Thursday, May 14, 2009

AssignmEnts


"Intellectual Property"

These are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law.[1] Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.

The majority of intellectual property rights provide creators of original works economic incentive to develop and share ideas through a form of temporary monopoly.

Although many of the legal principles governing intellectual property have evolved over centuries, it was not until the late 20th century that the term intellectual property began to be used as a unifying concept. [2]

"Intellectual property Rights"

Intellectual property rights are the rights given to persons over the creations of their minds. They usually give the creator an exclusive right over the use of his/her creation for a certain period of time.

Monday, April 27, 2009

cyber terrorist - a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.

perpetrator
- The entity from the external environment that is taken to be the cause of a risk. An entity in the external environment that performs an attack, ie hacker.

cyber criminal - are persons that committed crime using a computer and the internet to steal a person's identity or sell contraband or stalk victims or disrupt operations with malevolent programs.


Sources: http://thefreedictionary.com, www.tsl.state.tx.us/ld/pubs/compsecurity/glossary.html,

Sunday, April 19, 2009

Are I.T Iformation Techology (I.T) Workers Professional

Yes, Because As Student Professional Worker, Information Technology (IT) under direct supervision is responsible for, but not limited to, the following essential job functions: assists technical and professional staff performing a wide-range of system hardware and software end-user support, including problem diagnosis and resolution; provides installation and support of hardware and software; provides technical support for personal computers and local area network components; moves and relocates computer related equipment; performs inventory and stock management of supplies; assists in programming and software development, as needed; assists IT professional staff in the configuration, preparation or upgrade of routers and switches on County computer data networks, as needed.

Wednesday, April 15, 2009

Ten Commandments of Computer Ethics:

Thou shalt not use a computer to harm other people.
Thou shalt not interfere with other people's computer work.
Thou shalt not snoop around in other people's computer files.
Thou shalt not use a computer to steal.
Thou shalt not use a computer to bear false witness.
Thou shalt not copy or use proprietary software for which you have not paid.
Thou shalt not use other people's computer resources without authorization or proper compensation.
Thou shalt not appropriate other people's intellectual output.
Thou shalt think about the social consequences of the program you are writing or the system you are designing.
Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.