1.5 Legal, Ethical, Moral Flashcards

1
Q

What is meant by personal data?

A

Any data can be used to identify a living person or which can be used in combination with other data to identify a living person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which act concerns the malicious use of computers?

A

The computer misuse act 1990

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which act protects people’s property online?

A

The copyright, designs and patents act 1988

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which act covers the use of personal data?

A

The data protection act 1998

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the three primary offences under the computer misuse act 1990

A
  1. Unauthorised access to computer materials.
  2. Unauthorised access with intent to commit further offences.
  3. Unauthorised modification of computer material.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which act covers investigation and surveillance by public bodies?

A

The regulation of investigatory powers 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which act prevents computer programs from being copied?

A

The copyright, designs and patents act 1988

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What name is given to an individual who can be identified by personal data?

A

Data subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the Data protection act 1998 cover?

A
  1. Personal data shall be processed fairly and lawfully
  2. Personal data shall be obtained only for one or more specified and lawful purpose
  3. Personal data shall be adequate, relevant and not excessive for its purpose(s)
  4. Personal data shall be accurate and where necessary kept up to date
  5. Personal data shall not be kept for longer than is necessary for its purpose(s)
  6. Personal data shall be processed in accordance with the rights of data subjects under this Act
  7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data
  8. Personal data shall not be transferred to a country or territory outside the European Economic Area, unless that country or territory ensures an adequate level of data protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an example of unauthorised access to computer materials? (CMA 1990)

A

Finding a teacher’s password and opening their files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an example of unauthorised access with intent to commit further offences? (CMA 1990)

A

Finding a teacher’s password and opening their files with the intention of increasing your mark on their mark book.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an example of unauthorised modification of computer material? (CMA 1990)

A

Finding a teacher’s password, opening their files and increasing your mark on their mark book.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are effects on businesses of computers becoming part of the workforce?

A
  • Higher productivity
  • Lower unit costs
  • Lower costs of renting
  • Lower labour costs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are uses of automated decision-making?

A
  • Targeted feeds (social media)
  • Application processes (jobs, mortgages, loans)
  • Power distribution systems
  • Driverless cars
  • Stock trading
  • Plant automation systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define artificial intelligence

A

The ability of a computer to replicate human intelligence, cognitive ability and grasp abstract concepts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe how expert systems work

A

Expert systems consist of a knowledge base made up of a set of facts and rules. This is used to build an inference engine which is interrogated to find diagnoses.

17
Q

What are applications of AI?

A
  • Neural networks
  • Expert systems
  • Voice recognition
18
Q

What are the negative environmental effects of computers?

A
  • Toxic e-waste contaminating water
  • E-waste in third world countries
  • Greenhouse gases from greater electricity consumption
  • Reduced biosiversity
  • Impact on climate change on future generation
19
Q

How can technology be used to protect the environment?

A
  • Smart home systems (sensors)
  • Sleep and Stand-by features on devices
  • Smart engine devices
20
Q

Define censorship

A

The act of suppressing the content that people are able to view, publish and access.

21
Q

What is the Free Internet?

A

Internet?
The idea of an Internet where nothing is filtered at all, in line with the principle of freedom of speech.

22
Q

How is censorship used in schools?

A

Pupils may be prevented from accessing unsuitable material. May be used to maintain higher productivity and prevent distractions.

23
Q

Give arguments in favour of surveillance systems.

A
  • Useful for social security purposes and detecting crime.
  • Needed to trace and punish criminal activity.
24
Q

What is the name given to the process analysing large data sets to uncover hidden trends?

A

Data mining

25
Q

Name three things web designers must take into account when designing a website

A

Colour paradigms, layout, character set.

26
Q
A