Social and Professional Issues Flashcards

1
Q

What is the difference between Mechanical and Electronic Devices?

A

Mechanical devices use mechanical parts to work, while electronic devices use electricity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(Pre-history of Computing) What are the four key devices in the pre-history of computing?

A

Abacus (1000-500BC); Antikythera mechanism (~100BC), the oldest example of an analogue computer; First Mechanical Calculator (1623), made by Wilhelm Schickard, it could add and subtract 6 digit numbers; Leibniz’s calculating machine (1640), made by Gottfried von Leibniz. It could also multiply and divide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between an Analogue and a Digital computer?

A

A computer that uses a continuous signal to process is an analogue computer, while a computer that uses a discrete signal for its operation is called a digital computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happened with Charles Babbage and the Difference Engine 1?

A

He wanted calculations to be done by steam. He developed the Difference Engine 1, but it was never made due to fallouts with Joseph Clement, and eventually the governments £1700 funding was cut.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happened with Charles Babbage, the Analytical Engine and the Difference Engine 2?

A

After failing to build the Difference Engine 1, Babbage designed a general purpose programmable computing machine called the Analytical Engine. It had an input, output, store (memory), and mill (CPU). After that he developed the Difference Engine 2, an improved version of the original. Neither was ever built by him.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What did Ada Lovelace do?

A

She was the first computer programmer. She translated a french paper written by Luigi Menabrea and added notes to it. One of the notes was how to use the analytical engine to calculate Bernoulli numbers - called Note G.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What did Wilhelm Leibniz do?

A

In 1703 Leibniz described how binary numbers may be added, subtracted, multiplied and divided. He developed the concept of formal symbolic logic. He was too ahead of his time so nothing happened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What did Charles Boole do?

A

He developed the concept of using symbols to represent objects. He developed the mathematics for logical operations. He made it so we have the maths for logical operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What did Claude Shannon do?

A

He combined boolean algebra and circuit design. He provided mathematical techniques for building a network of switches to realize a specific logical function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 1st generation of electronic machines?

A

From 1950-1959. Key technology was the vacuum tube. Issues were heat, weight, size and reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 2nd generation of electronic machines?

A

From 1960-1968. Key technology was the transistor which enabled use of logic gates without vacuum tubes. The IBM system 360 introduces the concept of a computer family.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 3rd generation of electronic machines?

A

From 1969-1977. Key technology is the integrated circuit which allowed for devices to be smaller, cheaper and more reliable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 4th generation of electronic machines?

A

From 1978-2009. Key technology was the microprocessor. Computers started to become readily available for the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Moore’s Law?

A

The number of transistors on microchips doubles every two years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is cryptography?

A

The study of
mathematical techniques for securing
digital information, systems, and distributed
computations against adversarial attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Encryption and Decryption?

A

Encryption is when plaintext is converted into ciphertext, and Decryption is when ciphertext is converted back into plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the Caesar cipher?

A

Letters are shifted by a key k either backwards or forwards to encrypt and decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the mono-alphabetic cipher?

A

It defines a map from each letter to some letter of the alphabet, where the map is arbitrary,
instead of a fixed shift like in caesar cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is symmetric encryption?

A

Symmetric encryption is when both parties have the same key to encrypt and decrypt the data. This leads to the key distribution problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the key distribution problem?

A

With symmetric encryption, both parties need to have the same key. This key needs to be distributed confidentially, and there are two options: meeting in person, which is hard if there is a long distance, and if the key is reset you have to share it again; and using cryptography to share the key, which then brings up the same issue for sharing the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is asymmetric encryption?

A

With asymmetric encryption, there is a public key (used to encrypt data) and a private key (used to decrypt data). The keys are related, but it is computationally infeasible to derive the private key from the public key. Asymmetric encryption solves the key distribution problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a digital signature?

A

A digital signature is a way of verifying the authenticity of a digital document or message, created using a combination of the document or message and a private key. It can be verified using the corresponding public key and has the properties of integrity, non-repudiation, and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a digital certificate?

A

A digital certificate is an electronic document that is used to identify an individual, organization, or device, and to secure their online communications. Digital certificates are issued by a certification authority (CA), which verifies the identity of the applicant before issuing the certificate. Digital certificates contain the public key of the certificate owner, as well as other identifying information, and are signed by the CA’s private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why is quantum computing a threat to cryptography?

A

Quantum computers have the potential to break many of the cryptographic algorithms that are currently used to secure online communication, because they are able to solve certain mathematical problems much faster than classical computers. This is because some of the most widely used cryptographic algorithms rely on the fact that certain mathematical problems are hard to solve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How can you attack cryptography?

A

One way is a brute force attack, which involves trying every possible combination of keys or passwords until the correct one is found. This is time and power consuming however and may take ages. Another way is cryptanalysis, which involves using mathematical and statistical analysis to try break the encryption of a message/document by finding patters and weaknesses. Another way is a side-channel attack, which involves trying to extract information about a cryptographic system by observing either the time taken to perform certain operations, or the power it consumes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What was the Heartbleed Bug?

A

The Heartbleed bug is a security vulnerability in the open-source encryption software OpenSSL, which is widely used to secure internet communication and protect sensitive data. The Heartbleed vulnerability was discovered in April 2014. It allowed attackers to access and potentially steal sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What was the DROWN Attack?

A

The DROWN attack worked by taking advantage of servers that support both TLS and an older, less secure version of the SSL protocol, called SSLv2. The vulnerability allowed attackers to decrypt and read sensitive information, such as passwords and private keys, that were transmitted over secure connections. The DROWN attack was discovered in 2016.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is TOR?

A

TOR (The Onion Router) is a free, open-source software that enables anonymous communication over the internet. It works by routing internet traffic through a network of volunteer servers, which makes it difficult for anyone to trace the source of the traffic or to monitor the communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is HTTPS?

A

HTTPS (Hypertext Transfer Protocol Secure) is a protocol used to secure communication over the internet. It works by encrypting the communication between a web server and a client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is Zimmerman’s Law?

A

The natural flow of technology tends to
move in the direction of making surveillance
easier, and the ability of computers to track
us doubles every eighteen months.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What did Edward Snowden do?

A

Edward Snowden leaked a large amount of classified information about the National Security Agency (NSA) and its global surveillance activities. Snowden revealed the existence of secret agreements between the NSA and telecom companies, as well as the agency’s efforts to undermine encryption technologies used to protect online communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is End-to-end encryption?

A

End-to-end encryption is a type of communication security that ensures that only the sender and the intended recipient of a message can read it. The message cannot be read by anyone else, even if it is intercepted or stored by a third party (such as a service provider).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the pros of End-to-end encryption?

A

It protects the privacy of communication and prevents unauthorized access to sensitive information. It helps to ensure the security of online communication, particularly in the age of mass surveillance. Can be used to protect against cyber threats, such as hackers and malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are the cons of End-to-end encryption?

A

Can make it difficult for law enforcement agencies to access communication in the course of an investigation. Can be used by criminals and terrorists to evade detection and hide their activities. Can make it difficult for service providers to detect and prevent abuse or illegal activity on their platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is Intellectual Property?

A

Intellectual property refers to creations of the mind, such as inventions, literary and artistic works, symbols, names, and images, that are used in commerce. Intellectual property is protected by law, which allows the owner to control the use of their property and to profit from it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is copyright?

A

Copyright is a legal protection that covers original literary, artistic, and musical works, such as books, films, music, and software. It gives the owner the exclusive right to reproduce, distribute, and adapt the work. It is automatic in the UK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a trademark?

A

A trademark is a distinctive sign or symbol that is used to identify a product or service and to distinguish it from others. Trademarks can be words, phrases, logos, or other symbols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is a patent?

A

A patent is a legal protection that covers new and useful inventions, such as products, processes, and machines. It gives the owner the exclusive right to make, use, and sell the invention for a certain period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is a trade secret?

A

A trade secret is information that is not generally known and that gives the owner a competitive advantage. Trade secrets can include formulas, recipes, processes, or other confidential information. An example of a way round this is an NDA (Non-disclosure agreement).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What are free and open-source licenses?

A

Free and open-source licenses are legal agreements that allow users to freely use, modify, and distribute software and other types of intellectual property. They are designed to encourage the sharing and development of knowledge and technology, and to promote collaboration and innovation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are the pros of free and open-source licenses?

A

Promote the sharing and development of knowledge and technology. Encourage collaboration and innovation. Can lead to the creation of better and more efficient products and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are the cons of free and open-source licenses?

A

Can make it difficult for developers to make a profit from their work. Can lead to the creation of low-quality or unreliable products and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is Cybersquatting?

A

Cybersquatting is the action of using an Internet domain name with intent
to profit from a trademark belonging to someone else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is an apprentice hacker?

A

A beginner who has basic understanding of how to use attack toolkits. They are responsible for the vast majority of hacks, but they are easiest to defend against.

45
Q

What is a journeyman hacker?

A

A hacker who has the ability to modify attack toolkits. These attacks are harder to defend against.

45
Q

What is a master hacker?

A

They have the ability to create new attack toolkits. Their attacks are hard to defend against.

46
Q

What is a black hat hacker?

A

Black-hat hackers are people who tries to break
into systems and/or networks to exploit them for
malicious reasons

47
Q

What is a gray hat hacker?

A

Gray-hat hackers are between black-hat and
white-hat definition. They move between the two,
but they don’t use their skill for personal gain.

48
Q

What is a white hat hacker?

A

White-hat hackers are ethical hackers who find
vulnerability in systems to help strengthen the
security of these systems.

49
Q

What is a computer virus?

A

A computer virus is a piece of software attached to genuine
files (i.e., host file), designed to replicate itself and perform
malicious actions (e.g., delete files) when activated.

50
Q

What is a computer worm?

A

A computer worm is a standalone piece of software that
performs malicious actions and can replicate itself, without
the need of a host file to work.

51
Q

What is a backdoor?

A

A backdoor is a malware that allows access to a particular
system at a future time by bypassing normal layers of security
measures.

52
Q

What is a trojan horse?

A

A trojan horse is a program that looks like a genuine application
but includes a component that performs malicious actions (e.g.,
sending spam, installing virus, creating a backdoor).

53
Q

What is a ransomware?

A

A ransomware is a malware that encrypts files on a computer
and then displays a message demanding payment for the key to
decrypt the files.

54
Q

What is social engineering?

A

Social engineering is the manipulation of people into releasing sensitive
information or performing a task that often weakens security
measures.

55
Q

What is phishing?

A

Phishing is a type of fraud that an attacker sends a message to trick a
victim into revealing sensitive information or performing a task.

56
Q

What is hacktivism?

A

Using hacking for activism, with the goal of raising awareness for a cause or issue. Controversial and potentially illegal.

57
Q

What is cyberwarfare?

A

Cyberwarfare involves hacking a nation-state or international organization,
aiming to damage its computers, information networks, and other vital
systems.

58
Q

What is the Computer Misuse Act of 1990?

A

A UK law that criminalizes unauthorized access to computer systems and data, as well as ulterior intent (knowingly performing an unauthorized act with the intention of committing a crime) and unauthorized modification (knowingly causing unauthorized modification of computer material). Offenses include hacking, unauthorized access, and the distribution of malicious software. The act also includes provisions for law enforcement agencies to investigate and prosecute these crimes.

59
Q

What is the right to forget?

A

A UK principle allowing individuals to request the removal of personal data from online sources if it is no longer needed or its retention would infringe on rights. It balances the right to privacy with the public’s right to access information. This was made law in the Regulation of Investigatory Powers Act 2000.

60
Q

What is AI?

A

Artificial Intelligence is a branch of computer science that makes
computers perform tasks we think of as requiring human
intelligence.

61
Q

What is Robotics?

A

Robotics is a branch of engineering that makes mechanical devices
perform physical tasks that we think of as human-like activities.

62
Q

What are Neo-Luddites?

A

Neo-Luddites are people who see computers as enabling big corporations to operate more
efficiently in their pernicious goals of making more money and
destroying nature.

63
Q

What is a technological singularity?

A

Technological singularity is a hypothetical event in which AI surpasses human intelligence, leading to rapid technological progress and significant societal changes.

64
Q

Who were Cambridge Analytica?

A

Cambridge Analytica was a political consulting firm that used data mining and psychographic profiling to influence elections. They primarily did this via Facebook.

65
Q

What is Psychographic Microtargeting?

A

Psychographics is a methodology used to describe individuals by psychological attributes. Microtargeting is a direct marketing technique that track and target specific individuals (e.g., customers,
supporters, voters).

66
Q

What are the differences between misinformation and disinformation?

A

Misinformation is misleading information with no intent to deceive, and disinformation is misleading information with intent to deceive.

67
Q

What is a filter bubble?

A

A filter bubble is the intellectual or ideological isolation that might result
from the way online platforms (e.g., Google, Facebook) limit the exposure
to news and other information based on our past behavior, search
history, or demographic profile

68
Q

What is an echo chamber?

A

An echo chamber is a situation where individuals inside the chamber
distrust everybody on the outside of it. Outsiders are actively excluded and discredited.

69
Q

What is a computer model?

A

A computer model (or simulation) is a system designed to predict the
behaviour or outcome of a real-world phenomenon.

70
Q

What is explainable AI?

A

AI that is able to provide explanations for their predictions or decisions. These explanations allow humans to understand the reasoning behind the output of the AI system and can increase trust in the system.

71
Q

What is a Black-box model?

A

A machine learning model that is not interpretable, meaning its internal workings and prediction process cannot be understood.

72
Q

What is Closed-source software?

A

Software whose source code is not publicly disclosed and can only be used by purchasing a license from the owning company.

73
Q

What are the three key aspects of privacy?

A

Freedom from intrusion; Control of information about oneself; Freedom from surveillance.

74
Q

What do human rights say about privacy?

A

They say you have the right to live your life privately without government interference.

75
Q

What is the Younger Report?

A

In 1972, the Committee on Privacy—the Younger Report—identified three
areas of concerns when computers are used: Compiling personal profiles on single databases; Data matching across multiple databases; Unauthorized access to personal information.

76
Q

What is the Data Protection Act 1984?

A

The 1984 Data Protection Act is a UK law that regulates the collection, use, and storage of personal data. The act considers data subjects, data users, and computer bureau.

77
Q

What is a data subject?

A

An individual who is the subject of
personal data.

78
Q

What is a data user?

A

People who process and control data.

79
Q

What is a computer bureau?

A

Those who only process data.

80
Q

How can companies get around Data Protection Laws?

A

One way is TOS. TOS consists of legal agreements between a service provider and a user. It is legally binding. Usually they are really long and people skip over them.

81
Q

What is EU GDPR?

A

GDPR is an EU law that regulates how organizations process personal data.

82
Q

What are the 7 data protection principles of the GDPR?

A

Lawfulness, fairness, and transparency: Personal data must be processed lawfully, fairly, and in a transparent manner.

Purpose limitation: Personal data must be collected for specified, explicit, and legitimate purposes and not further processed in a way that is incompatible with those purposes.

Data minimization: Personal data must be adequate, relevant, and limited to what is necessary in relation to the purposes for which it is processed.

Accuracy: Personal data must be accurate and, where necessary, kept up to date.

Storage limitation: Personal data must be kept in a form that allows the data subject to be identified for no longer than is necessary for the purposes for which the personal data are processed.

Integrity and confidentiality: Personal data must be processed in a manner that ensures appropriate security of the personal data, including protection against unauthorized or unlawful processing and against accidental loss, destruction, or damage.

Accountability: The controller must be able to demonstrate compliance with the GDPR’s data protection principles.

83
Q

What is the right to be forgotten?

A

GDPR gives individuals “the right to be forgotten” which is the right of having personal information removed from services under
certain circumstances.

84
Q

What is Scope of Work in a contract?

A

A scope of work is the description of the work to be carried out in the
project. It consists of what the project will produce (product scope) and the work
needed to produce it (project scope).

85
Q

What is Scope Change and Scope Creep?

A

Scope Change is any changes or modifications to the original scope of work as defined in the software development contract. Scope Creep is the uncontrolled expansion of the project scope beyond what was originally agreed upon in the contract.

86
Q

What is Client’s Responsibility in a contract?

A

The contract should define what the client needs to do or provide. For example: providing essential data, obligation to cooperate.

87
Q

What is Project Control in a contract?

A

The contract must define how the software development will be managed. For example if may specify the appointment of project managers by both parties.

88
Q

What is Copyright Ownership in a contract?

A

Assignment or licensing arrangements for the software produced. Two possibilities: The copyright is assigned to the client once the software is completed, or the software house agrees to license the software, retaining the copyright.

89
Q

What is Confidentiality in a contract?

A

The contract must establish the responsibilities of each party not to
disclose confidential information about the other party. For example NDAs.

90
Q

What is Indemnity in a contract?

A

The contract must have an indemnity clause. It defines an obligation by
which one party engages to save another from a legal consequence of
the conduct of one of the parties, or of some other person. For example, the contract could define a protection for the client against
copyright infringements by the supplier.

91
Q

What is Warranty and Maintenance in a contract?

A

The contract must describe the service to be provided after delivery. The warranty defines mechanisms to be used in case that deliverables do
not work as expected by the client.

92
Q

What are Arbitration Procedures in a contract?

A

The contract must describe the procedures to be followed in the case of a
dispute, for example scope creep. Without arbitration procedures, the court will rely on the following sources
to interpret the contract: The contract itself, Inducements (the statements made by the parties during negotiation), Implied terms.

93
Q

What is Termination Criteria in a contract?

A

The contract must have the criteria that enable either party to end the
contract. For example performance criteria, breach of contract or agreement.

94
Q

What is Product Liability?

A

Product liability is the liability of manufacturers for injuries caused by
defective products. If a software defect causes injury or loss to the product’s users, the injured parties
may be able to sue as a result.

95
Q

What are the three types of software claims?

A

Strict liability: the defendant is responsible for injuring another person, regardless of negligence or intent;

Negligence: a failure to do what a “reasonable person” would do (e.g., reasonable development practices);

Breach of warranty: a failure to meet certain standards of quality (e.g., fitness for purpose).

96
Q

What are Ethics?

A

Ethics is the study of morality. Morality relates to beliefs involving right/wrong and good/bad.

97
Q

What is Descriptive Morality?

A

Certain codes of conduct put forward by a society or a group.

98
Q

What is Normative Morality?

A

A code of conduct that would be put forward by all rational people.

99
Q

What is the Universalizability Principle?

A

A moral statement that applies in one
situation must apply in all other situations that are relevantly similar.

100
Q

What is the Principle of Impartiality?

A

All persons are considered equal and should
be treated accordingly.

101
Q

What is the difference between consequentialist theories and nonconsequentialist theories?

A

Consequentialist (or teleological) theories claim that what makes
an action right is its consequences. Nonconsequentialist (or deontological) theories claim that whether an
action is right or wrong depends primarily on the nature of the action
itself.

102
Q

What are the 5 professional dilemmas

A

Should you claim experience in your resume that you do not have? Should you delay the launch of a product that you believe is unsafe? Should you disclose a relationship that might influence your judgement? Should you share a copy of copyrighted material with a colleague? Should you report a colleague who is doing something illegal?

103
Q

Why do Professional Ethics matter in computer science?

A

IT professionals have great knowledge and great reach, but others cannot easily check their work.

104
Q

What does the BCS code of conduct say on The Public Interest?

A

Working together to address issues in your profession and in wider society, you want everyone to have access to IT. You share what you know, uphold standards and conduct yourself professionally and fairly at all times.

105
Q

What does the BCS code of conduct say on Professional competence
and integrity?

A

You have integrity and show competence, but you know you don’t know everything, that’s why you continuously learn and grow and never take on tasks that you don’t have the skills and resources to complete.

106
Q

What does the BCS code of conduct say on Duty to relevant authority?

A

You work with due care and diligence, acting in your client or company’s best interests at all times. You take personal and collective responsibility for your actions while maintaining discretion and ethical standards.

107
Q

What does the BCS code of conduct say on Duty to profession?

A

As a BCS member, you’re an ambassador for the IT industry and use your voice to help promote it positively to the world. You support your IT colleagues and other members in their growth both personally and professionally