Social and ethical issues Flashcards

1
Q

has the correct data been entered into the computer system?

A

reliability and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Has somebody deliberately or accidentally changed the data?

A

reliability and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Are there any inconsistencies in the data?

A

reliability and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How trustworthy is the computer hardware?

A

reliability and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How often does the hardware fail?

A

reliability and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How trustworthy is data stored on the computer?

A

reliability and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is the data stored on the computer outdated?

A

reliability and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can the computer hardware be protected from damage or unauthorized modification?

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can the data be protected from being changed, deleted or copied by unauthorized people?

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who is allowed to access the hardware and the files stored on a computer?

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can we protect the computer systems from computer virus and other malware?

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can we protect the computer systems from hackers?

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What data should be considered private and what shouldn’t?

A

privacy and anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can data be kept private?

A

privacy and anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is it acceptable (or to what extent is it acceptable) to reduce privacy for the purpose of public safety?

A

privacy and anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can intellectual property of people be protected?

A

intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What intellectual property issues are specifically related to IT?

A

intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What intellectual property rights do people have?

A

intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What authentication method should be used?

A

authenticity

20
Q

How secure are the authentication methods?

A

authenticity

21
Q

what are some consequences of identity theft?

A

authenticity

22
Q

Do all people have equal opportunities to accessing the benefits of IT?

A

the digital divide and equality of access

23
Q

Can the information published on websites be read by all those it is intended for?

A

the digital divide and equality of access

24
Q

How does the cost of IT hardware and software limit certain groups of people in using IT?

A

the digital divide and equality of access

25
Q

Do all people have the same opportunities for using the resources of the Internet?

A

the digital divide and equality of access

26
Q

should employees be monitored by their bosses?

A

surveillance

27
Q

Under what circumstances is this acceptable?

A

surveillance

28
Q

How can people be controlled with the help of IT?

A

surveillance

29
Q

what benefits and problems does control offer?

A

surveillance

30
Q

. How can IT help reduce the boundaries between cultures, countries and continents?

A

globalization and culture diversity

31
Q

How can the globalization of the WWW be both a threat and an opportunity to minority groups?

A

globalization and culture diversity

32
Q

What influence does the dominance of the English language on other cultures?

A

globalization and culture diversity

33
Q

Is the Internet a threat or an opportunity to the culture of a society?

A

globalization and culture diversity

34
Q

what should a policy contain?

A

policies

35
Q

who is responsible for making the policy?

A

policies

36
Q

what are possible consequences if users (or organisations) do not adhere to the policy?

A

policies

37
Q

How long will the used standards and protocols be supported?

A

standards and protocols

38
Q

What problems do people encounter when they want to upgrade old hardware systems?

A

standards and protocols

39
Q

how well do people accept new technology?

A

people and machine

40
Q

which task are performed better using robotics and which task are performed better by a person?

A

people and machine

41
Q

Which tasks are done better with the help of a computer and which tasks are not?

A

people and machine

42
Q

What are possible health and safety consequences arising from the use of ICT?

A

people and machine

43
Q

what is the appropriate behaviour when using the computer

A

digital citizenship

44
Q

What precautions should users take to minimize the possibility of data loss?

A

digital citizenship

45
Q

how can computers be used ethically?

A

digital citizenship