social and ethical issues LU8 Flashcards

(61 cards)

1
Q

economic reasons for using computers

A

quicker and more accurate
reliable,efficient
makes globalised business possible-communication through internet
saves paper
productivity increased-cost effective,efficient,more reliable,replaces manual labour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

why is there digital divide

A

lack of infrastructure
poverty and no access to basic necessities
lack of education,basic literacy and schooling facilities
politics- civil wars and violence-no time for divide. internet taken away in wars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how do we bridge the digital divide

A

improving infrastructure
reduced poverty
improved education
introduce cellphones,easier than computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is ergonomics

A

Hardware that is designed with the user in mind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

sore thumb syndrome

A

texting and making many repeated movements limiting blood circulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is RSI and how does it occur

A

repetitive strain injuries
occurs from repeated physical movements that cause damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

symptoms of RSI

A

damage to tendons,nerves,muscles +other soft body tissues
tightness,discomfort,tingling,coldness,numbness,stiffness,soreness,burning,pain IN hands,wrists,fingers,forearms,elbows,upperback,shoulders+neck

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what makes you more likely to develop injuries with texting

A

using incorrect typing techniques or body positions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is CTS

A

carpal tunnel syndrome
a painful condition involving the median nerve, flexor tendon + transverse carpal ligament.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how does CTS occur

A

as you move your hand + fingers - the flexor tendons rub against the sides of the tunnel created by the carpals and transverse carpal ligament.
The rubbing causes irritation of the tendons causing them to swell, which applies pressure to the median nerve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how to treat CTS

A

splints and braces
anti inflammatory medication
cortisone injections
surgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are the effects of CTS

A

tingling
numbness
debilitating pain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how do you prevent eye strain

A

take frequent breaks from viewing the computer
test eyes regularly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how is eyestrain caused

A

continual refreshal of CRT screens and detectable flickering
amount of time spent on computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how much of the world’s electricity is used by computer systems

A

between 5 and 10 percent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

physical problems caused by computers

A

sore thumb syndrome
repetitive strain injuries
carpal tunnel syndrome
eye strain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

how to recycle computer components

A

take to reliable IT waste disposal centre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what to do with printer cartridges

A

if cannot be refilled, dispose at printer cartridge store or IT waste disposal centre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

how to practice green computing

A

upgrade components of new device before buying to extend life of device
recycle computer components
reduce amount you print
check manufacturing company’s green manufacturing policy and commitment to minimise waste during manufacturing of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

green computing

A
  • designing , engineering, manufacturing or disposing computer components in a way that reduces their environmental impact
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

effect of technology on workplace

A

-video conferences instead of face to face meetings
-mass storage devices instead of file rooms
access to information is simplified (efficiency and productivity increased)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

acceptable user policy

A

set of rules drawn out by management of a company to protect company, its network and data from misuse - outline how network + internet should be used in a company
employees have to sign AUP
eg. usb ports on all networked computers, strict policies w size pf attachments in emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

mobile office

A

caravans/shipping containers customised to include comfortable working space + equipment to connect to internet
for need to work at remote locations, can be done w ability to synchronise necessary ICT devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

virtual office

A

range of services (video conferencing, customer contact) offered by service providers that give business appearance that it physically exits
using laptop, mobile devices and internet access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
decentralisation of labour
as employees don’t have to physical work in an office environment, labour becomes decentralised transport and office costs reduced loss in cohesion and common business
26
robotics
study of complex machines that perform dangerous, repetitive or distasteful jobs that are boring or risky for human workers reduce employee injuries
27
AI
artificial intelligence branch of science which deals with helping machines find solutions to complex problems in a more human-like manner involves borrowing characteristics from human intelligence and applying them as algorithms in computer friendly way
28
UAV
unmanned aerial vehicles type of aircraft that operates w/o human pilot on board eg drone used for pest and weed control, military, farming cuts down labour costs
29
social engineering
act of manipulating people into divulging confidential info w view to commit fraud or gain unauthorised computer access shoulder surfing, dumpster diving, phishing, role playing, use of social media
30
shoulder surfing
attacker uses observational techniques to get info while user is inputting sensitive data combat- privacy screens
31
dumpster diving
large orgs dump items w company info into public dumpsters - attacker can use these items to get info abt company, employees, network structure
32
phishing
convincing email sent to user requesting user to click on link that will take user to spoofed website which requests user to enter sensitive info persuades user to disclose confidential personal data
33
role playing
attacker convinces target that he has a problem or will have a problem, and that attacker is only one who can solve it
34
use of social media
hackers create a profile using someone’s details and will send friend requests to cloned persons friends w message that old account is wrong then gets access to friend and clones friend account and send request to og account that was hacked- nos has access to them without person “accepting random ppl”
35
hackers types
white hat hackers: non-malicious (company employees that test security system) black hat hackers/crackers: malicious, hack w intent to steal/vandalise grey hat hackers: sometimes act illegally
36
theft
hardware theft- if hardware stolen/software goes w it , costly software theft-illegal copying,sharing or usage of copyright-protected software programs information theft: illegal copying or storage of confidential,personal or financial information (passwords, algorithms, databases). data can be moved to thumb drive (thumb sucking), transmitted through emails, printed identity theft: person pretends to be someone else by assuming their identity to access resources or obtain benefits in persons name, fraud bandwidth theft- connecting to internet through wireless internet router that you do not have permission to use theft of time: employee accepts payment for work not done theft of services: intentionally use service without paying
37
safeguard against cyber crimes
install firewall/anti malware surf and download safely update software regularly never click agree on pop-up window without knowing what you agreeing to use updated web browser be wary of email attachments+ links store sensitive data securely w secure passwords never log into financial accounts from public computers
38
fake news
news,stories or hoaxes created to deliberately misinform or deceive readers clickbait- deliberately fabricated to gain more visitors and increase advertising revenue propaganda: deliberately mislead to promote biased view satire/parody- fake news for entertainment sloppy journalism- unreliable info
39
evaluating website
affiliation (who supports it, bias?) audience (look at language- who is it intended for, appropriate?) authority (qualifications of author, publishing institution reputable?) content (chronological, working links, cited correctly?) currency ( up to date? produced date, updated date?) design (easy to navigate and view, load easily, requires registration ?) objectivity (preconceptions, mask for advertising-bias, emotive language, limited examples cited?)
40
approaches to green computing
- manufacturing, designing or disposing computers components in a way that reduces their environmental impact - use: minimise electricity consumption - disposal: repurpose/reuse or recycling/disposing correctly - design: design energy efficient devices - manufacturing: reduce waste
41
make computer greener
sleep mode when away from computer turn off computer at end of the day upgrade instead of buying new activate power management features
42
positives of computers
- less paper - easier communication (globally- advance business) - reduce need to travel- travel costs, road wear and tear+ pollution decreased - makes production processes more efficient - accessibility + mobility- can work anywhere- increased productivity
43
disadvantages of tech on environment
-overconsumption of energy hazardous materials in devices- disposed of incorrectly -ink cartridges pollute soil and water -highly toxic dumping grounds for technology -average lifespan of an electronic device is 2 years
44
benefits of AI
-medical care + research -self driving cars -tracking wildlife to prevent extinction -predict occurrence of natural disasters -fight spam email -protect national security -less room for errors -improved efficiency -takes risks instead of humans -faster decision
45
AI cons
high development cost unemployment makes humans dependent lack of creative thinking
46
bridge digital divide
digital literacy classes, make technology more affordable, donate old digital devices, improving infrastructure + education
47
tech improve education
provide those who cannot enroll in school/uni access to free online courses
48
tech improve poverty
create jobs, allow entrepreneur to reach wider market and create opportunities
49
smart cities
create more efficient buildings and streets urban area where technology and data collection help improve quality of life as well the sustainability and efficiency of city operations
50
tech improve transport
electric cars- reduce CO2 emissions sensors in roads- monitor parking + traffic to reduce congestion self driving cars
51
tech improve public safety
LBS emergency communications + apps
52
tech improve healthcare
efficient electronic medical records (EMRs)-access anytime anywhere blockchain technology resolve counterfeit drug prevention IoT wearables provide user generated health data
53
sexual offences act
prohibits prostitution, brothel-keeping and procuring and procuring pf minors over the internet
54
electronic communications and transactions act
( excluding voice communications) you can be held responsible for any electronic communication signed by you and used for/against you in a court of law
55
protection from harassment act
gives victims of harassment an effective solution when they are being subjected to harassment against behaviour
56
cyber bullying
bullying that takes place over digital devices, causing embarrassment or humiliation
57
Protection of Personal Information Act
POPIA - protects obtaining of personal info in a lawful + fair manner - info can only be used for the specified purpose it was obtained for
58
deep web advantages
increased depth + thoroughness of content not accessible by search engines more efficient search engines, retrieve higher quality, more relevant content
59
deep web disadvantages
search engines are slower search string needs to be precise ethical dilemmas- returns personal info from normally restricted databases risk of encountering illegal, harmful + criminal activity
60
dark web advantages
difficult to block helps ppl to maintain privacy + freely express their views allows undercover police officers to communicate
61
dark web disadvantages
slow speed due to multiple layers of encryption easier to commit crime can be used to violate privacy of others may expose computer to sites designed to spread malware or hack your computer