CSIT 120 Final Exam Questions and Answers Rated A
CSIT 120 Final Exam Questions and Answers Rated A Information Technology (IT) The study or use of systems for storing, retrieving, and sending information Cybercrime A criminal act committed primarily through the use of a computer system Phishing Sending emails to lure people into revealing their personal information or to take an action Hacking unauthorized access, modification, or use of an electronic device or some element of a computer system Social Networking process by which we make connections with others social media online tools and sites that allow netoworking Cloud Storage allows you to save files in storage and then access them on the Cloud Cloud Computing is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand intellectual property an idea, invention, or process that derives from the work of the mind or intellect copyright protection given to the creator of songs, computer programs, books, and other creative works copyright infringement When a copyrighted work is reproduced, distributed, performed, or publicly displayed work without the permission of copyright owner patent creates protection for someone who invents a new product or process Trademark a word, phrase, logo, shape or sound that identifies a source of goods or services that must be protected by an organization Digital Rights Management a strategy designed to prevent illegal distribution of movies, music, and other digital content public domain A work of authorship that is not under copyright protection and can be used freely without permission plagarism taking someones ideas or writing and offering them as your own digital divide The gap between those who have access to the Internet and technology and those who do not mobile commerce The process of buying, selling, or exchanging products, services, or information via phone E-commerce (electronic commerce) The process of buying, selling, or exchanging products, services, or information via internet black hat hackers A hacker that breaks into a system for malicious reasons white hat hackers A person who hacks into a system for non-malicious purposes Denial of service attack attack which a botnet overwhelms websites, mail servers, or other internet locations and a user cannot access the site Spam irrelevant or inappropriate messages sent on the Internet to a large number of recipients malware malicious software Spyware malware that can monitor and record user activities computer cookies A text file which a website can store on its visitors' hard drives. Can remember passwords, tracks number of visitors identity theft when a criminal or group uses the identity of unknown person Social Engineering manipulation of people into releasing information or performing a task that violates security protocols virus software that attaches or adds itself to other software; can replicate itself anti-virus software a program that finds and removes viruses from a computer Passwords a method of controlling access to confidential patient information. Choose strong passwords, change passwords periodically, do not use the same password for multiple purposes privacy policy Document that tells how personal data collected by a company will be used artificial intelligence the branch of computer science that attempts to develop computers that mimic human thought and behavior virtual reality Illusion of reality through the use of software and perception changing devices Augmented reality the combination of a "real" objects overlaid with data, images, etc. that are not real Excel a spreadsheet written or tailored to meet specific needs excel cell A box formed by the intersection of a row and column in a worksheet or a table, in which you enter information. excel active cell The selected cell in which data is entered when you begin typing. Only one cell is active at a time. The active cell is bounded by a heavy border. excel formula A sequence of values, cell references, names, functions, or operators in a cell that together produce a new value. A formula always begins with an equal sign (=). excel function A prewritten formula that takes a value or values, performs an operation, and returns a value or values. Use functions to simplify and shorten formulas on a worksheet, especially those that perform lengthy or complex calculations. excel workbook A spreadsheet program file that you create in Excel. A workbook contains worksheets of rows and columns in which you can enter and calculate data. excel worksheet The primary document that you use in Excel to store and work with data. Also called a spreadsheet. purpose of presentation and word processing software presentation: used to display information in the form of a slide show. It has three major functions: an editor that allows text to be inserted and formatted, a method for inserting and manipulating graphic images, and a slide-show system to display the content. word processing: used to manipulate a text document, such as a resume or a report Internet of Things (IoT) The web of items embedded with software and connected through the Internet robots mechanical devices that perform tasks traditionally done by humans or tasks that we think of as human-like. Such as: pharmacy, delivery medicine, surgery, preparing food, assembling products, milking cows, as well as dull, dirty and dangerous jobs Diversity ways in which people are different; individuals, groups and cultures Dimensions of Diversity specific traits viewed as distinguishing one person or group from another Diversity Consciousness understanding, awareness and skills in area of diversity. It is NOT: simply common sense, result of good intentions, result of some formula, important for just some of us, ignoring differences and treating everyone the same, some "feel good" activity, a passing fad Mindfulness attention to thoughts or feelings without having any judgements Assimilation process where people lose their cultural differences and blend into a wider society Pluralism process through which cultural differences are acknowledged and preserved Discrimination the unjust or prejudicial treatment of different categories of people or things, especially on the grounds of race, age, or sex. prejudice irrational and inflexible opinion formed on the basis of limited and insufficient knowledge Ethnocentrism Belief in the superiority of one's nation or ethnic group Global Village the world considered as a single community linked by telecommunications Personal barriers individual factors that get in the way of success (lack of self-awareness, lack of self- discipline, cultural ignorance social barriers factors that are external to a person and that impede on his/her success (perceptions, thoughts and actions of others) Scapegoating Blaming an innocent person or a group for one's own troubles Stereotype Vulnerability danger of not performing up to our ability because of our anxieties and fears about perpetuating a stereotype xenophobia fear of foreigners conflict struggle that results when two or more parties perceive a difference or incompatibility in their interests, values or goals The 6 C's Approaches to conflict Management Communicate- people who hold conflicting views can come together to talk, listen and learn Circumvent- when you choose what to fight and what to avoid Confront- in some cases it is necessary to be assertive and act immediately; may be necessary when people show a lack of respect for cultural traditions Conform- there may be times when you feel you must "give in" because you do not want to jeopardize your relationship with others Compromise- when all parties feel they can give a little Collaborate- instead of taking sides or compromising, we reach an agreement by finding some common ground Cultural lag when one part of a culture is not keeping up with another part Cultural Cruise Control when our own values, beliefs and experiences are universal (oblivious to different cultural cues; self-awareness is minimal) glocalization a cultures openness to diverse influences and ability to blend foreign ideas with own traditions Inclusive Workplace working environment that values individual and group differences within its workforce Hofstede's Cultural Dimensions Individualism vs. Collectivism Individualism- reinforces peoples self-reliance (USA, Australia, Great Britain, Netherlands) Collectivism- reinforces greater reliance on a group (Japan, Pakistan, Singapore, Colombia) Large or Small Power Distance Large Power Distance- significant inequalities among people are accepted and expected (Philippines, Colombia, India, Singapore) Small Power Distance- they play down the importance of inequalities in power and wealth (Denmark, Israel, USA, Australia) Strong or Weak Uncertainty Avoidance Strong Uncertainty Avoidance- risk and uncertainty are avoided; absolute truth embraced (Greece, Japan, Turkey) Weak Uncertainty Avoidance- avoiding absolute truths and do not feel threatened by behavior and different opinions (Sweden, Great Britain, Ireland) Masculinity vs. Femininity Masculinity- attach more importance to male roles; delineate gender roles (Japan, Germany, Austria) Femininity- attach more importance to female roles; distinguish among gender roles (Sweden, Netherlands, Norway) Six areas of the development of diversity consciousness Examining ourselves and our world Expanding our knowledge of others and their worlds Stepping outside of ourselves Gauging our level of the playing field Checking up on ourselves Following through Computer assisted surgery uses computer technology and medical robotics to plan and perform procedures Telemedicine Involves the use of video, audio, and computer systems to provide medical and/or health care services. Telesurgery uses telecommunications to link surgeons to robotic equipment at distant locations Telecommute work from home or remote locations using a variety of information technologies Hardware the physical parts of a computer Software the programs and other operating information used by a computer. operating systems the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals. motherboard is one of the most essential parts of a computer system. It holds together many of the crucial components of a computer, including the central processing unit (CPU), memory and connectors for input and output devices computer accessibility accessibility of a computer system to all people, regardless of disability type or severity of impairment braille printers an impact device that creates tactile dots on heavy paper, making written documents accessible to blind individuals. ethics moral principles that govern a person's behavior or the conducting of an activity wearable technologies clothing or accessories, such as smart watches or fitness trackers that incorporate information technologies
Escuela, estudio y materia
- Institución
- CSIT 120
- Grado
- CSIT 120
Información del documento
- Subido en
- 12 de diciembre de 2023
- Número de páginas
- 15
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
csit 120 final exam questions and answers rated a
Documento también disponible en un lote