Issues and Impacts Flashcards

(55 cards)

1
Q

What are some environmental issues associated with the

raw material extraction

for digital devices? (4)

A
  • some raw materials are hazardous and pose a health risk
  • radioactive metals use can contaminate air, soil and groundwater
  • some of the metals used are precious metals and in short supply
  • in some regions of the world, mining of raw materials is poorly regulated
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some negatives of

excavation?

(4)

A

it causes:
- extensive damage to the local environment
- scarring to the landscape
- contamination to water supplies
- danger to wildlife habitats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some environmental issues associated with the

use of water

for digital devices? (3)

A
  • manufacturing semiconductors is highly water intensive
  • this can result in water shortages
  • untreated wastewater can cause environmental pollution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some environmental issues associated with the

production

of digital devices? (2)

A
  • raw materials are shipped to factories which are often thousands of miles away
  • shipment of components involves using packaging using plastic which may be disposed of in landfill sites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some environmental issues associated with the

use of energy

for digital devices? (2)

A
  • most energy for transport and production is supplied by fossil fuels
  • burning fossil fuels contributes to global warming
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the

EU Restriction of Hazardous Substances?

(RoHS) and when was this introduced?

A

a directive which restricts the use of the six most hazardous materials used in the manufacture of computing technology, forcing manufacturers to replace them with safer materials

2013

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define

replacement cycle.

A

the period of time between the purchase of assets such as digital devices and their replacement with equivalent assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the

Waste Electrical and Electronic Equipment Regulations?

(WEEE) and when were these introduced?

A

a set of regulations that set targets for the collection, recycling and recovery of computing technology and other electronic items

2013

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What measures can make

data centres more energy efficient?

(4)

A
  • using hot aisle/cold aisle configuration to increase cooling system efficiency
  • using blanking panels to minimise recirculation of hot air
  • sealing the floor to prevent cooling losses
  • investing in research to develop a new, less energy-hungry alternative to silicon-based data storage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is

personal data?

and what are some examples of this? (7)

A

any information relating to an identified or identifiable living person

  • name
  • age
  • gender
  • ID numbers (e.g. driving licence, passport)
  • location
  • genetic information
  • medical information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the

General Data Protection Regulation?

(GDPR) and when was this introduced?

A

a set of data protection rules setting out the rights of individuals and the obligations of organisations who collect, process and store data

2018

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the GDPR say about

consent?

A

Organisations have to ask for the consent of people if they are going to collect and process their personal data. This consent must be:
- freely given
- specific
- informed
- able to be revoked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define

robotics.

A

the design, contruction, operation and use of robots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is

artificial intelligence?

A

the ability of a machine to learn independently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some examples of

algorithmic bias?

(2)

A
  • Amazon AI job tool had a bias against female job applicants
  • Hate speech detectors have a bias against black people
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why does

algorithmic bias occur?

A

because the data that the machine uses for its learning is unrepresentative of reality or reflects existing undesirable prejudices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is

Intellectual Property?

and give two examples.

A

a unique creative product of the human mind

e.g. a piece of software, a computer game

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does

copyright say?

and what is the negative of this?

A

The creators of unique works own the copyright to their own work. No one can use the work without permission and may have to pay a fee. Only the creator has the right to make copies or perform it in public, or give another person permission to do so.

Copyright only protects the expression of an idea, not the idea itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does a

patent do?

and how long does it last?

A

Protects the idea or design of an invention.

(Rather than just a particular expression of it.)

20 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do you get a

patent?

A

You have to be able to demonstrate that what you have invented is distinct from anything else that already exists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a

trademark?

A

a type of intellectual property consisting of a recognisable sign, design or expression which identifies products or services of a particular source from those of others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is

open-source software?

A

Software that is available on the internet. This type of licence allows anyone to use, study, modify and distribute the code and pass it on to others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is

proprietary software?

A

Closed source software. Source code is protected. Users are not allowed to modify it.

24
Q

Define

cybersecurity.

A

the protection of computer systems from unauthorised access or being damaged or made inaccesible

25
# Define cyberattack.
any kind of electronic attack on a computer system, server, network or other IT device
26
# What are some reasons for a cyberattack? | (4)
to: - gain access to data contained within a system - delete or modify information - make the system unavailable for use - physically damage a device connected to the network
27
# What is malware?
a shortening of 'malicious software', including any software designed to: - disrupt the functioning of a computer system - gain unauthorised access to a computer system - gather information from the users without their knowledge
28
# What are the key types of malware? | (5)
- viruses - trojans - key loggers - worms - ransomware
29
# What is a virus?
a malicious program code that is hidden within other programs or files
30
# How do viruses | spread? (3 steps)
1. They are designed to make copies of themselves. 2. These copies are inserted into other programs or files. 3. The new programs or files are then passed to other computers by users themselves.
31
# What are the effects of viruses?
corrupt or delete data on a disk
32
# What are worms?
malicious software programs, in their own right - they do not exist inside other programs or files
33
# How do worms | spread? (2 steps)
1. They replicate themselves. 2. They distribute themselves independently of a user. | e.g. through a network connection, or by sending themselves in emails
34
# What are the effects of worms? | (2)
- affect the performance of a network by consuming bandwidth - create back doors into systems, that allow unauthorised, invisible access
35
# What are trojans?
Malicious software programs, in their own right. They do not exist inside other programs or files. They do not replicate themselves. They do not attach themselves to other files.
36
# How do trojans | spread?
They must be installed onto a system by a computer user. In order to convince a user to install them, they may masquerade as legitimate software. ## Footnote They might also be installed by clicking on an email attachment that executes in the computer.
37
# What are the effects of trojans? | (4)
- produce anomalous or unpredictable behaviours - delete files, destroy system information - transmit screenshots or screen presses to another computer or person - create back doors to computer systems
38
# What is ransomware?
a type of malware that blocks users from using their computer or accessing the data stored on it, until a fee has been paid to release it
39
# How is ransomware commonly delivered?
in malicious spam emails, where users are enticed to click on an attachment or link
40
# What is a key logger?
a type of monitoring software that is short for 'keystroke logger' | this is a type of spyware
41
# What does a key logger | do?
Records the individual keys pressed on a computer's keyboard (without the user's knowledge). A record of all the keys is kept in a log. The logs can be saved to a local file or sent over the network to another computer or person
42
# Define social engineering.
exploiting or taking advantage of human behaviour, usually weaknesses
43
# What are the key types of social engineering? | (4)
- pretexting (blagging) - phishing - baiting - quid pro quo
44
# What does pretexting | involve?
A malicious person invents a scenario to entice a victim to divulge sensitive information or act in a way that they may not in other circumstances.
45
# What is a phishing attack?
an attempt to get sensitive, confidential information from the user of a computer system or service
46
# What might a phishing attack look like?
An email that asks the user to update details at a bank. Once the user clicks on a link within the email, a website that looks and acts like the real website will open, but when the user enters their login details they are passed to the attacker, who will use them for financial gain.
47
# What is baiting?
an attack that exploits a person's curiosity or greed
48
# What might a baiting attack look like?
The victim is enticed by the offer of something for free, such as a music download or an app upgrade. As part of the process for obtaining the freebie, the victim may divulge sensitive information.
49
# What might a quid pro quo attack look like?
The victim is offered something of benefit, either a service or product. Once the victim has accepted, the attacker may ask for access to the victim's machine, to install the required software. They may request that other security software be turned off to facilitate the installation.
50
# What are the two key types of anti-malware software?
1. The program scans for malware using a database of known malware definitions (signatures). If the anti-malware program detects a file that matches the definition, it will flag it as potential malware. 2. Heuristics identifies malware by behaviours without having to uniquely identify the problem responsible for it.
51
# What are some examples of rules for identifying malware? | (5)
- a program which tries to copy itself into other programs - a program which tries to write directly onto the disk - a program which tries to remain resident in memory after it has finished executing - a program which decrypts itself when run - a program which attempts to manipulate files which are required by the operating system
52
# What are the two types of encryption?
- asymmetric encryption - symmetric encryption
53
# How does asymmetric encryption work?
Data is encrypted and decrypted using two different keys (private and public). The message is encrypted using the public key and decrypted by the private key.
54
# How does symmetric encryption work?
Algorithms encrypt and decrypt a message using the same key. | Both ends of the transmission must know the exact same shared key.
55
# Define acceptable use policy.
a set of conditions or rules that a network user must agree to comply with before they are allowed to use the network