click below
click below
Normal Size Small Size show me how
TestOut IT Fund Pro
TestOut IT Fundamentals Pro Course Chapter 1 Overview
| Qusetion - Term | Answer - Definition |
|---|---|
| Information Technology | A discipline that is dedicated to meeting the computer needs of businesses, schools, governments, and other organizations. |
| Information Systems | A discipline that involves collecting and utilizing data to help organizations know what information they need, how to generate it, and how to turn it into meaningful decisions. |
| Computer Science | The study of computers and computing concepts. In practice, computer science deals with creating software and using computers to solve problems. |
| Ethics | Personal behaviors that build responsibility and trust. Computer ethics requires more than just avoiding unlawful acts but also upholding standards such as confidentiality, human dignity, civility, and property rights. |
| Artificial Intelligence | An area of computer science that focuses on intelligent machines. |
| Intellectual Property | Content that is owned by a copyright holder. |
| Dark Web | A network of encrypted content that allows users to engage in untraceable activity. |
| Green Computing | Environmentally sound policies that prescribe energy efficiency, recycling, and eco-friendly disposal of electronic equipment. |
| Ergonomics | The study of how people function most effectively in their work environment. |
| Blue Light | A range of the visible light spectrum, typically used to refer to light emitted from electronic devices, which can lead to eyestrain, headaches, fatigue, and long-term vision problems. |
| Cyberloafing | Employees using their company's internet connection for personal use on company time. |
| Employee Monitoring | Observing and recording the activities of employees, sometimes without their direct consent. |
| Net Neutrality | A government policy that required Internet Service Providers to allow equal access to all web content. |
| Predictive Policing | Law enforcement practice that involves analyzing data from traffic cameras, surveillance footage, and social media postings for the purpose of preventing crimes before they are actually committed. |
| Hacktivism | Malicious attacks on networks and websites for the purpose of promoting social change, regarded by some as civil disobedience and others as cyberterrorism. |
| Doxing | Publishing the private contact information of one's political opponents online. |