Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Comp.

- Finals gives users better web browsing, search functions,


UNIT 7A: Personal Devices for Improving and streaming media.
Productivity
Mashup Cellphone
• is a creative combination of content or elements • A cellphone is actually a radio.
from different sources, such as a web page that
blends data from two or more sources to create new Apps
services or content. • are small, specialized programs that can be
downloaded onto mobile devices.
7.1 Convergence, Portability, & Personalization
Tactile Keyboards
Convergence • Also known as physical keyboards,
• or digital convergence, describes the combining of • have raised keys and are perceptible to the sense of
several industries—computers, communications, touch, which make them easier to type on without
consumer electronics, entertainment, and mass looking.
media—through various devices that exchange data
in digital form. Touch-Screen Keyboard
• Also called virtual keyboards,
Portability • are those in which the image of a keyboard is displayed
• A device that is portable is small, lightweight, and on a touch screen.
easy to carry.
• means the state or quality of being portable—that is, QWERTY keyboard,
capable of being carried or moved about. • similar to a computer keyboard, is best for writing
and editing text and email messages.
Personalization
• is the creation is the creation of information tailored “condensed” keyboard
to your preferences, such as programs that • crams several letters, numbers, and symbols onto a
automatically cull recent news and information from single key to save space, but is not as easy to use.
the Internet on just those topics you have designated
of information tailored to your preferences, such as Media player:
programs that automatically cull recent news and • Some phones act as media players, letting you view
information from the Internet on just those topics videos and listen to music tracks. Music companies
you have designated. make songs and music video downloads available to
watch on mobile video screens.
7.2 SMARTPHONES: More Than Talk
Headset connector:
Smartphone • This permits the user to attach a headset to the
• smartphone is a cellular telephone with software mobile phone.
applications and Internet access.
Bluetooth
Cellphones: • enables a phone to work with wireless headsets for
• designed for calls & perhaps texting hands-free operation.
• The lower-priced option ($20–$150, but often free
with a two-year phone company contract), Text Messaging
cellphones are compact, have a straightforward • is the sending of short messages to others’ handheld
keypad, let you receive and send text messages, and devices as well as desktop computers.
allow you to store frequently used phone numbers. • , or texting or SMS (for short message service), is
the sending of short messages, generally no more
Smartphones than 160 characters in length (including spaces), to a
• Designed with advanced operating systems & touch smartphone or other handheld device, including
screens notebook computers.
• The arrival of smartphones, which have advanced
operating systems and touch screens, has roiled the 7.3 TABLETS & E-READERS
telephone industry. Phone makers such as Nokia and
Motorola have stumbled over the transition from Tablet computer
cellphones to smartphones, and are now far down the • are useful as multipurpose devices,
list of smartphone manufacturers. • is a general-purpose computer contained in a single
• are more expensive (generally $200–$350, with a panel.
two-year phone company contract) than cellphones, • lightweight, thin, web-enabled, and portable and yet
have advanced operating systems (Apple’s iOS, powerful enough to provide the functionality of a
Google’s Android, Windows Phone 8) that give them laptop.
access to thousands of apps, have larger touch- • a wireless, portable personal computer with a 7- to
screen displays and more advanced cameras than 12-inch multitouch screen (one can manipulate the
those on conventional phones, feature GPS screen contents directly with one’s hand).
navigation technology, have Wi-Fi capabilities, and
support higher mobile wireless data speeds, which
E-Reader/ E-book • , or millions of picture elements, the electronic dots
• are usually better for reading. making up an image.
• are also much in use, despite being single-purpose
devices, because they are so good at one thing: Lenses
displaying e-book content. • You also need to have a lens that ensures that your
• The Reading Machine picture is properly focused and that pulls in enough
• reader can hold a library that you can take almost light to get good exposure.
anywhere.
• or electronic book, is an electronic text, the digital- Digital Zoom
media equivalent of a conventional printed book. • is just another way of saying “we’ll crop the image
• or e-book reader, is an electronic for you in the camera.”
• device that can download e-books —digital versions • does is enlarge a portion of the image, thus
of regular books, articles, and magazines from ‘simulating’ optical zoom. In other words, the
various suppliers. camera crops a portion of the image and then
enlarges it back to size.
7.4 PORTABLE MEDIA PLAYERS
Optical Zoom
Portable Media Player (PMP) • will bring you closer to your subject without your
• or MP3 player, a small portable device that enables having to move. That is, the lens actually extends to
you to play digital audio, video, or image files. make distant objects seem larger and closer.

Music Player Optical viewfinders:


• small portable devices, typically weighing around 3 • is the eye-level optical glass device on the camera
ounces, that are designed primarily for playing that, when you look through it, shows the image to
music. They feature controls for enhancing sound be photographed.
and adjusting playback, and their 1- to 2-inch
screens are best used to view playlists and menus. LCD viewers/viewfinders
• display) viewers/viewfinders usually measure 2
Media Player inches or more diagonally—some are as large as 3.5
• allow you not only to listen to music but also to inches—and allow you to review the photos you
view videos, play games, browse the web, check take.
email, access social networks, read ebooks, and
even make phone calls (using Skype). 7.6 HIGH-TECH RADIO: Satellite, Hybrid Digital,
& Internet
MP3
• is a format that allows audio files to be compressed High-tech Radio
so they are small enough to be sent over the Internet • uses satellite, digital transmission on FM stations
or stored as digital files. (HD radio), and the Internet. We also describe
podcasting.
UNIT 7B: Personal Devices for Enriching Leisure &
Life Satellite Radio
7.5 DIGITAL CAMERAS: Changing Photography • is commercial-free digital radio transmitted via
satellite and paid for by subscribers.
Digital Camera • radio is a radio service in which digital signals are
• takes video and photographs and digitally converts broadcast from satellites to special radios, primarily
the analog data by recording images via an in cars.
electronic image sensor.
HD Radio
Point-and-shoot: • or hybrid digital radio, provides the digital
• basic camera, is a camera, either film or digital, that technology for AM/FM stations in the United States.
automatically adjusts settings such as exposure and • stands for hybrid digital radio, a technology that
focus. Generally such cameras cost $75–$500. provides CD-quality sound and allows broadcasters
to squeeze one analog and two digital stations on the
Single-lens reflex (SLR) same frequency.
• or advanced camera, is a camera, either film or
digital, that has a reflecting mirror that reflects the Internet Radio
incoming light in such a way that the scene viewed • streams audio programs over the Internet.
by the viewer through the viewfinder is the same as • radio is the continuous streaming of audio over the
what’s framed by the lens. Internet.

Resolution Pandora Internet Radio


• refers to image sharpness. • The most popular online radio service

Megapixels (mp) Podcasting


• sharpness. A digital camera’s resolution is • involves delivering Internet music, radio, or movie
expressed in ____________. files from the Internet to a computer.
7.7 DIGITAL TELEVISION

INTERACTIVE TV (iTV)
• lets viewers interact with their television sets, so
that, for instance, they can request information about
a product or play along with a game show.

Internet TV
• is television distributed via the Internet.
• If you’re paying a charge to a cable or satellite TV
distribution service, you can often see the same
network television shows—from ABC, CBS, NBC,
and Fox—for free on Hulu or uStream, online video
services that offer a selection of hit shows, clips,
movies, and more.

Internet-Ready TV
• TV is the term applied to television sets with broad-
band connections that allow viewers not only to
watch TV shows but also go online to get news,
stream movies, view photos, and the like.

Digital Television (DTV)


• which uses a digital signal, or series of 0s and 1s.

High-Definition Television (HDTV)


• works with digital broadcasting signals and has a
wider screen and higher resolution than analog
television had.

Standard-Definition Television (SDTV) ,


• which has a lower resolution, a minimum of 480
vertical lines, and a picture quality similar to that
required to watch DVD movies.

Video on Demand (VOD or VoD)


• which consists of a wide set of technologies that
enable viewers to select videos or TV programs from
a central server to watch when they want, rather than
when TV programmers offer them.

7.8 VIDEOGAME SYSTEMS: The Ultimate


Convergence Machine?

Videogames Console
• or gameboxes, specialized computers powered by
operating systems and CPUs different from those in
desktop computers.
Chapter 8- The Era of Big Data Three Database Components
UNIT 8A: Files & Databases Data Dictionary
8.1 MANAGING FILES: Basic Concepts • For defining data definitions & structure
• also called a repository or database schema, is a
Database document or file that stores the data definitions and
• is a computer-based collection of related data descriptions of the structure of data used in the
organized so that it can be conveniently accessed, database.
managed, and updated.
• is a collection of interrelated data and files. Metadata
• data that describes other data, such as the name, the
Data Storage Hierarchy data type (text, numeric, and so on), and the field
• consists of the levels of data stored in a computer size (expected length ofeach data for each field).
database: bits, characters (bytes), fields, records, and
tables (files). Utilities
• For maintaining the database
Hierarchy • are programs that allow you to maintain the database
• refers to a graded series of ordered groupings— by creating, editing, and deleting data, records, and
usually a pyramid-like ranking, with the most files.
important entities on the top.
Report Generator
Bits • For producing documents
• is the smallest unit of data the computer can store in • which is a program for producing an on-screen or
a database—represented by 0 for off or 1 for on. printed document from all or part of a database.

Character (Byte) Database Administrator


• is a letter, number, or special character. • are specialists who manage database software.
• who coordinates all related activities and needs for
Field (Column) an organization’s database.
• is a unit or category of data consisting of one or
more characters (bytes). 8.3 DATABASE MODELS

Record (Row) Database Model


• is a collection of related fields; it represents one • determines the information a database will contain
entry in a table. and how it will be used and how the items in the
database relate to one another.
File (Table)
• is a collection of related records. Hierarchical Database
• was one of the first models to be widely used.
Key Field • fields or records are arranged in related groups
• (primary key) is a field (or fields) in a record that resembling a family tree, with child (lower-level)
holds unique data that identifies that record from all records subordinate to parent (higher-level) records.
the other records in the table and in the database.
Network Database
8.2 DATABASE MANAGEMENT SYSTEMS • was created to represent a more complex data
relationship effectively, improve database
Database Management System performance, and impose a database standard.
• is software that enables users to store, modify, and • database was in part developed to solve some of the
extract information from a database. problems of the hierarchical database model.
• also called data-base software or database manager,
is software written specifically to control the Relational Database
structure of a database and access to the data. • grew out of the hierarchical and network database
models.
Data redundancy, or repetition, • relates, or connects, data in different tables of rows
• means that the same data fields (a person’s address, and columns through the use of primary keys, or
say) appear over and over again in different files and common data elements;
often in different formats.
Structured query language (SQL)
Modern DBMSs (SPEED) • is the standard query language used to create,
• are obviously much faster than manual data- modify, maintain, and query relational databases.
organization systems and faster than older computer-
based data storage arrangements. Query by example (QBE)
• the user asks for information in a database by using a
Data Integrity sample record form, or table, to define the
• means that data is accurate, consistent, and up to qualifications he or she wants for selected records;
date.
Object-Oriented Database Classification Analysis
• management system supports the modeling and • is a statistics pattern-recognition process that is
creation of data as objects. applied to data sets with more than just numerical
• uses “objects,” software written in small, reusable data.
chunks, as elements within database files.
UNIT 8B: Big Data, Information Systems, &
Multimedia Database Artificial Intelligence
• An object-oriented database is a multimedia Big Data
database; it can store more types of data than a • aims also to tap all that web data and other data that
relational database can. is outside corporate databases.
• Also called big data analytics, Analytics) typically
Hypertext Database “means applying the tools of artificial intelligence,
• which contains text links to other documents. such as machine learning, to vast new troves of data
beyond that captured in standard databases,” says
Hypermedia Database one report.
• which contains these links as well as graphics,
sound, and video. 8.5 THE EVOLVING WORLD OF BIG DATA

Object-relational database: Big Data


• or enhanced-relational, database models handle both • which is derived from a bunch of old and new data
hierarchical and network data (structured data) and sources, could lead to a revolution in measurement
relational and object-oriented data. and to better decision making.

Multidimensional Database Big Data Analytics


• is used to handle large amounts of data for decision- • is the process of examining large amounts of data of
making purposes. a variety of types to uncover hidden patterns,
• models data as facts, dimensions, or numerical unknown correlations, and other useful information.
measures for use in the interactive analysis of large
amounts of data for decision-making purposes. 8.6 INFORMATION SYSTEMS IN
ORGANIZATIONS: Using Databases to Help Make
8.4 DATA MINING Decisions
Information System
Data Mining • system is a combination of people, hardware,
• is sorting through large amounts of data to identify software, communication devices, and databases that
patterns and establish relationships. processes data and information for a specific
• the computer-assisted process of sifting through and purpose.
analyzing vast amounts of data in order to extract
hidden patterns and meaning and to discover new Correct and Verifiable
knowledge. • This means information must be accurate and
checkable.
Data Sources
• (a) point-of-sale transactions in files managed by file Correct
management systems on mainframes, • means information must include all relevant data.
• (b) databases of all kinds,
Concise
Data Cleansing/Scrubbing • means it includes only relevant data.
• whether from inside the company (internal data) or
purchased from outside the company (external data), Cost-Effective
must be fused together and then put through a • This means the information is efficiently obtained
process known as and understandable.

Metadata Current
• The cleansing process yields both the cleaned-up • means timely yet also time-sensitive, based on
data and a variation of it called historical, present, or future information needs.
• is essentially data about data; it describes how and
when and by whom a particular set of data was Accessible
collected and how the data is formatted. • This means the information is quickly and easily
obtainable.
Data Warehouse
• is a special database of cleaned-up data and The Horizontal Flow of Information Between Six
metadata. Departments
• Depending on the services or products they provide,
Regression Analysis most organizations have departments that perform
• takes a particular set of numerical data and develops six functions: research and development (R&D),
a mathematical formula that fits the data. production (or operations), marketing and sales,
accounting and finance, human resources
(personnel), and information systems (IS).
Transaction
THE VERTICAL FLOW OF INFORMATION • is a recorded event having to do with routine
BETWEEN MANAGEMENT LEVELS business activities. A transaction may be recorded
• Large organizations traditionally have three levels of manually or via a computer system and includes
management— strategic management, tactical everything concerning the product or service in
management, and operational management. These which the organization is engaged: production,
levels can be shown on an organization chart, a distribution, sales, and orders.
schematic drawing showing the hierarchy of formal
relationships among an organization’s employees. Batch Processing
• offline processing —that is, the data is gathered and
Strategic-Level Management processed in batches at periodic intervals, such as at
• Top managers are concerned with long-range, or the end of the day or once a week.
strategic, planning and decisions. This top level is
headed by the chief executive officer (CEO) along Real-Time Processing
with several vice presidents or managers with such • also known as online transaction processing (OLTP)
titles as chief financial officer (CFO), chief —that is, each transaction is processed immediately
operating officer (COO), and chief information as it is entered.
officer (CIO).
• are complex decisions rarely based on predetermined Input
routine procedures; they involve the subjective • to the system are transaction data: bills, orders,
judgment of the decision maker. inventory levels, and the like.

Tactical-level management: Output


• or middle-level managers, make tactical decisions to • consists of processed transactions: bills, paychecks,
implement the strategic goals of the organization. and so on.
• Decision is made without a base of clearly defined
informational procedures; it may require detailed Detail Report
analysis and computations. • contains specific information about routine
activities.
Operational-level management:
• Operational, or low-level (supervisory level), Management Information Systems
managers make operational decisions—predictable • transform data into information useful in the support
decisions that can be made by following well- of decision making, principally at the tactical level.
defined sets of routine procedures. These managers • is a computer-based information system that uses
focus principally on supervising nonmanagement data recorded by a TPS as input into programs that
employees, monitoring day-to-day events, and produce routine reports as output.
taking corrective action where necessary.
Summary Reports
Computer-Supported Cooperative Work Systems. • reports show totals and trends.
• organizations that have computer networks often use
groupware to enable cooperative work by groups of Exception Reports
people—what are known as • show out-of-the-ordinary data.

Computer-Based Information System Periodic Reports


• are combination of hard-ware, software, and • are produced on a regular schedule.
telecommunications networks that people build and
use to collect, create, and distribute data. Demand Reports
• produce information in response to an unscheduled
Office Information Systems demand.
• facilitate communication and collaboration between
the members of an organization and between Decision Support Systems
organizations. • are a specific class of computer-based information
• also called office automation systems (OASs), system that supports business and organizational
combine various technologies to reduce the manual decision-making activities generally at the
labor required in operating an efficient office managerial level.
environment and to increase productivity. • sophisticated information system is the decision
support system. A decision support system (DSS) is
Transaction Processing Systems a computer-based information system that provides a
• are computer-based systems that take transaction- flexible tool for analysis and helps managers focus
related information that is time-sensitive and on the future.
immediately process it and keep it current.
• is a computer-based information system that keeps Model
track of the transactions needed to conduct business. • is a mathematical representation of a real system.
Executive Support Systems Expert System
• are reporting tools that allow organizations to turn • is an interactive computer program used to solve
their data into useful summarized reports. These problems that would otherwise require the assistance
reports are generally used by executive-level of a human specialist.
managers for quick access to reports coming from all
company levels. Knowledge Base
• Is an easy-to-use DSS made especially for strategic • is an expert system’s database of knowledge about a
managers; it specifically supports strategic decision particular subject, including relevant facts
making. information, beliefs, assumptions, and procedures
for solving problems.
Expert Systems
• are computer programs that use artificial intelligence IF-THEN-ELSE rule
to solve problems within a specialized domain that • (“IF this happens, THEN do this, ELSE do that.”)
ordinarily requires human expertise. These expert • The basic unit of knowledge is expressed as an
systems represent the expert knowledge as data or
rules within the computer system. Inference Knowledge
• or knowledge-based system, is a set of interactive • engine is the software that controls the search of the
computer programs that helps users solve problems expert system’s knowledge base and produces
that would otherwise require the assistance of a conclusions.
human expert.
User Interface
8.7 ARTIFICIAL INTELLIGENCE • is the display screen. It gives the user the ability to
ask questions and get answers. It also explains the
Artificial intelligence reasoning behind the answer.
• is the branch of computer science concerned with
making computers behave like humans. Natural Language Processing
• is the branch of computer science that is devoted to • involves designing software that will analyze,
the creation of computer systems that simulate understand, and generate human languages.
human reasoning and sensation. • is the study of ways for computers to recognize and
understand human language, whether in spoken or
CONVENTIONAL AI: written form.
• based on machine learning
• attempts to mimic human intelligence through logic Intelligent Agents
and symbol manipulation, as well as statistics. • agent is software that assists people and acts on their
behalf, allowing them to delegate work to the agent.
Machine Learning • agent is a form of software with built-in intelligence
• which is the development of techniques that allow a that monitors work patterns, asks questions, and
computer to simulate learning by generating rules performs work tasks on your behalf,
from raw data fed into it.
Bots/ Network Agents
COMPUTATIONAL INTELLIGENCE: • these intelligent agents search the Internet and online
• Based on Heuristic databases for information and bring the results back
• relies less on formal logical systems and more on to you.
experimental and trial-and-error methods.
Shopping Bot
Heuristics • comparison engine, that helps users search the
• or rules of thumb, for solving a problem, rather than Internet for a particular product or service and then
hard-and-fast formulas or algorithms. brings up price comparisons, locations, and other
information.
Weak AI
• focuses on making machines act as if they were Pattern Recognition
intelligent. • is the computer-based identification of objects and
• makes the claim that computers can be programmed images by their shape, color, texture, temperature, or
to simulate human cognition and only some human other attribute.
cognition, to solve particular problems or reasoning • involves software that identifies recurring patterns in
tasks that do not encompass fully human intelligence what it is seeing and recognize the connections
between the perceived patterns and similar patterns
Strong AI stored in a database.
• focuses on making machines that really think—that
represent human minds. Virtual Reality
• makes the claim that computers can be made to think • is an artificial hardware-and-software-created
on a level that is at least equal to humans and environment that seems “real” and can be
possibly even be conscious of themselves. manipulated in real time.
• a computer-generated artificial reality, projects a
person into a sensation of three-dimensional space.
Simulators Singularity
• are devices that represent the behavior of physical or • or the technological singularity, a moment when
abstract systems. humans would have created self-aware, smarter-
than-human machines that are capable of designing
Robotics computers and robots that are better than humans
• involves the conception, design, manufacture, and can make today.
operation of robots, devices that perform humanlike
functions. Robots can be classified according to
locomotion or application
• is the development and study of machines that can
perform actions normally performed by living
beings.

Robots
• is an automatic device that performs functions
ordinarily executed by human beings or that operates
with what appears to be almost human intelligence.

Fuzzy Logic
• recognizes more than simple true and false values. It
works with ranges of values, solving problems in a
way that more resembles human logic.
• is a method of dealing with imprecise data and
uncertainty, with problems that have many answers
rather than one.

Neural Networks
• simulate the connections between nerve cells in the
human body.
• , or neural net, consists of a network of processors
that are interconnected in a way that is similar to the
connections between neurons, or nerve cells, in the
human body. The neural network is able to simulate
the behavior of biological neural networks, as in
pattern recognition, language processing, and
problem solving.

8.8. ARTIFICIAL LIFE, THE TURING TEST,


& THE SINGULARITY

Artificial life, or A-life,


• is the field of study concerned with “creatures”—
computer instructions, or pure information—that are
created, replicate, evolve, and die as if they were
living organisms.

Turing Test
• test, which is intended to determine whether a
computer possesses “intelligence” or “self-
awareness.”
• a human judge converses by means of a computer
terminal with two entities hidden in another
location—one a person typing on a keyboard, the
other a computer program.

Captcha
• A newer sort of “reverse” Turing test, one that’s
simple for humans but that can baffle sophisticated
computer programs, has been devised in the form of
cognitive puzzles called
• an acronym for “ completely automated public
Turing test to tell computers and humans a part.”

Singularity
• is the moment when humans will have created self-
aware, smarter-than-human machines capable of
designing computers better than humans can today.
Chapter 9: THE CHALLENGES Theft of Intellectual Property
OF THE DIGITAL AGE • Competing companies or individuals may break into
UNIT 9A: Security, Privacy, & Surveillance Concerns a company’s computer system to conduct industrial
espionage—obtain trade secrets that they can use for
9.1 SECURITY ISSUES: Threats to Computers competitive advantage.
& Communications Systems
THEFT OF TIME & SERVICES
Human Errors • The theft of computer time is more common than
• can be of several types. Quite often, when experts you might think. Probably the biggest instance is
speak of the “unintended effects of technology,” people using their employer’s computer time to play
what they are referring to are the unexpected things games, do online shopping, or dip into web
people do with it. pornography.

PROCEDURAL ERRORS Theft of Information


• Some spectacular computer failures have occurred • Bank robberies of the “stick ’em up” kind are on the
because someone didn’t follow procedures. decline, as criminals have discovered that bank
holdups just don’t pay—and there are greater
Software Errors rewards in online theft.
• We often hear about “software glitches” or “software
bugs.” Pharming
• in which malicious software implanted in your
Software Bugs computer redirects you to an impostor web page,
• is an error in a program that causes it not to work
properly. Trojan Horse
• programs (such as screen savers) that carry viruses
Dirty Data that perpetuate mischief without your knowledge.
• The expression “garbage in, garbage out” (GIGO)
describes what happens when ________, erroneous, Evil Twin Attack
incomplete, or outdated data—is input to a computer • in which an evil doer sets up a Wi-Fi hot spot that
system, as when you make typing errors and then your computer thinks offers safe access to a secure
don’t spell-check or grammar- check them. public network and then monitors your
communications and steals data you input.
Electromechanical Problems
• Mechanical systems, such as printers, and electrical 9.2 SECURITY SAFEGUARDS: Protecting
systems, such as circuit boards, don’t always work. Computers & Communications

Natural Hazards Security


• Whatever is harmful to property (and people) is • is a system of safeguards for protecting information
harmful to computer systems, and this certainly technology against disasters, system failures, and
includes natural disasters and weather extremes. unauthorized access that can result in damage or
loss.
Computer Crimes
• can be of two types. (1) It can be an illegal act Rule-based detection software:
perpetrated against computers or • In this technique, users such as merchants create a “
telecommunications, such as hardware theft, or negative file” that states the criteria each transaction
• (2) it can be the use of computers or must meet.
telecommunications to accomplish an illegal act,
such as identity theft. Predictive statistical model software:
• In this technique, tons of data from previous
Hardware Theft transactions are examined to create mathematical
• can range from shoplifting an accessory in a descriptions of what a typical fraudulent transaction
computer store to removing a laptop or cellphone is like.
from someone’s car.
Employee Internet management (EIM) software:
Software Theft • Programs made by Websense, SmartFilter, and Pearl
• can be large scale, on the level of industrial Echo-Suite are used to monitor how much time
espionage, as when in 2013 China’s biggest wind workers spend on the web and even block access to
turbine company was accused of conspiring with the gambling and porn sites.
employee of a Massachusetts wind company to steal
the American firm’s software for controlling the flow Internet filtering software:
of electricity. • Some employers use special filtering software to
block access to pornography, bootleg music
Softlift download, and other unwanted Internet sites that
• companies, colleges, or other institutions that buy employees may want to access.
one copy of a program and make copies for many
computers.
Electronic surveillance: National Security Agency (NSA)
• employers use various kinds of electronic • is the official organization in charge of cryptographic
surveillance that includes visual and audio design and decryption for the U.S. government.
monitoring technologies, reading of email and blogs,
and recording of keystrokes. Metadata mining
• is the practice of using computer algorithms
PIN (personal identification number) (formulas) to search vast collections of data for
• is the security number known only to you that is patterns.
required to access the system.
Cyberwarfare
Passwords • —warfare involving computers and the Internet in
• are special words, codes, or symbols required to which one nation attacks another’s information
access a computer system. systems.
• are one of the weakest security links, and most can
be easily guessed or stolen. UNIT 9B: Other Social, Economic,
& Political Issues
callback system,
• the user calls the computer system, punches in the Information technology
password, and hangs up. • technology allows the manipulation or falsification
of all sorts of data, including text, sound, and image,
Biometrics which has led to problems with truth and credibility.
• the science of measuring individual body
characteristics, tries to use these in security devices, Morphing
• —transforming one image into another—using
Biometric authentication devices image-altering software such as Adobe Photoshop
• authenticate a person’s identity by comparing his or
her physical or behavioral characteristics with a Auto-Tune
digital code stored in a computer system. • that “can take a vocal and instantly nudge it onto the
proper note or move it to the correct pitch. . . . [I]t
Hand-geometry systems: can transform wavering performance into something
• Also known as full-hand palm scanners, these are technically flawless.”
devices to verify a person’s identity by scanning the
entire hand, which, for each person, is as unique as a ENVIRONMENTAL BLIGHT
fingerprint and changes little over time. • Call it “techno-blight.” This is the visual pollution
represented by the forest of wireless towers, roof
Fingerprint Scanners antennas, satellite dishes, and all the utility poles
• These range from optical readers, in which you place topped with transformers and strung with electric,
a finger over a window, to swipe readers, such as phone, cable TV, and other wires leading off in all
those built into laptops and some handhelds, which directions.
allow you to run your finger across a barlike sensor.
GAMBLING
Iris-recognition systems: • is already widespread in North America, but
• Because no two people’s eyes are alike, iris scans are information technology makes it almost
very reliable identifiers. unavoidable. Instead of driving to a casino, for
example, gamblers can find slots, roulette, and
Face-recognition systems: blackjack just a quick mouse click away—and just
• The technology, which compares a live face image as quickly find themselves in debt.
with a digitized image stored in a computer, is used
now as a security system for some notebook PORNOGRAPHY
computers. • One of the biggest cultural changes in the United
States of the past quarter century has been the
Voice-recognition systems: widespread distribution of sexually explicit material.
• These systems compare a person’s voice with
digitized voice prints stored in a computer, which the Online blocking software:
individual has previously “trained” to recognize his • are designed to screen out objectionable material,
or her speech patterns. typically by identifying certain unapproved
keywords in a user’s request or comparing the user’s
Encryption request for information against a list of prohibited
• is the process of altering readable data into sites.
unreadable form to prevent unauthorized access.
ClearPlay
Data-Recovery Plan • uses filtering technology that allows parents to edit
• enables an organization to continue operating after a out the inappropriate parts of films on DVDs—such
natural or other type of disaster. as disturbing images, violence, nudity, swear words,
• is a method of restoring information-processing and ethnic and social slurs.
operations that have been halted by destruction or
accident.
V-Chip
• a device that is required equipment in all new
television sets with screen size of 13 inches or larger
sold after January 2000

Sexting
• is use of a smartphone or other mobile device to
send sexually explicit photos or videos; sometimes it
also refers to sexually charged text messages.

Cyberbullies
• , in which—generally but not exclusively—children
in the 9–18 age range use information technologies,
including the Internet, to unleash merciless taunting,
nasty rumors, humiliating pictures, and other put-
downs of fellow adolescents.

Cyberstalking
• an attacker harasses a victim using email, instant
messaging, or communications posted on the web,
hiding behind the anonymity afforded by the Internet
to stalk the victim undetected.

You might also like