THIS IS With Host... Your 100 200 300 400 500 Software Software Piracy GUI Authori zation Digital Assistance Globalization of software.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
© Vera Castleman Software Grade 10. What is software? A program is a collection of instructions to do a job. Programs are collectively known as SOFTWARE.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
By Mary Anne Poatsy, Keith Mulbery, Eric Cameron, Jason Davidson, Rebecca Lawson, Linda Lau, Jerri Williams Chapter 9 Fine-Tuning the Database 1 Copyright.
Objective Understand web-based digital media production methods, software, and hardware. Course Weight : 10%
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
Social and Ethical Issues Piracy & Copyright. Piracy.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Tutorial 5 Downloading and Storing Data. XP Objectives Learn what FTP is and how it works Explore how to use a Web browser to transfer files Navigate.
Intellectual Property
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
1 Intellectual Property Includes the results of intellectual activities in the arts, sciences, and industry Includes the results of intellectual activities.
Application Software CSC151.
Applications Software
HOMEWORK PAGE STAND ALONE PROGRAMS FUNCTION ON THEIR OWN AND SOMETIMES CANNOT SHARE DATA WITH OTHER PROGRAMS. INTEGRATED SOFTWARE COMBINES.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
Professional Ethics for Computer Programmers
AN INTRODUCTION TO LINUX OPERATING SYSTEM Zihui Han.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
ACCB 133 Information Technology and Accounting Applications Lecture 6: Application Software.
A Quick Review of Unit 1 – Recognizing Computers Computing Fundamentals © CCI Learning Solutions.
Canadian Copyright Act Became law in January 1924 and was amended in 1988 (Phase I) The second phase amendments were completed in 1997 when Bill C-32.
Jeopardy Computer Technology Vocabulary 2 Template By Carl Lyman © September 2001.
DATA COMMUNICATION DONE BY: ALVIN SAMPATH CARLVIN SAMPATH.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
 2002 Prentice Hall Chapter 4 Software Basics: The Ghost in the Machine.
Digital Planet: Tomorrow’s Technology and You
Section 2 Software.
Software.
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
APPLICATION SOFTWARE. EXAMPLE S What’s an application software ? Application software consists of programs designed to make users more productive and/or.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
Introduction to IT Essentials of Computing Lecture – 02.
Types of Electronic Infection
Software Categories Figure 3-1.
Computer Applications to Business
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Adobe Dreamweaver CS3 Revealed CHAPTER SIX: MANAGING A WEB SERVER AND FILES.
MIS 105 LECTURE 1 INTRODUCTION TO COMPUTER HARDWARE CHAPTER REFERENCE- CHP. 1.
MSBCS-BCSI-1 Students will identify computer system components MSBCS-BCSIII-8 Students will examine basics of networking Computer Basics & Terminology.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Software AS Module Heathcote Ch.20. Importance of Information  Information technology is fundamental to the success of any business  The information.
WELCOME TO JEOPARDY OperationSoftwareApplications/Programs InterfaceLaws Grab Bag
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
Allexa Mitchels IBCC Sets of instructions which hardware follows in order to perform tasks. Software.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
CONTENT  Introduction Introduction  Operating System (OS) Operating System (OS) Operating System (OS)  Summary Summary  Application Software Application.
Security and Ethics Safeguards and Codes of Conduct.
Software Installation and Copyrights Basic Computer Concepts Installation Basics  Installation Process  Copy files from distribution disks.
Systems Software. Systems software Applications software such as word processing, spreadsheet or graphics packages Operating systems software to control.
MULTIMEDIA TECHNOLOGY SMM 3001 OPERATING SYSTEM. how operating systems software manage the computer how operating systems software manage the computer.
Animation The rapid display of a sequence of images of 2-D or 3-D artwork/model positions, in order to create an illusion of movement.
Computers Tools for an Information Age Software Systems and Applications.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
B USINESS W EB P AGE D ESIGN Review for State Competency Exam
INTRO. To I.T Razan N. AlShihabi
UNIT 19 Data Security 2.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
System And Application Software
Objective Understand web-based digital media production methods, software, and hardware. Course Weight : 10%
Part 3.
Information Technology Ms. Abeer Helwa
Computers Tools for an Information Age
Presentation transcript:

THIS IS

With Host... Your

Software Software Piracy GUI Authori zation Digital Assistance Globalization of software

What is software that is less commonly known as payware and is computer software that is produced for sale or that serves commercial purposes. A 100

Commercial Software

A 200 What is software that has no flaws or errors?

Bug-free software A 200

What is integrated software? A 300

Integrated software is software for personal computers that combines the most commonly used functions of many productivity software programs into one application A 300

A 400 What is software

Written programs or procedures or rules and associated documentation pertaining to the operation of a computer system and that are stored in read/write memory A 400

What is the difference between shareware and freeware? A 500

The person downloading the software will eventually have to make a payment while using shareware. The person downloading freeware will never have to make a payment because it is simply free software A 500

What is software piracy? B 100

Software piracy or copyright infringement refers to several practices which involve the unauthorized copying of computer software. B 100

Jim buys a Maroon 5 CD and illegally burns three copies of it for his friends. This CD is copyrighted. What crime has Jim just committed? B 200

Software piracy B 200

What is the set of exclusive rights granted to the author or creator of an original work, including the right to copy, distribute and adapt the work? These rights can be licensed, transferred and/or assigned. B 300

Copyright B 300

Copyright holders frequently refer to copyright infringement as "theft". In law copyright infringement does not refer to actual theft, but an instance where a person exercises one of the exclusive rights of the copyright holder without what? B 400

authorization B 400

The enforcement of copyright is the responsibility of who? B 500

The copyright holder B 500

C 100 What does GUI stand for?

Graphic User Interface C 100

What does GUI represent? C 200

The information and actions available to a user through graphical icons and visual indicators C 200

A GUI uses a combination of what to provide a platform the user can interact with, for the tasks of gathering and producing information? C 300

technologies and devices C 300

C 400 The most common combination of such elements in GUIs is the ________ paradigm, especially in personal computer.

WIMP (window, icon, menu, pointing device") C 400

What uses a physical input device to control the position of a cursor and presents information organized in windows and represented with icons? C 500

The WIMP style of interaction C 500

What is a user manual? D 100

A user guide or user's guide, also commonly known as a manual, is a technical communication document intended to give assistance to people using a particular system. D 100

What is a wizard? D 200

A software wizard is a user interface element that presents a user with a sequence of dialog boxes that lead the user through a series of well-defined steps. Tasks that are complex, infrequently performed, or unfamiliar may be easier to perform using a wizard. D 200

What is a template? D 300

The term template, when used in the context of word processing software, refers to a sample "fill-in-the-blank" document that can be completed either by hand or through an automated iterative process, such as with a software assistant

What is a license (multi-user, single-user, site license) D 400

Allowing an individual or group to use a piece of software. Nearly all applications are licensed rather than sold. There are a variety of different types of software licenses. Some are based on the number machines on which the licensed program can run whereas others are based on the number of users that can use the program. Most personal computer software licenses allow you to run the program on only one machine and to make copies of the software only for backup purposes. Some licenses also allow you to run the program on different computers as long as you don't use the copies simultaneously. D 400

What is a warranty? D 500

guarantee: a written assurance that some product or service will be provided or will meet certain specifications D 500

Any unwanted electronic device E 100

A password is a secret word or string of character that is used for what? E 100

authentication E 200

The overall password system must, of course, be designed for sound security, with protection against what? E 200

Computer virus, “the man in the middle attack”, hackers, and unauthorized personnel E 300

What is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge? E 300

Encryption E 400

What is the point of “backing- up” files? E 400

To copy files to a second medium (a disk or tape) as a precaution in case the first medium fails E 500

What is a backdoor (trapdoor)? E 500

F 100 What is public domain?

A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected F 100

What does the intellectual property law include? F 200

Copyright, patents, and trademarks. F 200

F 300 Does the term “uploading” and “downloading”?

In computer networks, to download means to receive data to a local system from a remote system, or to initiate such a data transfer. Examples of a remote system from which a download might be performed include a webserver, FTP server, server, or other similar systems. F 300

F 400 What does compression/decompression mean?

F 400 Data compression is particularly useful in communications because it enables devices to transmit or store the same amount of data in fewer bits. There are a variety of data compression techniques, but only a few have been standardized. The CCITT has defined a standard data compression technique for transmitting faxes and a compression standard for data communications through modems In addition, there are file compression formats, such as ARC and ZIP.

F 500 What is public domain?

The public domain is an intellectual property designation for the range of content that is not owned or controlled by anyone. These materials are public property, and available for anyone to use freely (the "right to copy") for any purpose F 500

Thank You for Playing Jeopardy! Game Designed By C. Harr-MAIT