LESSON 8: TRENDS AND ISSUES IN COMPUTING Flashcards

(82 cards)

1
Q

is a set of moral principles that govern the behavior of a group or individual.

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Refers to the buying and selling of goods or services using the internet, and the transfer of money and data to execute these transactions.

A

E-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is often used to refer to the sale of physical products online, but it can also describe any kind of commercial transaction that is facilitated through the internet.

A

E-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

when was the first ever online sale?

A

August 11, 1994

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TYPES OF E-COMMERCE

A
  1. Business to Consumer (B2C)
  2. Business to Business (B2B)
  3. Consumer to Consumer
  4. Consumer to Business (C2B)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When a business sells a good or services to an individual consumer.

A

. Business to Consumer (B2C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When a business sells a good or service to another business

A

Business to Business (B2B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When a customer sells a good or service to another

A

Consumer to Consumer (C2C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When a consumer sells their own products or services to a business or organization.

A

Consumer to Business (C2B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

EXAMPLE OF E-COMMERCE

A
  1. RETAIL
  2. WHOLESALE
  3. DROPSHIPPING
  4. CROWDFUNDING
  5. SUBSCRIPTION
  6. PHYSICAL PRODUCTS
  7. DIGITAL PRODUCTS
  8. SERVICES
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

– The sale of product by a business directly to a costumer without any intermediary.

A

RETAIL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

– The sale of product in bulk, often to a retailer then sells them directly to consumers

A

WHOLESALE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

– The sale of a product, which is manufactured and shipped to the consumer by a third party.

A

DROPSHIPPING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • The collection of money from consumers in advance of a product being available in order to raise the start-up capital necessary to bring it to the market.
A

CROWDFUNDING

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

– The automatic recurring purchase of a product or service on a regular basis until the subscriber chooses to cancel.

A

SUBSCRIPTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

– Any tangible good that requires inventory to be replenished and orders to be physically shipped to consumer as sales are made.

A

PHYSICAL PRODUCTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

– Downloadable digital goods, templates and courses or media that must be purchased for consumption or licensed for use.

A

DIGITAL PRODUCTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

– A skill or set of skills provided in exchange for compensation.

A

SERVICES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SOCIAL ISSUES OF E-COMMERCE

A
  1. Security and Privacy
  2. Shipping Issues
  3. Complexity of Process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

– It is the most important issues for e-commerce because without it, the customer will be scared, get cheated by the seller.

A

Security and Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

– When the buyer buys a product from the seller and the seller is from other state then they should use shipping to send the products to the buyer so that it can arrive to the place of the buyer stay.

A

Shipping Issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

– When the buyer want to purchase that such products then they need to follow their step to purchase a product from them such as register as a member of that website, fill up the agreement form, key in all your personal details, key in your credit card number and so forth.

A

Complexity of Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

E-commerce Advantages

A
  1. Advantages to Organization
  2. Advantages to Customer
  3. Advantages to Society
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Advantage to Organization

A
  • Organization can expand their market to national and international market with minimum capital investment.
  • Helps organization to reduce the cost to create process, distribute, retrieve and manage the paper based information.
  • Improves the brand image of the company.
  • Helps to provide better customer service.
  • Helps to simplify the business processes and, makes them faster and efficient.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Advantages to Customer
- It provides 24/7 support - Provides more option and quicker delivery of products. - Provides user with more option to compare and select the cheaper and better options. - The customer can put a review comments about the product and can see what others are buying. - Provides a substantial discount to customer. - Provides options of virtual auctions.
22
Advantages to Society
Advantages to Society - Customers need not to travel to shop a product. - Helps reducing the costs of products. - Enabled rural areas to access services and products, which are otherwise not available to them. - Helps the government to deliver public services such as healthcare, education, social services at a reduce costs and in an improved manner.
23
a set of morals that regulate the use of computers. It is important for computer users to be aware of the ethical use of copyrighted material, the ethical use of resources and information, and the ethical use of school, company and employee information.
Computer Ethics
24
10 Commandments of Computer Ethics
1.) Thou shalt not use a computer to harm other people 2.) Thou shalt not interfere with other people’s computer work 3.) Thou shalt not snoop around in other people’s files. 4.) Thou shalt not use a computer to steal 5.) Thou shalt not use a computer to bear false witness. 6.) Thou shalt not copy or use proprietary software for which you have not paid (without permission). 7.) Thou shalt not use other people’s computer resources without authorization or proper compensation. 8.) Thou shalt not appropriate other people’s intellectual output. 9.) Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10.) Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
25
Common Issues of Computer Ethics
1. Privacy Concerns 2. How Computer Affects Society 3. Intellectual Property Rights
26
Five Principles of Privacy
1. Notice/ Awareness 2. Choice/ Consent 3. Access/ Participation 4. Integrity/ Security 5. Enforcement/ Redress
27
. – requires the company to provide consumers with a notice before collecting their personal information.
Notice/ Awareness
28
– allows consumers to control how their information is used.
Choice/ Consent
29
– allows consumers to view the data collected about them and gives them the opportunity to correct any incorrect information about them.
Access/ Participation
30
– requires the information collected to be stored safely and securely.
Integrity/ Security
31
– the above four principles are enforced.
Enforcement/ Redress
32
Ways of making personal data more private
1. Install personal firewall. 2. Purchases goods with cash, rather than credit card. 3. Less use of Facebook. 4. Avoid GPS tags in photo.
33
is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide
Computer Security
34
Computer , also known as
cybersecurity or IT security,
35
– Securing information from unauthorized access, modification & deletion
Information Security
36
– Securing a standalone machine by keeping it updated and patched
Computer Security
37
– Defined as protecting computer systems, which communicate over the computer networks.
Cybersecurity
38
The components of a computer system that needs to be protected are:
1. Hardware 2. Firmware 3. Software
39
– The physical part of the computer, like the system memory and disk drive
Hardware
40
– Permanent software that is etched into a hardware device’s nonvolatile memory and is mostly invisible to the user.
Firmware
41
– The programming that offers services, like operating system, word processor, internet browser to the user
Software
42
Computer Security is concerned with four main areas:
1. Confidentiality 2. Integrity 3. Availability 4. Authentication
43
– Are you really communicating with whom you think you are communicating
Authentication
44
– Only authorized users can access the data resources and information.
Confidentiality
45
– Only authorized users should be able to modify the data when needed.
Integrity
46
– Data should be available to users when needed.
Availability
47
COMPUTER SECURITY THREATS
VIRUSES COMPUTER WORM PHISHING BOTNET ROOTKIT KEYLOGGER
48
– A malicious program which is loaded into the user’s computer without user’s knowledge.
VIRUSES
49
is a software program that can copy itself from one computer to another, without human interaction
COMPUTER WORM
50
– Disguising as a trustworthy person or business, phishers attempt to steal sensitive financial or personal information through fraudulent email or instant messages.
PHISHING
51
is a group of computers connected to the internet that have been compromised by a hacker using a computer virus.
BOTNET
52
is a computer program designed to provide continued privileged access to a computer while actively hiding its presence.
rootkit
52
– Also known as keystroke logger, keyloggers can track the real-time activity of a user on his computer.
KEYLOGGER
53
- Also known as a ‘packet filter’. Basically, software which monitors network traffic and connection attempts into and out of a network or computer and determines whether or not to allow it to pass.
FIREWALL
54
- A software which will find programs/files/software’s/etc. that might compromise your computer, either by being executable or by exploiting a vulnerability in the program normally supposed to process them - - types of malware.
Antivirus
55
What are the types of firewalls?
PACKET-FILTERING FIREWALL STATEFUL PACKET INSPECTION (SPI) DEEP PACKET INSPECTION (DPI)
56
– Examines each packet that crosses the firewall and tests the packet according to a set of rules that you set up.
PACKET-FILTERING FIREWALL
57
– A step up in intelligence from simple packet filtering.
STATEFUL PACKET INSPECTION (SPI)
57
– The actual content of the packets is inspected so viruses, spam, and other harmful content can be blocked.
DEEP PACKET INSPECTION (DPI)
58
Computer Security Practices
* Installing reliable, reputable security and anti-virus software * Activating your firewall, because a firewall acts as a security guard between the internet and your local area network. * Stay-up-to-date on the latest software and news surrounding your devices and perform software updates as soon as they become available * Avoid clicking on email attachments unless you know the source * Change passwords regularly using a unique combination of numbers, letters and case types * Use the internet with caution and ignore pop-ups, drive-by downloads while surfing * Taking the time to research the basic aspects of computer security and educate yourself on evolving cyber-threats * Perform daily full system scans and create a periodic system backup schedule to ensure your data is retrievable should something happen to your computer
59
An area of computer science that is concerned with the intersection of social behavior and computational systems. is the collaborative and interactive aspect of online behavior.
Social Computing
60
10 Social Issues Computers Have Created
1. Communication Breakdown 2. Defamation of Character 3.Identity Theft 4. Cyber Bullying 5. Gaming Addiction 6. Privacy 7. Health & Fitness 8. Education 9. Terrorism & Crime 10. Sexuality
61
– Socializing within a family unit has always been important, as it strengthens the bonds between us and ensures cohesion within the group.
Communication Breakdown
62
– The only means of getting in touch with major corporations or famous people in the public eye prior to the advent of digital communication was via a stiffly written letter.
Defamation of Character
63
– Fraud is another spurious activity that has been able to evolve in the wake of easily accessible computers and the internet.
Identity Theft
64
– As with defamation of public figures, the internet and computers have also made it easier for spiteful people to attack they know personally as well as perfect strangers via the anonymous platforms that are available to them.
Cyber Bullying
65
– Whilst computers and the internet have made it easier for gambling addicts to get their fix, a new type of addiction has also arisen, in the form of addiction to video games. This is something that can impact people of all ages and leads inevitably to a number of problems, from the social to the financial.
Gaming Addiction
65
– We are living increasingly sedentary lifestyles, because computers are removing the need for us to physically carry out many tasks, as well as keeping us rooted to one spot throughout our working days and during our leisure time.
Health & Fitness
66
– Whilst high profile cases of online identity theft and fraud should have caused people to become more careful about how they use their personal opinion, issues of privacy and a lack of appreciation for the risks are still widespread.
Privacy
67
– The educational properties of computers are well known and universally lauded, but having all the information in existence on tap has its own issues.
Education
68
– Computers have been a positive force in allowing for the creation of global movements and righteous activism in a number of forms.
Terrorism & Crime
69
– This is a less clear cut topic, but there are fears that unmitigated access to pornography for adolescents is shaping the sexual proclivities and expectations of young people in problematic ways
Sexuality
70
Legal Aspects of Computing
1. Privacy 2. Digital Ownership 3. Data Gathering 4. Security Liability 5. Access Costs
70
– Most people have their personal data spread throughout the digital world. Even things thought to be secure, such as email or private accounts, can be accessed by unintended sources.
PRIVACY
71
– Digital mediums have allowed information to flow more freely than before. This exchange of ideas comes with a legal and ethical backlash.
Digital Ownership
72
– On some level, everyone knows that their online lives are monitored. The United States has even passed legislation allowing the government to actively monitor private citizens in the name of national security.
Data Gathering
73
– Net neutrality has become a trendy issue thanks to legislative efforts in the last few years. The issue of net neutrality is essentially a question of access
Access Costs
73
– In the past, security issues were resolved by locking a door. Digital security is much more complicated. Security systems for digital networks are computerized in order to protect vital information and important assets.
Security Liability