CHAPTER 3 EMERGING TECHNOLOGY ETHICS Flashcards

1
Q

What is a Social Networking Site?

A

> a website that encourages members in its online community to share their interests, ideas, stories, photos, music, and videos with other registered users.
enables users to communicate thru text, voice and video chat and play games together online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Database?

A

a collection of data organized in a manner that allows access, retrieval, and use of that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Database Management Systems (DBMS) allow users to?

A

a. create a computerized database
b. add, modify and delete data in the database
c. sort and retrieve data from the database
d. create forms and reports from the data in the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of DBMS?

A

a. Microsoft Access
b. SQL
c. MongoDB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Big Data?

A

Big Data refers to the Large, Diverse sets of information that grow at every-increasing rates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Important 8vs for the Big Data Development?

A
  1. Volume - the amount of data to be processed at a given time
  2. Velocity - The speed of the data coming in and the speed of the transformed data leaving the computer
  3. Variety - the heterogeneous data sources needed to be identified and normalized before computing
  4. Viability - a model’s ability to represent reality
  5. Value - the worth of data to the customers
  6. Veracity - uncertainty in the data which may or may not be trusted
  7. Validity - refers to how accurate and correct the data is for its intended use
  8. Volatility - how old does your data need to be before it is considered irrelevant, historic, or not valuable any longer?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Digital Security Risk?

A

is any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information or processing capability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Common Digital Security Risks include :

A

a. internet and network attacks
b. unauthorized access and use
c. hardware theft
d. software theft
e. information theft
f. system failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Botnet/Zombie Army?

A

is a group of compromised computers or mobile devices connected to a network, such as the Internet, that are used to attack other networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Denial of Service Attack(DoS Attack)?

A

an assault whose purpose is to disrupt computer access to an Internet Service, such as the web or email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Spoofing?

A

a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to safeguard your computer systems?

A

a. use antivirus software
b. be sus of unsolicited email attachments
c. scan removable media bfore using it
d. implement firewall solutions
e. create access control that defines who can access a computer, device, or network when they can access it and what actions they can take while accessing it
f. maintain an audit trail that records in a file, both successful and unsuccessful access attempts
g. use username, password and pin number
h. use two step verification
i. encrypt your data or information
j. use of product activation
k. restrict physical access
l. back up your computer/file regularly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is technology ethics?

A

moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Frequently discussed areas of computer ethics?

A

a. unauthorized use of computers, mobile devices and network
b. software theft (piracy)- unauthorized or illegal duplication of copyrighted software
c. information accuracy
d. intellectual property rights
e. codes of conduct
f. green computing
g. information privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Intellectual Property Rights?

A

right to which creators are entitled for their unique and originals works. The creation could vary such as ideas, inventions, art, writing, process, product names and logos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Definition of Copyright?

A

gives authors, artists and other creators of original works exclusive rights to duplicate, publish and sell their materials.

17
Q

Definition of Trademark.

A

sign which distinguishes the goods and services of one trader from those of another. A mark includes a device, brand, heading, label, ticket, name, signature, word, letter, numeral or any combination of these.

18
Q

What is a patent?

A

an exclusive right granted for an invention, which is a product or a process that provides, in general, a new way of doing something, or offers a new technical solution to a problem.

19
Q

What is Computer Ethics?

A

a concept in ethics that addresses the ethical issues and constraints that arise from the use of computers, and how they can be mitigated or prevented.

20
Q

What is code of conducts?

A

includes an internal guideline and an external statement of corporate values and commitments.

21
Q

Definition of Information Privacy.

A

privacy of personal information especially information stored in a computerized system

22
Q

3 categories of Information Privacy.

A

a. Internet Privacy
b. Financial Privacy
c. Medical Privacy

23
Q

3 ways of green computing?

A

a. use notebook computers rather than desktop computers
b. minimize the use of paper and properly recycle waste paper
c. dispose of e-waste according to federal, state and local regulations