Unit 22: Vocabulary

To pass this unit, please study the 18 vocabulary words below.
US

commandment
a rule to be observed as strictly
US

The CTO commanded the project managers to ship the product by the end of the year or face the consequences.
US

CEI (Computer Ethics Institute)
a nonprofit research, education, and public policy organization focused on the issues, dilemmas, and challenges of advancing information technology within ethical frameworks
US

The CEI's mission is to facilitate the examination and recognition of ethical issues in the development and use of modern information technologies.
US

consent
permission, allowing
US

I needed written consent from my boss to change the security settings on the server.
US

consequences
results; things that happen as a result of a previous action
US

The server admin was unaware of the dire consequences of installing the wrong version of Apache web server.
US

copyright infringement
to use somebody's content without proper permission
US

The webmaster committed copyright infringement when he copied an article from another website.
US

cracking
criminal hacking; exploiting security holes to gain unauthiorized access to computer systems
US

Ethically speaking, cracking is no different from other forms of illegal trespassing or stealing.
US

dependent
decided or controlled by something else
US

The software utility was dependent on a specific architecture of CPU in order to run at optimal speed.
US

encounter
to meet or come across
US

If you meet an alien from another planet it is called a "close encounter of the third kind".
US

ethics
a branch of philosophy that addresses questions about morality (what is right and wrong)
US

As computers become more powerful the need for computer ethics classes is increasing.
US

Internet privacy
general techniques and technologies used to protect sensitive data, communications, and preferences
US

The US government routinely tries to expand and restrict Internet privacy laws.
US

Norbert Wiener
(1894–1964) is considered The forefather of Computer Ethics
US

The Norbert Wiener Award for Social and Professional Responsibility is awarded annually by CPSR.
US

phishing
obtaining sensitive information through a deceptive email campaign, while pretending to be a trusted person or business
US

The man thought his bank was asking him to change his password, but it was actually a phishing scam trying to trick him into revealing it.
US

photoshopping
digitally transforming or altering a photograph in order to misrepresent the original
US

Magazines routinely photoshop pictures of models in order to remove pimples, moles, and wrinkles
US

privacy policy
a statement or a legal document that discloses the ways an organization gathers, uses, and stores the end user's data.
US

Every website that collects user information should have their privacy policy posted online
US

reputation
the common opinion about someone or something
US

Being hacked can negatively affect a company's online reputation.
US

snoop
to search for private information without permission
US

The IT security officer was caught snooping on an employee's private email account in order to steal her personal bank account number.
US

social engineering
a broad term for any online or offline technique that uses deception to trick people into giving out confidential information
US

The hacker used social engineering methods to trick a bank teller into giving out another user's password.
US

tedious
boring, repetitive, or slow or long
US

Debugging code can be a tedious process without the correct knowledge and tools.
Go to Unit Activities