Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 2

Repetitive strain injury (RSI)

 Injury or disorder of the muscles, nerves, tendons, ligaments, and joints


 Include the following:
1. Tendonitis- inflammation of a tendon; symptoms= extreme pain that extends from the
forearm
2. Carpal tunnel syndrome (CTS)- inflammation of the nerve that connects the forearm;
symptoms= burning pain when the nerve is compressed, numbness, and tingling

Computer vision syndrome (CVS)

 Sore, tired, burning, itching, or dry eyes, blurred or double vision

Computer addiction

 Computer consumes someone's entire social life

Computer ethics

 Moral guidelines that govern the use of computers and information system
 Areas:
1. Unauthorized use of computers and networks
2. Software theft (piracy)
3. Information accuracy
 National press photographers association- allowing even the slightest alteration could
lead to misrepresentative photos
 Digital retouching- area in which legal precedents so far have not been established
4. Intellectual property rights- creators are entitled for their works
 Intellectual property (IP)- Unique and original works
 Copyright- gives authors and artists exclusive rights to duplicate, publish, and sell their
materials; protects any tangible form of expression
 Piracy- common infringement of copyright
 Digital rights management (DRM)- strategy designed to prevent illegal distribution of
movies, music, and other digital content
5. Green computing- reducing the electricity and environmental waste while using a computer
 ENERGY STAR Program- help reduce the amount of electricity used by computers and
related devices; developed by U.S government
6. Information privacy- right of individuals and companies to deny or restrict the collection and
use of information about them

Cookie

 Small text file that a web server stores on your computer


 Typically contain date about you, such as your user name or viewing preferences
 Session cookie- keep track of items in a user's shopping cart; usually expire after a certain time,
such as a week or a month

Pharming

 Scam, similar to phishing


 Perpetrator attempts to obtain your personal and financial information, except they do so via
spoofing
 You are redirected to a phony web site that requests to enter confidential information

Clickjacking

 Object that can be clicked on a web site, such as a button, image, or link, contains malicious
program
 You are redirected to a phony web site that requests presonal information, or a virus may
download to their computer

Social engineering

 Gaining unathorized access or obtaining confidential information by taking advantage of the


trusting human nature of some victims
 Pretending to be an administrator or other authoritative figure

Employee monitoring

 Use of computers to observe, record, and review an employee's use of a computer

Content filtering

 Process of restricting access to certain material on the web

Web filtering software

 Program that restricts access to specified web sites

You might also like