Social and Ethical Issues Flashcards
(66 cards)
What is the year 2000 (Y2K) Problem
in 1960s and 1970s storage was exepsensive so the software was required to use the absolute minimum amount of storage space. In order to adapt to this need, software developers often had used only 2 digits to represent the year within dates as it was never thought that these products would still be used when the year 2000 came along.
The consequence of this short-sightedness anticpated that the systems would fail as the year changed from 1999 to 2000 because the software would think the year was 1900 instead of 2000 similar to other years such 1960 being interpreted as 2060 which caused a variety of incorrect calculations in real-time and computer crashes.
What is malware
a malware is any malicious software designed to damage or perform unwanted actions on computer systems.
what is a virus
a virus is a type of malware that replicates itself when executed, it does this by injecting its own code into other programs.
Attack vector: A virus requires user interaction to activate it (such as a hyperlink)
Propagation: A virus spreads by having an infected machine sending emails to other users who interact with it
what is a worm
a worm is a type of malware that aims to slow down a system and replicates itself to spread to other computers
Attack vector: It Doesn’t require interaction from a user to infect - it is exploits security flaws in the operating system and then install themselves on the hard drive.
Propagation: It can spread to other systems once a computer is compromised via vulnerabilities in a network
what is a Trojan horse in terms of malicious software
A Trojann horse is malicious software that is masquerading as a legitiamate software. They are often used to install malware that enables an outside user (or program) to take control of your computer.
Attack vector: need user interaction to activate it
Propagation: The developer of the malware creates botnets and instructs them to perform all of the malicous tasks.
What is Spyware
Spyware aims to obtain your information without your knowledge. It captures your web browsing habits, reads your email contacts or even keystrokes.
attack vector: user interaction to activate it
Propagation: The criminal takes the information and starts using it for malicious intents.
what is a Social Networking Site
A Social Network is an online, virtual community where people share their thoughts and activities with family, friends or those with similar interests.
what are some well known social networking sites
What is Cyber safety
Cyber safety is about minimising the risks of dangers on the internet.
What are things to look for when being Cyber safe
Location based services
Unwanted contact
Cyberbullying
Online firends
Your digital footprint
Online purchasing
Identity theft
what is intellectual property
Property resulting from the fruits of mental labour
What are some ways of evaluating information on the internet
who is the author?
Is the information up-to-date?
who is the intended audience
is the information accurate and unbiased
What is the purpose of the information
what is Royalty
A compenstation, usually a protion of proceeds paid to the owner (author) of a right, for the use of a work
What is a Publisher
One whose business is the copying, distribution and sale of works by an author
What is Quality Assurance
Quality Assurance is used to ensure that the standards of their employees and products are met. It is an ongoing process throughout the design and development to ensure and verify the quality of the software. They are used to make sure that the customer’s expectations are met and/or exceeded.
How is quality determined
if a product is to be preceieved as one of high quality, the customer’s expectaions must be exceeded where if the product fails to meet the customer’s expectation then it is preceived to be of low quality.
what are the factors that affect Software quality
Correctness: Does it do what is supposed to do?
Reliability: Does it do it all of the time?
Efficiency: Does it do it the best way possible?
Integrity: Is it secure?
Useability: Is it designed for the end user?
Maintainability: Can it be understood?
Flexibility: Can it be modified?
Testability: Can it be tested?
Portability: Will it work with other hardware?
Re-useability: Can parts of it be used in another project?
Interoperability: Will it work with other software?
what are the external factors that affect the quality of a product
hardware
operating system
other software
runtime errors
what is an operating system
an operating system provides the interface between the software application and hardware
what is forward compatible
the ability of an older system to operate in harmony with a new system
what is file association
defines the application that is executed when a data file is opened, usually by double clicking
what is a shared file
a file whose code is used by more than one program. Example a dynamic link libary file (.dll file)
what is in the priority/severity table in response to problems
1 Critical: Affecting operations/financial loss: Immediate Resolution
2 Major: Affecting operations difficult workaroudn available: Resolution up to 3 months
3 Normal: affecting operations workaround available: resolution up to 12 months
4 Cosmetic: No effect on operations/Enchancement requests: as time constraints allow
what is a code of conduct
A Code of Conduct is a set of standards by which Software Developers agree to abide. Many professional software developers are members of professional associations that
expect adherence to a written Code of Conduct.