section 3 Ethical and cultural issues Flashcards

(47 cards)

1
Q

What are ethical issues

A

are about what right and wrong by society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are legal issues

A

about what’s actually right and wrong in the eyes of the law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are cultural issues

A

are about how groups of people with particular beliefs, practices or languages may be affected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are environmental issues

A

are about how we impact the natural world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are stakeholders

A

someone who has interest in or are affected by a particular scenario

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how does social media and cloud computing make it hard to keep private information

A

encourage you to post personal information

allows you to upload personal files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what must users do before using websites and software

A

accept a privacy agreement before using it

however very few people read this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how can users make there personal information more safe

A

privacy settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is internet censorship

A

when someone tries to control what other people can access on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what has china censored and Cuba

A

foreign websites

only access the computer from government access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

why is censorship used

A

restrict access to inappropriate sites and protect children

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is computer surveillance

A

when someone tries to monitor what other people are doing on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how does computer surveillance work

A

intelligent agencies use packet sniffers to monitor internet traffic by picking out certain key words or phrases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

why is censorship and surveillance controversial topics

A

some people agree with it

while others call it cyber censorship and mass surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how does social well being effected by new tech

A

try to persuade us to get the new gadget or buy a new one
increased peer pressure
smartphones make it easier for peoples work to intrude
face to face is neglected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is cyber bulling

A

when someone uses social media to deliberately harm someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is trolling

A

when someone tries to cause public arguments with others online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is sexting

A

sending sexually explicit messages or images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

how is eyestrain caused

and how can it be fixed

A

looking at a device to long, bad lighting , the screen is flickering
keeping the screen far away, take regular breaks

20
Q

how is Repetitive strain injury caused and how can it be fixed

A

parts of the body become damage as a result of repeated movement
correct posture and arranging the desk appropriately

21
Q

how is back strain caused and how can it be fixed

A

due to poor posture

adjustable chair

22
Q

how has technology shaped are culture

A

selfies
viral videos
social media
blogging

23
Q

what is the sharing economy

A

the services which use new technology to let people make money from things they already own
like uber

24
Q

how does the sharing economy affect businesses

A

sharing economy is cheap and draws people away from taxi firms and others

25
what is the digital divide
created by the fact that some people have greater access to tech than others
26
causes of the digital divide
don't have enough money urban areas have greater network coverage some people don't no how to use the internet
27
what is the global divide
created by the fact that the level of access to technology is different in different countries
28
what natural resources are used in devices and what does it use up
plastics precious metals energy
29
how is energy made and what are the issues with it
non renewable resources and this uses a lot of energy in the extracting process and causes pollution
30
what is the issues with powerful servers
power hungry and use a lot of energy from cooling
31
what are the issues with devices
only use a small proportion of their processing power and people often leave them on
32
how can we reduce the amount of energy wasted
virtual servers include sleep and hibernate modes don't leave the devices on
33
why do we have so much E-waste and how are manufacturers and retailers to blame
devices have short life or people want to upgrade | provide short warranties and use marketing to persuade to upgrade and use pricing strategies
34
what is the WEEE
the waste electric and electronic equipment directive was set up to tackle the e waste problem they promote reuse, recycling
35
what happens to e waste to cut costs
sent to Africa where regulations are less strict
36
what are the 8 protection act principles
1) Data must only be used in a fair and lawful way 2) data must only be used for the specified purpose 3) data should be adequate, relevant and not excessive 4) data must be accurate and kept up to date 5) data should not be kept longer than necessary 6) the rights of the data subject must be observed 7) data should be kept safe and secure 8) data should not be transferred abroad without protection
37
what is the Freedom of information act 2000
allows members of the public to access information held by a public organisation makes company's upload regularly and allows public to request information
38
what are the three offences in the computer misuse act 1990
1) gaining unauthorized access to a private network or device 2) Gaining unathorised access to a network or device in order to commit a crime 3) unauthorised modification of computer material
39
what is the creative commons license
allow you to share media and software online without having to ask for permission first
40
what are the four main types of creative commons licence
attribution share-alike Non-commercial No derivative works
41
what are the conditions of the attribution licence
work can be shared, copied or modified, but the copyright holder has to be credited
42
what are the conditions of the share-alike licence
modified works can only be distributed with the same license terms as the original
43
what are the conditions of the non commercial licence
nobody can use the copyrighted work for profit
44
what are the conditions of the no derivative works licence
the work can be copied and distributed, but can't be modified or built upon
45
what is the copyright act 1988
makes it illegal to share copyrighted files without permission use unlicensed software or plagiarise
46
what is the patents act 1988
protect ideas and concepts
47
where does a lot of illegal file sharing take place
over peer to peer networks using torrent