1.6 Ethics Flashcards
What are the three laws we need to know for Computer science? (3)
The Data Protection Act 2018 (1) Computer Misuse Act 1990 (1) Copyright Designs and Patents act 1988 (1)
What are the two types of software licenses? (2)
Open source - anyone is able to see the code (1) and proprietary - users must pay to use the software. (1)
What are the key features of the Data Protection Act? (3)
Data collected must be accurate (1) must not be shared without consent (1) and must not be used unfairly (1)
What are the key features of the Computer Misuse Act? (2)
It is illegal to possess or use (1) tools to access unauthorised data (1)
What are the key features of the Copyright Designs and Patents Act? (2)
You own the rights to a creative product when you create it (1) other people or companies must get your permission to use it or face a fine (1)
What are the advantages to customers of using open source licensing? (2)
It’s usually free to use (1) they can adapt it or add features (1)
What are the advantages to businesses of using a proprietary license? (2)
They can charge a fee to use it (1) They can restrict what users can do (1)
List three ways computers have a negative impact on the environment (3)
They use rare materials that must be dug out of the ground (1) they are made using toxic chemicals which must be disposed of (1) when they are thrown away they create e-waste (1)
List three ways computers have a positive impact on the environment (3)
They contribute to dematerialisation - reducing the amount of things people need (1) they allow research on green energy (1) they allow people to communicate digitally - reducing the need for paper and transport (1)
List three ways computers have a positive impact on culture (3)
They allow people to connect with other people anywhere in the world (1) They reduce loneliness through allowing easier contact (1) they allow art and cultural artefacts to be shared for free (1)
List three ways computers have a negative impact on culture (3)
They create the environment for cyberbullying (1) they expose people to online dangers e.g. phishing and malware (1) They encourage users to spend less time together in person which can lead to loneliness (1)