■ Spreadsheet software Correct Answers ● allows data to be
analyzed in a tabular format with data organized in rows and
columns that can be manipulated by formulas
■ Word processors Correct Answers ● performs processing of
text (words) to compose, edit, format, or print written material
■ Workflow software Correct Answers ● reflect a process or
steps within a process that provides functionality to create
workflows with a diagram-based graphical designer approach
○ Antivirus software Correct Answers ■ A computer program
that is designed to recognize and neutralize computer viruses ○
Authentication ■ Processes to serve to authenticate or prove
who is accessing the system
○ Baiting Correct Answers ■ Tricking a user to load an
infected physical device onto their computer by leaving it in a
public area such as a copy room ■ The user loads the device to
try to identify its owner
○ Bioethics Correct Answers ■ The study of healthcare ethics
■ Bioethics takes on relevant ethical problems seen by
healthcare providers in relation to care
○ Biometrics Correct Answers ■ Study of processes or means
to uniquely recognize individual users based on one or more
intrinsic physical or behavioral characteristics. ■ Authentication
,devices that recognize thumb prints, retinal patterns, or facial
patterns are available.
○ Brute force attack Correct Answers ■ A technique where
software creates many possible combinations of characters in an
attempt to guess passwords to gain access to an network or a
computer.
○ Cybersecurity Correct Answers ■ the state of being
protected against the criminal or unauthorized use of electronic
data, or the measures taken to achieve this. ■ With the
expansion of technology. Facilities are taken more precautions
to prevent cyber attacks. With the move towards advancing
cybersecurity is important, technology continues to grow.
○ Decision-assisting Correct Answers ■ tools provide
important support for healthcare professions decisionmaking
through integration of patient information with evidence. ○
○ Eudaemonistic Correct Answers ■ Ethical evaluation that
involves consideration of which actions lead to being a happy
person
○ Good Correct Answers ■ The outcomes wanted in ethics
○ Google Glass Correct Answers ■ A computer that you can
wear from Google that can take pictures, play video, and display
text messages with no one knowing
,○ Hackers Correct Answers ■ Computer-savvy individuals
most commonly thought of as malicious people who hack, or
break, through security to steal or alter data and information
○ Harm Correct Answers ■ Physical or mental injury ■
Unfavorable outcome in ethics.
○ Information systems Correct Answers ■ The manual and/or
automated components of system of users or people, recorded
data, and actions used to process the data into information for a
user, group of users, or an organization.
○ Integrity Correct Answers ■ Quality and accuracy ■ People
have confidence that the information they are provided is, in
fact, true.
○ Intrusion detection devices Correct Answers ■ hardware and
software that allow groups to monitor who is using its network
and which files that user has accessed.
○ Intrusion detection system Correct Answers ■ Method of
security that uses both hardware and software detection devices
as a system that can be set up to monitor a single computer or
network.
○ Jump drives Correct Answers ■ Small, removable storage
devices.
○ Justice Correct Answers ■ Fairness
, ○ Liberty Correct Answers ■ Having independence ■ Not
being controlled
○ Malicious code Correct Answers ■ Software that includes
spyware, viruses and worms
○ Malicious insiders Correct Answers ■ Insiders who sabotage
or add malicious code or gets into systems to cause damage or to
steal data and information.
○ Malware Correct Answers ■ A malicious program or
software that infects a device and is intended to steal
information, take control or destroy data, information, or the
device.
○ Mask Correct Answers ■ Method that a proxy server uses to
protect the identity of a corporation's employees while they are
surfing the World Wide Web ■ The proxy server keeps track of
which employees are using which masks and directs the traffic
appropriately.
○ Moral dilemmas Correct Answers ■ Situations where there
is no clear proof of one of the options being morally wrong or
right ○ Moral rights ■ Ethical privilege
○ Morals Correct Answers ■ Social conventions about right
and wrong human conduct that are socially constructed and
tacitly agreed upon to be right
○ Negligence Correct Answers ■ Not upholding the standards
of care, posing risk that can be careless or unreasonable ○