted from electronic devices, which can lead to eyestrain, headaches, fatigue, and long-term vision problems.

Cyberloafing

Employees using their company's internet connection for personal use on company time.

Employee Monitoring

Observing and recording the activities of employees, sometimes without their direct consent.

Net Neutrality

A government policy that required Internet Service Providers to allow equal access to all web content.

Predictive Policing

Law enforcement practice that involves analyzing data from traffic cameras, surveillance footage, and social media postings for the purpose of preventing crimes before they are actually committed.

Hacktivism

Malicious attacks on networks and websites for the purpose of promoting social change, regarded by some as civil disobedience and others as cyberterrorism.

Doxing

Publishing the private contact information of one's political opponents online.

Ethics/Confidentiality

Protecting confidential data and information.

Ethics/Human Dignity

Respecting the privacy and dignity of other human beings.

Ethics/Civility

Observing rules of "netiquette" that promote online civility.

Ethics/Property Rights

Refusing to violate the intellectual property rights of others.

A code of ethics

A set of rules or standards you adopt that dictate how you act. As you work with computers, you will be required to make moral decisions in a variety of situations with many degrees of complexity. Therefore, your code of ethics cannot prescribe actions for every possible situation. Instead, it should identify general principles of proper behavior that can be applied to many situations.

Ethics/Values

These provide the basis for your code of ethics. They identify the beliefs and ideals that guide your actions as you work with computers and interact with others.

Ethics/Principles

These are the fundamental truths or rules that support your personal values. Principles should be focused on honesty, integrity, and respect for others.

Ethics/Personal Responsibility

This reinforces your adherence to your values and principles. In essence, defining a personal responsibility dictates how you will act even if no one is watching.

Ethics/Legal Compliance

This involves obeying laws that regulate how computers are used. For example, installing key-logger software on your instructor's computer to obtain her password is a violation of the law, which could subject you to prosecution. Some laws and regulations may require you to report unlawful acts that you see others commit.

Net Nutrality from 2010 to 2018

The Federal Communications Commission of the United States (FCC) advocated a policy of net neutrality. This policy essentially required Internet Service Providers (ISPs) to allow equal access to all web content. ISPs were not allowed to block specific websites, throttle the speed of particular web services, or give preferential treatment to websites or services who were willing to pay a higher premium for faster access.

2018 to present Net Nutrality

In 2018, the FCC reversed their policy on net neutrality, arguing that the government should not be in the business of regulating high-speed internet services. People who support this decision suggest that less regulation will inevitably lead to greater innovation, better overall access speeds, and lower premiums. Net neutrality advocates, however, worry that the internet will no longer be a level playing field if broadband service providers have the power to block or limit access to some sites and services.