Table+of+Contents

Table of Contents
2.1.1 System Fundementals

Topic 01**:** by Kent Harvath Topic 02: by Joseph Toyoshima Topic 03: by Roger Maue Topic 04: by Ken Moyer Topic 05: by Akira Jackson Topic 06: by HeeJun Son Topic 07: by Takafumi Topic 08: by Sung Hwa Chun Topic 09<span class="wiki_link_ext">: <span style="color: rgb(0, 0, 153);">by Andrew Leung Topic 10<span class="wiki_link_ext">: <span style="color: rgb(0, 0, 153);">by Sam Simaskul <span class="wiki_link_ext">Topic 11: <span style="color: rgb(0, 0, 153);">by Matthew Wilder <span class="wiki_link_ext">Topic 12: <span style="color: rgb(0, 0, 153);">by Tommy Chang and Xiao Xiao <span class="wiki_link_ext">Topic 13: <span style="color: rgb(0, 0, 153);">by <span style="padding: 0pt; color: rgb(0, 0, 153);">Tomer <span style="color: rgb(0, 0, 153);"> Lapidot <span class="wiki_link_ext">Topic 14: <span style="color: rgb(0, 0, 153);">by Xiao Xiao <span class="wiki_link_ext">Topic 15: <span style="color: rgb(0, 0, 153);">by Raymon Ohmori <span class="wiki_link_ext">Topic 16: <span style="color: rgb(0, 0, 153);">by Romeo Wu


 * <span class="wiki_link_ext" style="font-size: 130%;">2.1.2 Networks

Topic 17** <span style="color: rgb(0, 0, 153);">Vulnerability of networks to intrusion **by Isaku Oba** Topic 18:<span class="wiki_link_ext"> Ability to implement different levels of access **by Raymen Ohmori** Topic 20 Implications of Collaboration, Groupware and Data sharing **by Chaan Tutlam** Topic 21 Threat of compromising data integrity in shared databases **by Simon Ruiz** Topic 22 Additional threats to privacy on a network compared with stand-alone computers **by Tanay Khandelwal** Topic 23 The need to authenticate information **by Vaibhav Bhandari** Topic 24 Intellectual property protection on networks, for example, site licences, file access **by Su Chen** Topic 25 Equality of access for different groups and individuals **by Dhruv** Topic 26 Ability to monitor users (surveillance); concerns of people regarding monitoring **by Taro Kondo** Topic 27 Ability to filter incoming data **by Alex Young** Topic 28 Ability to control personal, business, military, government operations over a wide geographical area **by** **Ronald Chu** Topic 29 Increased globalization, for example, EFT, EDI, e-commerce **by Aditya Kumar** Topic 30 Need for interface standards **by Dwarkesh Iyengar** Topic 31 Need for network use policy **by Marek Strzepek** Topic 32 **Key Terms by Chirag Garg** LAN, WAN, client, server, Ethernet, access, access permissions, login, password, firewall, sysadmin, UPS, EDI Topic 33 Security Measures **by Wilanth James** Topic 34 Network types, for example, Intranet, Internet, VPN **by Oliver Chan** Topic 35 Encryption and SSL **by Nitish Gautam** Topic 36 E-commerce **by Harsh Sharma**
 * <span class="wiki_link_ext">Topic 19 **<span style="color: rgb(0, 0, 153);">Implications of network failure, for example, banks, transportation, hospitals, schools **by Haider**

Topic 37 Bug-free software **by Tommy Chuang** Topic 38 Software piracy **by Ken Moyer** Topic 39 Interfaces adapted for the disabled **by Dwarkesh** Topic 40 Language independence of GUIs, making computers accessible to a very wide range of users, including those with special needs, and very small children **by Raymon** Topic 41 Use of password protection to prevent unauthorized access **by Andrew** Topic 42 Globalization of software **by Roger** Topic 43 **Key terms** **by Ronald/Wilanth** software (application), shareware, public domain, freeware, commercial software, integrated software, user manual, registration card, serial number, warranty, copyright, licence (multi-user, single user, site licence), compression/decompression, back-up, back door (trapdoor), upload/download, wizard, template. Topic 44 GUI, command-line interface, voice recognition **by Oliver**
 * <span class="wiki_link_ext" style="font-size: 130%;">2.2.1 Software Fundamentals **

<span class="wiki_link_ext" style="font-size: 130%;">Topic 45 ** Privacy of Information in Different Cultures <span style="font-size: 169%; color: rgb(0, 0, 153);">by Matthew Wilder ** Topic 46 **Rights of individuals with respect to the storage of personal data <span style="color: rgb(0, 0, 153);">by Taro Kondo ** Topic 47 **Social consequences of outdated or incorrect data stored in databases <span style="color: rgb(0, 0, 153);">by Simon Ruiz ** Topic 48 **Social consequences of the release of sensitive data stored in databases** <span style="color: rgb(0, 0, 153);">by HeeJun Topic 49 **Legislation to prevent access <span style="color: rgb(0, 0, 153);">by Aditya Kumar ** <span style="font-size: 130%; color: rgb(0, 0, 153);"> Topic 50 **Responsibility for the security of data stored in databases from different perspectives, for example, the developer, the user and the management of an organization <span style="color: rgb(0, 0, 153);">by Akira ** Topic51 Acountability for the negative social effects caused by insecure databases **by Haider Topic52** **Ethical issues related to the collection and use of personal data <span style="color: rgb(0, 0, 153);">by Joseph ** Topic 53 **Issues related to the selling of data stored in databases <span style="color: rgb(0, 0, 153);">by Kent Harvath ** Topic 54 <span style="font-size: 130%; color: rgb(0, 0, 153);"> **Key Terms <span style="color: rgb(0, 0, 153);">by Chirag Garg ** Topic 55 **Flat-file database versus relational database <span style="color: rgb(0, 0, 153);">by Sam **
 * <span class="wiki_link_ext" style="font-size: 130%;">2.2.2 Databases and Spreadsheets **


 * <span class="wiki_link_ext" style="font-size: 130%;">2.2.3 Word processing and desktop publishing **


 * <span class="wiki_link_ext" style="font-size: 130%;">2.2.4 Images, Sound and Presentations **


 * <span class="wiki_link_ext" style="font-size: 130%;">2.2.5 Modelling and Simulations **


 * <span class="wiki_link_ext" style="font-size: 130%;">2.2.6 Tutorials, training and wizards (assistants)

<span class="wiki_link_ext"> **


 * <span class="wiki_link_ext" style="font-size: 130%;">2.3.1 The Internet **


 * <span class="wiki_link_ext" style="font-size: 130%;">2.3.2 Personal and Public Communications **

Robots & Ethics:
 * <span class="wiki_link_ext" style="font-size: 130%;">2.4.1 Robotics **


 * <span class="wiki_link_ext" style="font-size: 130%;">2.4.2 Artificial Intelligence and Expert Systems **


 * <span class="wiki_link_ext" style="font-size: 130%;">3.1 Business and Employment **


 * <span class="wiki_link_ext" style="font-size: 130%;">3.2 Education **


 * <span class="wiki_link_ext" style="font-size: 130%;">3.3 Health **


 * <span class="wiki_link_ext" style="font-size: 130%;">3.4 Arts, Entertainment and Leisure **


 * <span class="wiki_link_ext" style="font-size: 130%;">3.5 Science and the Environment **


 * <span class="wiki_link_ext" style="font-size: 130%;">3.6 Politics and Government

[|Steve Martens ITGS Syllabus]

<span style="color: rgb(0, 0, 153);"> **<span style="color: rgb(0, 0, 153);">