You are on page 1of 8

Exercise 1 4

Reliability: 1.-The probability that it will produce correct outputs up to some given time. Reliability is enhanced by features that help to avoid, detect and repair hardware faults. A reliable system does not silently continue and deliver results that include uncorrected corrupted data. Instead, it detects and, if possible, corrects the corruption, retrying an operation for transient or intermittent errors, or else, for uncorrectable errors, isolating the fault and reporting it to higher level recovery mechanisms, or else by halting the affected program or the entire system and reporting the corruption. 2.- Reliability is an attribute of any computer-related component (software, or hardware, or a network, for example) that consistently performs according to its specifications. It has long been considered one of three related attributes that must be considered when making, buying, or using a computer product or component

Integrity: 1.- In computing, data integrity refers to maintaining and assuring the accuracy and consistency of data over its entire life-cycle, and is an important feature of a database. Data integrity means that the data contained in the database is accurate and reliable. Data warehousing and business intelligence in general demand the accuracy, validity and correctness of data despite hardware failures, software bugs or human error. Data that has integrity is identically maintained during any operation, such as transfer, storage or retrieval.

2.- The accuracy and consistency of stored data, indicated by an absence of any alteration in data between two updates of a data record. Data integrity is imposed within a database at its design stage through the use of standard rules and procedures, and is maintained through the use of error checking and validation routines.

Security: 1.- Computer security is information security as applied to computers and networks. The field covers all the processes and mechanisms by which computerbased equipment, information and services are protected from unintended or unauthorized access, change or destruction. Computer security also includes protection from unplanned events and natural disasters.

2.- the term security refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. Most computer security measures involve data encryption and passwords. Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism. A password is a secret word or phrase that gives a user access to a particular program or system.

Privacy: 1.- Is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy partially intersects security, including for instance the concepts of appropriate use, as well as protection of information.

2.- Information privacy is the privacy of personal information and usually relates to personal data stored on computer systems. The need to maintain information privacy is applicable to collected personal information, such as medical records, financial data, criminal records, political records, business related information or website data.

Anonymity: 1.- Without any name acknowledged, as that of author, contributor, or the like: an anonymous letter to the editor; an anonymous donation, of unknown name; whose name is withheld: an anonymous author. 2.- Meaning "without a name" or "namelessness". In colloquial use, anonymity typically refers to the state of an individual's personal identity, or personally identifiable information, being publicly unknown. There are various situations in which a person might choose to withhold their identity. Acts of charity have been performed anonymously when benefactors do not wish to be acknowledged.

Intellectual property: 1.- Intellectual property (IP)refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce. IP is divided into two categories: Industrial property, which includes inventions (patents), trademarks, industrial designs, and geographic indications of source; and Copyright, which includes literary and artistic works such as novels, poems and plays, films, musical works, artistic works such as drawings, paintings, photographs and sculptures, and architectural designs. 2.- Intellectual property (IP) is a legal concept which refers to creations of the mind for which exclusive rights are recognized.Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property rights include copyright, trademarks, patents, industrial design rights, trade dress, and in some jurisdictions trade secrets.

Authenticity: 1.- Authenticity refers to the truthfulness of origins, attributions, commitments, sincerity, devotion, and intentions.

2.- A close relative of authentication, authenticity is the process of ensuring that a message received is the same message that was sent and has not been tampered with or altered. Lawyers, as a real-world case in point, are fanatical about ensuring that evidence is authentic and has not been tampered with or altered in any way to ensure a fair hearing for the accused. This is called chain of custody and is a critical concept in reference to cybercrime.

Digital division: 1.- Renowned for our easy-to-update, beautifully designed, cuttingedge Web sites, we work with you in partnership to create the Web site of your dreams. By providing all-inclusive services, or helping on specific problem areas, we remain flexible, always. 2.- The socioeconomic and other disparities between those people who have opportunities and skills enabling them to benefit from digital resources, especially the Internet, and those who do not have these opportunities or skills: programs that help to bridge the digital divide between rich and poor countries.

Equality of access: 1.- The concept that all persons should have equal rights of access, for example, to sporting facilities. Equality of access does not necessarily lead to equality of opportunity. 2.- The ideal of equal access is fundamental to American democracy and the rest of the world. Today, people are constantly discussing and debating whether or not everyone has equal access to everything. The equal access of technology has become one of the greatest issues of them all.

Suveillance: 1.- Close observation or supervision maintained over a person, group, etc., esp one in custody or under suspicion. 2.- Is the monitoring of the behavior, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting.Surveillance is therefore an ambiguous practice, sometimes creating positive effects, at other times negative. It is sometimes done in a surreptitious manner. It most usually involves observation of individuals or groups by government organizations.

Globalization: 1.- The process of increasing the connectivity and interdependence of the world's markets and businesses. This process has speeded up dramatically in the last two decades as technological advances make it easier for people to travel, communicate, and do business internationally. 2.- Is the process of international integration arising from the interchange of world views, products, ideas, and other aspects of culture.Put in simple terms, globalization refers to processes that promote world-wide exchanges of national and cultural resources. Advances in transportation and telecommunications infrastructure, including the rise of the Internet, are major factors in globalization, generating further interdependence of economic, and cultural activities.

Cultural diversity: 1.- The cultural variety and cultural differences that exist in the world, a society, or an institution: Dying languages and urbanization are threats to cultural diversity. 2.- Is the quality of diverse or different cultures, as opposed to monoculture, as in the global monoculture, or a homogenization of cultures, akin to cultural decay.

Policies 1.- A computer security policy defines the goals and elements of an organization's computer systems. The definition can be highly formal or informal. Security policies are enforced by organizational policies or security mechanisms. A technical implementation defines whether a computer system is secure or insecure. These formal policy models can be categorized into the core security principles of: Confidentiality, Integrity and Availability. 2.- A security policy is a document that outlines the rules, laws and practices for computer network access. This document regulates how an organization will manage, protect and distribute its sensitive information (both corporate and client information) and lays the framework for the computer-networkoriented security of the organization.

Standards: 1.- Written definition, limit, or rule, approved and monitored for compliance by an authoritative agency or professional or recognized body as a minimum acceptable benchmark. Standards may be classified as government or statutory agency standards and specifications enforced by law, proprietary standards developed by a firm or organization and placed in public domain to encourage their widespread use, and voluntary standards established by consultation and consensus and available for use by any person, organization, or industry. 2.- A conspicuous object (as a banner) formerly carried at the top of a pole and used to mark a rallying point especially in battle or to serve as an emblem.

Protocols: 1-. In computing, a protocol is the language used by computers while talking with each other. In its simplest form, a protocol is the rules used in talking and communication between computers. 2.- A set of rules or procedures for transmitting data between electronic devices, such as computers. In order for computers to exchange information, there must be a preexisting agreement as to how the information will be structured and how each side will send and receive it. Without a protocol, a transmitting computer.

People and machines: 1.-The interaction of humans with IT hardware. 2.- The use of IT systems brings significant advantages, for instance in easeof use, being available 24/7, or through its userather than exposing humans to a potentially hazardous environment .

Digital Citizenship: 1.- Can be defined as appropriate behaviour that represents the responsible, ethical and legal approach that individuals take in anysituation with respect to the use of IT. 2.- The norms of appropriate, responsible behavior with regard to technology use.

You might also like