Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C961 Ethics in Technology Glossary Terms Already Passed

Beoordeling
-
Verkocht
-
Pagina's
22
Cijfer
A+
Geüpload op
28-11-2023
Geschreven in
2023/2024

acceptable use policy (AUP) A document that stipulates restrictions and practices that a user must agree in order to use organizational computing and network resources. advanced persistent threat (APT) A network attack in which an intruder gains access to a network and stays there—undetected— with the intention of stealing data over a long period of time (weeks or even months). Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) An agreement of the World Trade Organization that requires member governments to ensure that intellectual property rights can be enforced under their laws and that penalties for infringement are tough enough to deter further violations. anonymous expression The expression of opinions by people who do not reveal their identity. anonymous remailer service A service that allows anonymity on the internet by using a computer program that strips the originating header and/or IP address from the message and then forwards the message to its intended recipient. anti-SLAPP laws Laws designed to reduce frivolous SLAPPs (strategic lawsuit against public participation [SLAPP], which is a lawsuit filed by corporations, government officials, and others against citizens and community groups who oppose them on matters of concern). antivirus software Software that scans for a specific sequence of bytes, known as a virus signature, that indicates the presence of a specific virus.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

WGU C961 Ethics in Technology
Glossary Terms Already Passed
acceptable use policy (AUP) ✔✔A document that stipulates restrictions and practices that a user
must agree in order to use organizational computing and network resources.


advanced persistent threat (APT) ✔✔A network attack in which an intruder gains access to a
network and stays there—undetected— with the intention of stealing data over a long period of
time (weeks or even months).


Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) ✔✔An agreement
of the World Trade Organization that requires member governments to ensure that intellectual
property rights can be enforced under their laws and that penalties for infringement are tough
enough to deter further violations.


anonymous expression ✔✔The expression of opinions by people who do not reveal their identity.


anonymous remailer service ✔✔A service that allows anonymity on the internet by using a
computer program that strips the originating header and/or IP address from the message and then
forwards the message to its intended recipient.


anti-SLAPP laws ✔✔Laws designed to reduce frivolous SLAPPs (strategic lawsuit against public
participation [SLAPP], which is a lawsuit filed by corporations, government officials, and others
against citizens and community groups who oppose them on matters of concern).


antivirus software ✔✔Software that scans for a specific sequence of bytes, known as a virus
signature, that indicates the presence of a specific virus.

,artificial intelligence systems ✔✔The people, procedures, hardware, software, data, and
knowledge needed to develop computer systems and machines that can simulate human
intelligence processes, including learning (the acquisition of information and rules for using the
information), reasoning (using rules to reach conclusions), and self-correction (using the outcome
from one scenario to improve its performance on future scenarios).


audit committee ✔✔A group that provides assistance to the board of directors in fulfilling its
responsibilities with respect to the oversight of the quality and integrity of the organization's
accounting and reporting practices and controls, including financial statements and reports; the
organization's compliance with legal and regulatory requirements; the qualifications,
independence, and performance of the company's independent auditor; and the performance of the
company's internal audit team.


Bathsheba syndrome ✔✔The moral corruption of people in power, which is often facilitated by a
tendency for people to look the other way when their leaders act inappropriately.


blended threat ✔✔A sophisticated threat that combines the features of a virus, worm, Trojan horse,
and other malicious code into a single payload.


body of knowledge ✔✔An agreed-upon sets of skills and abilities that all licensed professionals
must possess.


botnet ✔✔A large group of computers, which are controlled from one or more remote locations
by hackers, without the knowledge or consent of their owners.


breach of contract ✔✔The failure of one party to meet the terms of a contract.


breach of the duty of care ✔✔The failure to act as a reasonable person would act.

, bribery ✔✔The act of providing money, property, or favors to someone in business or government
in order to obtain a business advantage.


bring your own device (BYOD) ✔✔A business policy that permits, and in some cases, encourages
employees to use their own mobile devices (smartphones, tablets, or laptops) to access company
computing resources and applications, including email, corporate databases, the corporate intranet,
and the Internet.


BSA | The Software Alliance (BSA) ✔✔A trade group that represent the world's largest software
and hardware manufacturers.


business continuity plan ✔✔A risk-based strategy that includes an occupant emergency evacuation
plan, a continuity of operations plan, and an incident management plan with an active governance
process to minimize the potential impact of any security incident and to ensure business continuity
in the event of a cyberattack or some form of disaster.


CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
✔✔Software that generates and grades tests that humans can pass and all but the most sophisticated
computer programs cannot.


certification ✔✔Indicates that a professional possesses a particular set of skills, knowledge, or
abilities, in the opinion of the certifying organization. Certification can also apply to products (e.g.,
the Wi-Fi CERTIFIED logo assures that the product has met rigorous interoperability testing to
ensure that it will work with other Wi-Fi-certified products) and is generally voluntary.


Child Online Protection Act (COPA) ✔✔An act signed into law in 1998 with the aim of prohibiting
the making of harmful material available to minors via the internet; the law was ultimately ruled
largely unconstitutional.

Geschreven voor

Vak

Documentinformatie

Geüpload op
28 november 2023
Aantal pagina's
22
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
dennisgathiru
5.0
(1)

Maak kennis met de verkoper

Seller avatar
dennisgathiru City University New York
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
3
Lid sinds
2 jaar
Aantal volgers
2
Documenten
2234
Laatst verkocht
8 maanden geleden

5.0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen