Csc 208 (It And Society) Flashcards

(48 cards)

1
Q

What is ict

A

This is the technology required for information processing, in particular it involves the use of computer, communication devices and software applications to convert, store , protect , process, transmit and retrieve information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is information

A

This can be defined as knowledge gotten from reading study research or investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is communication

A

It is the process in which information is exchanged between individuals using symbols signs and verbal interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is technology

A

Technology involves the use of scientific knowledge resources and experience to create a product or process that can fulfill human needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List some communication technologies and their time lines

A

1) cuneiform writing- Sumerians 3500 BV
2) alphabet- Phoenician 1500 Bc
3) paper - tsai lun of china 105bc
4) printer -1454
5) telegraph line - 1793
6) telephone - 1896
7) television - 1925
8) computer- 1941
9) photocopier- 1958
10) satellite communications- 1963
11) first internet called apanet - 1969

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List the dates of the early counting machine

A

1) Chinese abacus-200bc
2) Egyptian abacus- 500bc
3) Napier’s bones - John Napier 1620
4) Pascaline- Blaise pascal 1653
5) Leibniz rechner- gottfried Wilhelm von Leibniz 1673
6) Jacquard loom- Joseph Marie Jacquard 1801
7) mechanical calculating machine-Charles Babbage 1823
8) mark 1 - Harvard university 1941

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Write on 1st generation computer their date , technology used , examples , disadvantages

A

Date : 1940-1956

Technology used :
1) vacuum tubes - electric tubes the size of a light bulb used as the computer internal component.
2) punch cards- to store data
3) magnetic tapes- released in -1957 is a faster more compact way of storing data

Example ENIAC (1946) UNIVAC (1951) by Presper Eckert and William Mauchly

Disadvantages
1) vacuum tubes generates a lot l heat
2) they burn out easily
3) those operating the computer do not k ke the problems are in the programming machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Write on 2nd generation computer their date , technology used , examples , advantages

A

Date : 1956-1963

Technology used
1) transistors - created by John Bardeen, William Shockley and Walter houser Brattain , is a small device used to transfer electronic signals across resistors

Example
CDC 3600 ibm 1401

Advantages over
1) it’s is smaller
2) generates less heat
3) doesn’t require booting time
4) consumes less energy
5) faster and more reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Write on 3rd generation computer their date , technology used , examples , advantages

A

Date :1964-1971

Technology used - integrated circuits (this is an electronic circuit on a piece of silicon)
Silicon chips were introduced in 1961

Example- ibm 370 cd 7600 b2500

Advantages
1) silicon chips are reliable compact and cheaper
2) hardware and software were sold separate lt Which created the software industry
3) customer service industry flourished

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Write on 4th generation computer their date , technology used , examples , advantages

A

Date :1971-present
Technology: micro processor created by intel in 1971 is a Very Large Scale Integrated circuit that contains thousands off transistors
Example apple maicintosh
Dell
IBM
Acer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

5ths gen

A

Present and beyond
Silicon x chips , processors, virtual reality , intelligently systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Example of new era computer

A

Mainframe computers
Mini
Personal
Super
Mobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Computer systems

A

This consist of a set of hard ware and software which processes data in a meaningful way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Impact of ict on the society

A

1) paperless environment
2) borderless communication
3) faster communication speed
4) low communication cost
5) reliable means of communication
6) effective transfer of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What’s is computer ethics

A

Is is a set of moral standards or values that serves as a guideline for computer users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List the Ten Commandments that the United States institute of computer ethics

A

1) you shall not use the computer to harm other people
2) you shall not interfere with other people computer work
3) you shall not snoop around other peoples computers files
4) you shall not use the Dk computer to steal
5) you shall not use the computer to bear false witness
6) you shall not copy or use proprietary software you did not pay for
7) you shall not use other people computer resources without authorization or proper compensation
8) you shall not appropriate other people’s intellectual output
9) you shall think about the societal consequence of the program you are writing or system you are designing
10) you shall always use the computer in a way that ensures respect and consideration for your fellow humans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Guidelines on the use of email

A

1) use individual email address to send individual opinions
2) keel the identity, name and password a secret to avoid the misuse of your email without your knowledge
3) ensure the maims in the inbox is well within the computers storage
4) scan files regularly to avoid the transmission of viruses from one computer to another
5) email must be active to promptly reply all necessary action for any matter
6) do not send confidential information that can be used to tarnish other people or country
7) print out only relevant documents that can be used in the future to save costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

List 5 unethical computer code of conduct and ethical code o conduct

A

1) modifying certain information in the internet, affecting its accuracy
2) selling i information to third parties without owners authorization
3) using information without authorization
4) involvement in stealing software
5) invasion of privacy

Ethical
1) sending warning about viruses to other computer users
2) asking for permission before sending business advertisement to other people
3) using information that has been authorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an unethical behavior

A

It is any code of conduct that does not conform with the approved standard of social or professional behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is computer law and list examples of computer laws in Malaysia

A

This refers to all areas under the law tryst requires an understanding of computer technology such as hard ware software and the internet

Examples
1) the Malaysian communication and multimedia act
2) the computer crime act 1997
3) telemedicine act 1997

21
Q

Why do we need computer law and ethics

A

1) respecting ownership
2) respecting property
3) respecting privacy

22
Q

Similarities between ethics and law

A

1) they both guide the user on how to use the computer
2) the prevent any crime
3) they create a healthy environment where computers can be used to contribute to a better life

23
Q

Differences between imputed ethics and law

A

Ethics
1)Serves as a guideline doe computer users while laws are to control computer users
2) ethics are universal and an be applied anywhere while law can vary from country to country
3) ethics are not a punishable offense if violated while violation of computer laws can lead to punishment
4) ethics are judged in a moral standard while laws are judged on a judicial standard
5) users may choose to ignore or follow computer ethics while computer laws must be strictly adhered to

24
Q

What is ip and what is ip law

A

Intellectual property refers to unique works created by inventors authors and artist that have value in the market place

Intellectual property law is a branch of law that protects and grant special rights to creators on their work allowing them to control usage, distribution and reproduction

25
What are the four types of intellectual property protection
1) patent for invention 2) trademark for brand identity 3) design for appearance 4) copyright for materials
26
What is information privacy
This is described as the right of an individual or company to deny or restrict the the collection and use o their information
27
List and explain the ways in which the computer threatens our privacy
1) cookies - these are small text files that websites or web applications store in our computer or other devices to remember information about you or your browsing activity 2) electronic profile - this is the combination of data in a database sold on the internet by a company to interested parties. 3) spyware - these are programs that collect information about a user without his/her knowledge , and communicate the gathered information to an outside source while the user is online
28
Why do we need privacy and how can privacy be protected
A) we need privacy for . Confidentiality . Anonymity . Security B) privacy can be protected through the use of . Privacy laws . Utility programs like anti spyware, anti virus, fire wall etc
29
What is a computer threat and list the examples
A computer threat is any potential harm that can impact a computer system or network, potentially causing data loss , unauthorized access and damage. Eg . Malicious code . Hacking - this is defined as the unauthorized access to a computer system by a hacker. . Natural and environmental disasters - flood, fire, earthquakes, excessive heat. . Theft .
30
What is a malicious code and give examples and who are the agents shoe malicious code
A malicious code is a software designed to x cause harm, disrupt and damage a computer system or network The agents for malicious code are the writer of the code and the person who causes its distribution Eg . Virus - a virus is a malicious software that spreads between computers and causes damage to data and software. . Trojan horse - this is a malicious software disguised as a legitimate program to trick users into downloading it. . Logic bomb - this is a malicious code that goes of when a specific condition has been met eg a time bomb that goes off when a certain time or date reaches. . Back door and trap door - this is a feature in a program that allows someone access to the program with special privileges. . Worm - this is a program that copies and spread itself through a network
31
Difference between worm and virus
1) worms operates through a network While viruses spread through any medium 2) spreads copies as a stand alone program While viruses speed copies as programs attached to another program
32
List the types of computer theft and how it can be prevented
1) using the computer to steal goods resources information and money 2) stealing the computer Prevention 1) prevent access by using locks, smart-cards and passwords 2) prevent portability by restricting the hardware from being moved 3) detect and guard all exits, record any hardware transported
33
What are security measures and list the 6 types of security measures
1) security measures are precautionary measure taken towards possible danger or damage TYPES 1) data backup- this is a program for file duplication 2) cryptography- this is the process o hiding information by altering the actual information representation eg an APA can be represented by I. Most cryptosystem requires a key such as a password to encrypt or decrypt a message. 3) antivirus- this is a program that protects the imputed system from viruses by identifying and removing the virus. 4) anti spyware- these are applicationprogram also know as software tracker or spy bots that’s are used to remove spyware. Example of popular spyware are 1. Spybot search and destroy 2. Ad-ware 3. Spy ware blaster 5) firewall- this is a piece of hardware's or software which functions in a network system to prevent some communication forbidden by the security policy. 6) Human aspect- this refers to the user and intruder of the system. The most common problem is the lack off achieving a good information security proceedure. Example . Organization self awareness - organizations needs to be aware of the people they work with as threats can come from inside not just outside. . Organizational user self awareness- provide employees with adequate training and the importance of security as even the most high end security system cannot protect the systems from incompetent employees. . Individual user self awareness- users need to be security conscious and careful as not all threats may look like one. Do not download software from unreliable sources or give out important information to strangers
34
The traditional type of crypto system used in the computer system is And list the ways in which antivirus identifies viruses
A) a symmetric secret key system. Bi) virus signature - aka virus definition is a specific pattern of the virus code ii) Inoculation of the program files- The antivirus records information such as the file size and creation date in a separate inoculation file. It then uses this information to detect if the virus has tampered with the data describing the innoculated file
35
List and compare the types of firewall
1) screening router . Simplest . Can only see addresses and the type of service protocol . Screens based on connection rules 2) proxy gateway . Somewhat complex . Can see the full text of communication . Screen based on behavior proxy 3) guard . The most complex . Can see the full text of communication . Screen based on the interpretation of the message content
36
How does antivirus and anti spyware protect the computer Then list the security measures for hacking natural disasters and theft
1) limiting connectivity 2) allowing only authorized media for the loading of data and software 3) enforcing mandatory access controls 4) blocking the virus for the computer program . Hacking - firewall and cryptography . Natural disaster- back up . Theft - human aspect
37
List the data protection procedures
1) back up files 2) detect virus and do cleanup 3) warn others of virus attack
38
Ways of preventing and detecting illegal access to system files
Detecting - tcpwrappers- the will prevent access to application level rather than the socket level like the iptable and ipchain - trap wires- will detect and report any changes in the thousands of strategic system files Preventing - use anlpasswords to make password cracking difficult - run tcpwrappers to check if the name and Ip address can be provided by the DNc - use a callback system to prevent the unauthorized use of a stolen password
39
How to prevent illegal root access
1) sudo- which stand for superuser do is a program in Unix linux and similar operating systems like Mac OS that allows users to run programs in the form of other users 2) patch - this supplies small updates to the software provided that the source code is available
40
What is internet filtering and list and explain the methods of internet filtering
This is the method of preventing or blocking access to certain material or content on the internet Methods 1) keyword blocking- this method uses a list of banned words or objectionable terms, as a page is downloading, it filter searches for these words and if found it will block the page, stop the page from downloading, block out banned words or even shutdown the entire browser 2) site blocking- companies maintains a list of dubious internet sites, the soft ware prevent access to the sites on this list 3) web rating system- website are rated based on nudity sex violence and language. The recreational software advisory council is responsible for rating websites and content on the internet
41
What are cyber laws
Cyber law refers to any law relating to protecting the internet and other online communications technologies
42
What is computer crimes and list and explain examples
Computer crimes is destined as any criminal activity that is related to the use of computers . TYPES 1) computer fraud - is defined as having an intent to take advantage over or causing loss to other poeple, Mostly on monetary basis, through the use of the computer e.g email hoaxes, investment schemes , program fraud 2) copyright infringement - it is the violation of the right secured by a copyright. it involves the illegal copy and reproduction of a copyright material or product by the black market group. 3)computer theft- computer theft can refer to the physical theft of the computer and its components or the use of the computer to cause losses to other people. 4) computer attack- this can be defined as an activity taken to disrupt the equipments of a computer system, change processing control and corrupt stored data.
43
what is computer security, list and explain the types of computer security.
computer security is defined as protecting our computers and the information they contain from unwanted access, damage and modification. TYPES 1)hardware security- these are the security measures taken to protect the hardware specifically the computer and other related components eg of security measures are pc lock, keyboard lock, smart cards and biometric devices 2) software and data security- these are security measures used to protect the software and prevent loss of data files. eg activation code and serial number,, back up for data loss 3) network security - these are the measures used to protect the network system eg the use of firewalls.
44
personal computer security checklist
. do not eat drink or smoke near the computer . do not keep the computer near open doors and windows . clean the equipments regularly . do not subject the computer to extreme temperatures . make backup copies of all files . do not open any unknown emails received .keep all disk in a locked container . use a surge protector
45
what is authentication and what are the methods of authentication
authentication is a process where users verify that they are who they say they are methods of authentications are 1] biometric devices- these are devices that translates personal characteristics into a digital code that is compared with a digital code stored in the database 2] callback systems- these are checking systems that authenticate the user authentication is important to safeguard against unauthorised access and use
46
what is verification, list and explain the methods of verification
verification is the process of proving or disproving the correctness of a system with respect to a certain formal specification methods 1] user identification - this is the process f validating a user e.g using a user name and password to log into a system t prove you are the valid user 2] processed object - this refers to something a user has such as an identification card, security token or mobile phone, that can be used to validate them selves
46
what is controversial content and list and explain the types of controversial content
controversial content refers to any information that causes a disagreement in opinion and may cause disruption of peace because different people and culture may have different views about the content. example 1. pornography- this is any content or material such as a book, picture or recording that depict erotic behaviour and is intended to cause sexual excitement 2. slander this is a legal term for the communication of false and malicious statements about someone.
47
impact of pornography and slander the Malaysian society
PORNOGRAPHY 1] it can lead to criminal activity such as the exploitation of women and children 2] it can lead sexual addiction and perversion 3] can develop low moral value toward men woman and children 4] can erode good religious, social and cultural beliefs and behaviours.