Concerns (Ch15) (M1) Flashcards

1
Q

What is a stakeholder?

A

A stakeholder is a person who is involved either directly, or indirectly with an issue or problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do most issues and problems have?

A

Most issues and problems will have many stakeholders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define moral

A

Moral is behaving in ways considered by most people to be correct and honest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define ethical

A

Ethical is behaving in accordance with principles of conduct that are considered correct, especially those of a given profession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give one example of an inappropriate material that children can access, because of the internet.

A

The Internet has made it easier for children to access inappropriate material, like pornography, drugs and gambling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What can parents and schools do, to try and limit children’s access to inappropriate material online?

A

Parents and schools can use parental-control software to try to stop children from accessing inappropriate material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is cyberbullying?

A

Cyberbulling is when somebody uses social media to deliberately harm someone else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does cyberbullying include?

A

Cyberbullying includes:
Trying to intimidate someone
Insulting people
Trying to humiliate or defame someone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What impact can cyberbullying have?

A

Cyberbullying can cause serious distress - people have been driven to suicide because of these attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is trolling?

A

Trolling is when somebody tries to cause public arguments with others online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are ethical issues about?

A

Ethical issues are about what would be considered right and wrong by society.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do professional bodies often have?

A

Often, professional bodies have a “Code of Ethics” which members must follow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are cultural issues about?

A

Cultural issues are about how groups of people with particular beliefs, practices or languages may be affected, e.g. ethnic groups, religions, countries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can new technology impact?

A

New technology can impact our social well-being, health, culture, technology and business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Employees may be expected to carry a smartphone all the time, so that they can always be contacted. Why can this be a problem?

A

This can be stressful for employees who feel they can never really switch off from work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Technology has increased peer pressure. Give an example.

A

Children feel pressure to own the latest device for fear of being bullied by their peers. Parents feel pressured into buying them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why is face-to-face social interaction being more neglected?

A

Face-to-face interaction is more neglected as more of our social lives are online.
This is made worse by having the internet on mobile devices we carry all the time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Give one way in which technology can impact well-being

A

Companies release new technology regularly, and pay for advertisements to promote it.
These techniques often try to influence and pressure people into buying or upgrading to the latest device.

Smartphones make it easier for people’s work to intrude into other areas of life. Employees may be expected to carry a smartphone all the time, so that they can always be contacted.
This can be stressful for employees who feel they can never really switch off from work.

Technology has also increased peer pressure - children feel pressure to own the latest device for fear of being bullied by their peers. Parents feel pressured into buying them.

Face-to-face social interaction can be neglected as more of our social lives move online. This is made worse by having the internet on mobile devices we carry all the time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What can looking at a device’s screen for too long cause?

A

Eyestrain can be caused by looking at a device’s screen for too long.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Give one prevention of eyestrain

A

Preventions of eyestrain:
Using suitable lighting
Keeping the screen a good distance away from you
Taking regular breaks from using your device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Repetitive Strain Injury? How is it caused?

A

Repetitive Strain Injury (RSI) is when parts of the body (normally fingers and wrist) become damaged as a result of repeated movements over a long period of time, such as typing on a keyboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Give one prevention of Repetitive Strain Injury (RSI)

A

Preventions of Repetitive Strain Injury (RSI):
Arranging your desk appropriately
Having a correct posture
Taking regular breaks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What can sitting at a computer for too long cause?

A

Sitting at a computer too long can cause back pain - this is normally due to a poor posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Give one prevention of back pain

A

Preventions of back pain:
Using an adjustable chair, footrest and adjustable monitor to ensure you aren’t sitting at an awkward angle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Why have selfies become really popular? What could this be a sign of?

A

Selfies (photos we take of ourselves) have become really popular because smartphone cameras and social media allow us to take and share them easily.

But they could be a sign that social media is gradually making people more attention-seeking and self-obsessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does viral mean?

A

Viral is a word used to describe videos, images or messages on the Internet which have rapidly spread over social media and have been seen by millions of people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Why do companies, politicians, celebrities and charities all use images and videos in their promotional campaigns?

A

They all try to use images and videos in their promotional campaigns in the hope that they will go viral.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Social media and blogs allow people to publish writing, art or other media. Who does this give a voice to?

A

Social media and blogs can give a voice to groups of people who might have been ignored by mainstream media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What do music and television streaming services allow their customers to do? Why aren’t some happy about this?

A

Music and television streaming services have allowed their customers to listen and watch media for less money, usually through a subscription service.

But some people aren’t happy about it — e.g. musicians who feel streaming companies don’t pay them enough money to use their music.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the sharing economy? Give an example

A

The sharing economy is the name given to services which use new technology to let people make money from things they already own.

For example, Uber lets you turn your car into a taxi service, and Airbnb uses the Internet to let you rent out a room in your house to tourists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Why may making money from things you already own, or streaming services be problematic?

A

These services are cheap, but they draw customers away from established businesses. Also, they may be more risky for sharers and customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Give one way in which technology is changing how we do business

A

Music and television streaming services have allowed their customers to listen and watch media for less money, usually through a subscription service. But some people aren’t happy about it.
For example, musicians who feel streaming companies don’t pay them enough money to use their music.

The sharing economy is the name given to services which use new technology to let people make money from things they already own.
For example, Uber lets you turn your car into a taxi service, and Airbnb uses the Internet to let you rent out a room in your house to tourists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Give one way in which technology has impacted our culture

A

Selfies (photos we take of ourselves) have become really popular because smartphone cameras and social media allow us to take and share them easily. But they could be a sign that social media is gradually making people more attention-seeking and self-obsessed.

Viral is a word used to describe videos, images or messages on the Internet which have rapidly spread over social media and have been seen by millions of people.

Companies, politicians, celebrities and charities all try to use images and videos in their promotional campaigns in the hope that they will go viral.

Social media and blogs allow people to publish writing, art or other media. This can give a voice to groups of people who might have been ignored by mainstream media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

People online can hack services to obtain user’s data. What can this data be used for?

A

This hacked data can sometimes be used for criminal purposes or sold.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Why is the internet not always a safe place?

A

The internet is not always a safe place because people can find out sensitive and private data about users if sufficient precautions aren’t taken by users, or if the person has hacked the service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What do many websites require users to provide?

A

Many websites (e.g. social media, banking and retail) require users to provide personal information in order to set up an account, e.g. date of birth and address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What do social media websites encourage users to do?

A

Social media websites actively encourage users to post even more personal information, including photographs and details of your job and social life.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What do cloud computing websites allow users to do?

A

Cloud computing websites allow users to upload personal files to their servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Give one thing companies could do with your information, that could be a privacy risk

A

Companies may make your personal information, photos, etc. available to other website users or the whole Internet.

They may also sell your personal details, buying habits, likes / dislikes etc. to other organisations (who might use it to send you targeted adverts or spam emails).

Companies can do lots with your information as long as they stay within the bounds of the privacy agreement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What can social media users do to make the information they share more private?

A

Users can change their privacy settings on social media, to make the information they share more private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Give three privacy concerns with websites, social media, and companies having user’s personal data

A

Many websites (e.g. social media, banking and retail) require users to provide personal information in order to set up an account, e.g. date of birth and address.

Social media websites actively encourage users to post even more personal information, including photographs and details of your job and social life.

Cloud computing websites allow users to upload personal files to their servers.

Companies may make your personal information, photos, etc. available to other website users or the whole Internet.

They may also sell your personal details, buying habits, likes / dislikes etc. to other organisations (who might use it to send you targeted adverts or spam emails).

Companies can do lots with your information as long as they stay within the bounds of the privacy agreement.

Users can take steps to make the information they share more private, e.g. change their privacy settings on social media sites.
Websites often have fairly relaxed privacy settings by default. They also can have privacy settings that are hard to find and hard to understand.

Users have to trust companies to keep their data secure. But this doesn’t always happen - there have been various high profile cases where customer data held by large companies has been leaked or stolen.

There are also issues with personal information being accessed via mobile devices, which could be stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is internet censorship?

A

Internet censorship is when someone tries to control what other people can access the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Give one reason why governments use censorship

A

Some countries’ government use censorship to restrict access to certain information.

Many governments use some form of censorship. Many countries including the UK) restrict access to pornography, gambling and other inappropriate websites in order to protect children.

Some countries have even stricter Internet censorship policies and will restrict access to websites which are critical of the government.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is computer surveillance?

A

Computer surveillance is the act of monitoring what people are accessing on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Give one way in which government intelligence agencies use surveillance

A

Government intelligence agencies may use packet sniffers and other software to monitor internet traffic, looking out for certain key words or phrases that might alert them to illegal activities, terrorism, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

In some countries, what do Internet Service Providers (ISPs) keep?

A

In some countries, Internet Service Providers (ISPs) keep records of all websites visited by all its customers for a certain amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Give two arguments for the regulation of the internet

A

Arguments for the regulation of the internet:

The internet is no different to other media: radio, TV, newspapers, etc.
The internet has harmful, offensive, and illegal content.
Children should be better protected.
Profit making organisations on the internet should share responsibility for policing the internet they have created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Give two arguments against the regulation of the internet

A

Arguments against the regulation of the internet:

Freedom of expression is an absolute right
The internet is different to other media because anyone can be an author and broadcaster
The internet grows too quickly for filtering to be effective
Censorship is bad for democracy
Parents should take more responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What are environmental issues about?

A

Environmental issues are about how we impact the natural world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

When we make devices, what do we use?

A

When we make devices, we use up natural resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What do electronic devices contain?

A

Electronic devices contain lots of raw materials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Give three metals devices may contain.

A

Devices may also contain many metals like gold silver, copper, mercury, palladium, platinum, and indium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

How do many metals used in devices occur? What can extracting these metals do?

A

Many metals in devices only occur naturally in tiny quantities.

Extracting these materials uses lots of energy, creates pollution, and depletes scarce natural resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What form of energy do devices use?

A

Devices consume energy in the form of electricity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

How is most electricity made?

A

Most electricity is made using non-renewable resources like coal, oil and gas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

How can extracting resources and producing electricity in power station be harmful?

A

Extracting resources and producing electricity in power stations causes lots of polution including greenhouse gases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

All computers generate heat and require cooling. Powerful servers particularly have to be constantly kept cool using air conditioning, and they are very power-hungry. Why is this a problem?

A

They’re very power hungry and require special air-conditioned rooms to keep them cool.

That means using even more energy and more pollution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Give one environmental concern about generating energy or energy used by computers

A

Most electricity is made using non-renewable resources like coal, oil and gas. Extracting these resources and producing electricity in power stations causes lots of polution including greenhouse gases.

All computers generate heat and require cooling. The powerful servers used by businesses and the Internet are a particular problem. They’re very power hungry and require special air-conditioned rooms to keep them cool. That means using even more energy and more pollution.

Devices also waste a lot of energy. Servers normally only use a small proportion of their processing power. People often leave their smartphones, desktops and laptops idle. This means these devices are using a lot of energy without actually doing anything.

59
Q

Give one way to reduce the amount of energy wasted by devices

A

There are several ways to reduce the amount of energy wasted by devices:

Virtual servers are software-based servers rather than real machines. Multiple virtual servers can run on one physical server, so the physical server can run at full capacity.

Most modern devices include sleep and hibernation modes to reduce their power consumption when they are idle.

Don’t leave electronic devices (TVs, laptops, etc.) on standby.

60
Q

How much e-waste does the world create every year?

A

The world creates more than 50 million tonnes of e-waste every year.

61
Q

Many modern devices have a very short life before they’re discarded. Why?

A

Many modern devices have a very short life before they’re discarded — either because they break or because people want to upgrade.

62
Q

Why are device manufacturers and retailers part of the e-waste problem?

A

Device manufacturers and retailers are part of the e-waste problem, because:

They provide short warranties (e.g. 1 year).
They have pricing policies that make it cheaper to replace than to repair
They use marketing to convince people to upgrade

63
Q

What was the Waste Electric and Electronic Equipment (WEEE) directive created for?

A

The Waste Electric and Electronic Equipment (WEEE) directive was created to tackle the e-waste problem.

64
Q

What does the Waste Electric and Electronic Equipment (WEEE) have rules for?

A

The WEEE has rules for disposing of e-waste safely, to promote reuse (e.g. refurbishing broken devices to use again) and recyling (e.g. extracting the devices’ precious metals).

65
Q

To cut costs, where is a lot of e-waste sent to? Where does most of it end and why is this a problem?

A

To cut costs, a lot of e-waste is sent to certain African and Asian countries where regulations are less strict.

There, most of it ends up in landfill and can be a hazard - toxic chemicals can leak into the groundwater and harm wildlife.

66
Q

How much of global energy consumption is used by data centres?

A

2% of global energy consumption is used by data centres.

67
Q

Give two harmful materials inside a computer

A

Harmful materials inside a computer include:

Dioxins
Chromium
Mercury
Cadmium
Radioactive isotopes

68
Q

What is the digital divide created by?

A

The digital divide is created by the fact that some people have greater access to technology than others.

69
Q

Give one reason why people who have a limited access to the internet at a disadvantage

A

People use the internet to:

Apply for jobs
Access a range of services - from banking to retail
Keep in touch with friends

People who have a limited access to the Internet are therefore at a heavy disadvantage.

70
Q

In terms of technology, what do people in richer countries tend to have?

A

People in richer countries tend to have greater access to technology than people in poorer countries.

71
Q

The Internet and other technologies have created lots of opportunities for the people with access to them. What has this led to?

A

This has increased the inequality between poorer and richer countries.
Many can’t access the opportunities that are exclusively on the internet.

72
Q

Give one cause of the digital divide

A

Causes of the Digital Divide:

Not everyone has the money to buy devices like smartphones and tablets, which can be costly.

Urban areas are likely to have greater network coverage than rural areas.

Some people don’t know how to use the Internet and other new technologies, and so are shut out of the opportunities they offer.
This is a problem for many older people who haven’t grown up with computers and so have little experience with them.

73
Q

What are legal issues about?

A

Legal issues are about what’s actually right and wrong in the eyes of the law.

74
Q

What are the three acts of parliament, to do with computing and data?

A

Acts of Parliament:

The Data Protection Act 2018
Computer Misuse Act 1990
Copyright Designs and Patents Act 1988

75
Q

What was the Data Protection Act of 2018 introduced to do?

A

The Data Protection Act was introduced to protect an individual’s personal data.

76
Q

Before collecting personal data, what does an organisation have to do?

A

Before collecting personal data, an organisation must register with the government, saying what data they’ll collect and how they’ll use it.

77
Q

What are the seven principles covered in the Data Protection Act?

A

The seven principles covered in the Data Protection Act:

1) Processed lawfully, fairly, and in a transparent manner
2) Collected for specified, explicit and legitimate reasons
3) Data must be adequate, relevant, and limited
4) Must be accurate and where necessary, kept up to date
5) Must be kept for no longer than is necessary
6) Must be processed in a manner that ensures security of the data

7) Data controllers must be able to prove that their data protection measures are sufficient

78
Q

Give three rights the Data Protection Act gives data subjects

A

As a data subject, the Data Protection Act (2018) gives you rights:

-Be informed about how your data is being used
-Stop or restrict the processing of your data
-Restrict the portability of your data, or sharing with third parties
-Object to how your data is processed in certain circumstances
-Access your personal data
-Have incorrect data amended
-Have your data erased

79
Q

Give one situation where organisations are allowed to disobey the Data Protection Act and withhold information

A

There are some situations when organisations are allowed to withhold information, for example if the information is about:

-The prevention, detection, or investigation of a crime
-National security or the armed forces
-The assessment or collection of tax
-Judicial or ministerial appointments

80
Q

Why was the Copyright, Designs and Patents Act of 1988 introduced?

A

The Copyright, Designs and Patents Act was introduced to protect intellectual property - anything someone has created

81
Q

What does the Copyright, Designs and Patents Act of 1988 make illegal?

A

The act makes it illegal to copy or distribute other people’s intellectual property without the owners or copyright holders permission

82
Q

What is intellectual property?

A

Intellectual property is not a physical thing but it still requires time, effort, and money to create.

83
Q

Give two examples of intellectual property

A

Examples of Intellectual Property:

Written work
Music
Films
TV
Inventions
Photography

84
Q

What do patents cover?

A

Patents cover new inventions - they protect ideas and concepts rather than actual content.

85
Q

In computing, what do patents mostly apply to?

A

In computing, patents mostly apply to pieces of hardware.

86
Q

Why can it be difficult to enforce copyright?

A

It’s difficult to enforce copyright if content is held on servers in countries with more relaxed copyright laws.

87
Q

How is illegal file sharing done?

A

Illegal file sharing can take place over peer-to-peer networks using the BitTorrent® protocol to share files directly between devices.

88
Q

How do cloud-based file-hosting websites work?

A

On cloud-based file-hosting websites, copyrighted content is uploaded to the website where anyone with an account can download it.

89
Q

Give two things that the Copyright, Designs and Patents Act of 1988 makes illegal

A

Makes illegal:

-Software piracy - the illegal copying or downloading of software
-The use of ICT to copy or download files such as music, video or text, to avoid paying
-Using software without the correct, or any, software licence
-Theft by a business of the methods and ideas of other ICT businesses

90
Q

What was the Computer Misuse Act of 1990 introduced to stop?

A

The Computer Misuse Act was introduced to stop hacking and cyber crime.

91
Q

What were the three offences that the Computer Misuse Act of 1990 added?

A

The Computer Misuse Act added three new offences:

Gaining unauthorised access to a private network or device, e.g. through hacking (just accessing a network could get you a fine or prison sentence).

Gaining unauthorised access to a network or device in order to commit a crime, like stealing data or destroying the network.

Unauthorised modification of computer material - e.g. deleting or changing files. The Act also makes it illegal to make, supply or obtain malware.

92
Q

Give three things the Computer Misuse Act tries to stop

A

The Computer Misuse Act tries to stop:

Unauthorised work
Planting of viruses
Hacking
Deliberate data destruction
Data theft
Fraud

93
Q

What is open source software?

A

Open source software is software where the source code is freely available and users may legally modify the source code to create their own spin-off software

94
Q

You may be able to edit and distribute the updated changes you make to which type of software?

A

You may be able to edit and distribute the updated changes you make to Open Source software

95
Q

Give two examples of open source software

A

Examples of Open Source Software: Linux, GIMP, Mozilla Firefox, VLC media player

96
Q

Give two examples of open source operating systems

A

Examples of Open Source Operating Systems: Android, Debian, UBUNTU, Linux

97
Q

Give three advantages of open source software

A

Advantages of Open Source Software:

-Users can edit and customise software freely
-There is generally a very strong social support forum if you need help
-Usually free and good for companies with limited budgets
-Allows collaboration with other people who may want the same modifications
-Better versions of the software (i.e. less buggy) may appear faster than proprietary software
-Popular software is very reliable and secure - any problems are quickly solved by the community

98
Q

Give three disadvantages of open source software

A

Disadvantages of Open Source Software:

-Relies on support networks of other users – there is no support hotline, and no guarantee of support, like with proprietary software
-To edit the code, you need expert knowledge
-There are no warranties if something goes wrong
-There may be limited user documentation
-Small projects may not get regular updates and so could be buggy or have unpatched security holes
-De-bugging can be hard as no one person is necessarily responsible for the software
-The software may not evolve in a strict timeframe and may not have regular updates
-You may need to buy in external support
-It could be more open to exploitation through users adding in malicious code

99
Q

What is proprietary software?

A

Proprietary software is licenced software
It generally costs money to buy and users can not edit the source code.

It is where only the compiled code is released. The source code is usually a closely guarded secret.

100
Q

What do proprietary software licenses restrict? Do users have to pay for the license?

A

Proprietary software licences restrict the modification, copying, and redistribution of the software.

Users usually have to pay for the license.

101
Q

Give one example of a company that is producing proprietary software

A

Examples of Companies producing Proprietary Software: Microsoft (Office, Windows, Outlook, etc) and Adobe (Photoshop, Illustrator, etc)

102
Q

What is proprietary software also known as?

A

Proprietary software is also known as closed source software

103
Q

Give three advantages of proprietary software

A

Advantages of Proprietary Software:

-Generally provide free customer support
-They meet professional standards
-There is always someone to go back to if you have problems
-It is generally likely to be more tailored to market needs
-Bugs, security fixes, etc, are more likely to be fixed faster
-It may be broader and contain more features
-Comes with warranties, documentation, and customer support

104
Q

Give three disadvantages of proprietary software

A

Disadvantages of Proprietary Software:

-The cost may be significant
-It is limited to expansion by only what is available
-It is reliant on one company – what if it goes bust?
-Software may not exactly fit a user’s needs, and they can’t do anything about it
-Software companies may not maintain older software after warranties expire - they’ll want people to buy their latest product

105
Q

What is a Creative Commons (CC) License?

A

A Creative Commons (CC) license is a public copyright license that enables the free distribution of an otherwise copyrighted work.

This is use when an author wants to give other people the right to use, share, and build upon work that the author has created.

106
Q

When using a Creative Commons (CC) License, what does the author still have?

A

When using a Creative Commons (CC) License, the author still has an element of control in how their software is used.

This is part of the Copyright Designs and Patients Act.

107
Q

What does Artificial Intelligence (AI) refer to?

A

Artificial Intelligence (AI) refers to the development of computer systems that can perform tasks that typically require human intelligence.

108
Q

What does AI involve?

A

AI involves teaching a computer to think and make decisions like a person.

109
Q

What concerns are the use of AI linked with?

A

The use of AI is often conencted with ethical, moral, and cultural concerns.

110
Q

What are self-driving cars?

A

Self-driving cars are cars that can drive themselves without a human driver.

111
Q

What do self-driving cars use AI for?

A

Self-driving cars use Al to sense their surroundings and make decisions on the road.

112
Q

What do self-driving cars use sensors for? What does AI do with the information it recieves from these sensors?

A

Self-driving cars use sensors like cameras and radars to detect objects and obstacles around them.

The Al brain processes this information and makes decisions on how to drive.

113
Q

Give one ethical issue of self-driving cars

A

Ethical Issues of Self-driving Cars:

Safety - Self-driving cars must be designed to prioritize the safety of passengers and other road users. However, there is still a debate about how to weigh the value of human life in situations where the car must make split-second decisions that could impact human safety.

Accountability - In the event of an accident, it can be difficult to determine who is responsible - the car manufacturer, the software developer, the car owner, or the car itself? This raises questions about liability and the role of insurance in the event of an accident.

Employment - Could lead to job losses in transportation and logistics whilst creating jobs in programming. Lower-level workers are facing job losses, which can increase the risk/rise of poverty.

114
Q

Give one example of a digital assistant

A

Examples of digital assistants:

Siri
Alexa
Google Assistant
Cortana

115
Q

What do digital assistants use AI for?

A

Digital assistants use Artificial Intelligence to understand and respond to natural language (spoken) queries and commands.

Digital assistants use Al to learn and improve its responses and become more accurate and personalized to individual users.

116
Q

What three things do digital assistants use to understand and interpret speech?

A

Digital assistants use Natural Language Processing (NLP), Machine Learning (ML), and Deep Learning (DL) to understand and interpret speech.

117
Q

When a user asks a question or gives a command to an AI assistant, what does the AI do?

A

When a user asks a question or gives a command to the AI assistant, the assistant breaks down the sentence into smaller parts, such as the subject, verb, and object.

It then uses Machine Learning (ML) and Deep Learning (DL) to match the query to a relevant response trom its database of pre-programmed responses, and to generate a response that is appropriate to the context of the query.

118
Q

Give one ethical issue of digital assistants

A

Ethical Issues of Digital Assistants:

Privacy - May collect and store data about users’ activities and preferences, raising concerns about how this data is used and who has access to it. Users may be uncomfortable with the idea of their personal data being stored and potentially shared with third parties.

Bias - May be programmed with biases, conscious or unconscious, that reflect the values and perspectives of their creators. For example, a digital assistant might be programmed to use gendered language or make assumptions about users based on their race or ethnicity. This could perpetuate stereotypes and discrimination and limit the effectiveness and inclusivity of the technology.

Social Skills - Could impact social interactions and communication. For example, if people rely heavily on personal digital assistants to communicate and access information, this could impact their ability to communicate effectively without technology. It could also lead to a lack of personal interaction and social isolation.

119
Q

Give one way in which AI is used on social media platforms

A

Al is used to moderate content that violates the platform’s community guidelines.

AI is used in social media platforms to recommend content to users based on their interests.

120
Q

To learn about users’ interests and preferences on social media, what do the algorithms use?

A

These algorithms on social media, use Machine Learning (ML) to analyse users’ past interactions with content, such as likes, comments, and shares, to learn about their interests and preferences.

121
Q

How does content moderation AI work on social media? What does this enable?

A

Content moderation algorithms use Al to detect and remove content that bulling, and harass community guidelines, such as hate speech, bullying and harassment.

This enables social media platforms to provide personalized and engaging content to users, while also maintaining a safe and respectful online environment.

122
Q

There is an increasing trend of fake AI generated images and videos in the news, and social media. What is this leading to?

A

An increasing amount of AI generated images and videos is leading to the spread of misinormation.

123
Q

Give three positives of fake AI generated content

A

Positives of fake AI generated content:

Creativity and artistic expression
Time saving
Cost saving
Prototyping and concept testing
Inclusive tool regardless of artistic ability

124
Q

Give three negatives of fake AI generated content

A

Negatives of fake AI generated content:

Lack of originality
Legal and copyright issues
Deepfake videos
Misinformation
Over-reliance on technology
Significant computational resources required

125
Q

Give two impacts online banking has on customers

A

Impact on customers:

No need to travel to the bank
Can access the bank 24/7
Can access the bank on mobile devices
Instant decisions on loans, etc.
Less personal service.
Potentially open to hacking

126
Q

How many bank branches did the Consumers Association report closed in the UK, between December 2015 and January 2017?

A

The consumers association reported that a 1046 local bank branches closed in the UK between December 2015 and January 2017.

127
Q

Give one impact online banking has on bank staff

A

Impact on bank staff:

May lose jobs due to closure of the branch
New types of jobs created
New working practices to adopt, or different skill-set required

128
Q

Give one impact online banking has on banks as companies

A

Impact on banks as companies:

Less overheads: staff, utility bills, rent, etc
Targeted marketing to customers
Responsibilities for data protection

129
Q

Give one impact online banking has on local communities

A

Impact on local communities:

Other local shops may suffer less revenue as there are less people in the town centres
Small businesses rely on a local service
Elderly and vulnerable customers in particular value local services

130
Q

Give three reasons for internet censorship

A

Reasons for Internet Censorship:

-Protects vulnerable populations (manic depressives, children)
-Decreases intellectual property theft
-Limits the freedom of speech and the press (In countries which don’t want its citizens learning other viewpoints)
Allows government control over its people
-Reduce criminal activity, including terrorism
-Content may be contrary to the major religion of the country (For example, gambling websites)
-Content may be against the ethos of the ruling government (Such as hate crimes, communist v.s. democratic rule)
-Security concerns
-Protection of existing economic interests and copyright (For example, blocking file share, and P2P sites)

131
Q

Give one positive effect that technology has on culture

A

Positive effects on culture:

-The rapid spread of technology has also led to positive cultural changes in developing countries.
-Easier, faster communication has contributed to the rise of democracy, as well as working towards the alleviation of poverty.
-Globalisation can also increase cultural awareness and promote diversity.

132
Q

Give two negative effects that technology has on culture

A

Negative effects on culture:

-Diffusion of technology must be carefully controlled to prevent negative cultural consequences.
-Developing countries risk losing their cultural identities and assimilating themselves into an increasingly westernised world.
-Challenges of inequality from the uneven distribution of technology within a country also still remain.
-Traditionally, most computer applications are designed by developers in North America.
-These designers unintentionally apply their cultural values and systems of thought whilst developing computer applications.

133
Q

What do schools often monitor?

A

Schools often monitor Internet, email, and general computer activity

134
Q

What do companies often monitor?

A

Companies often monitor their workforce’s browser use and record their business calls

135
Q

There are an increasing range of smart devices in our homes. Why might this be a problem?

A

Smart devices are voice activated and capable of listening into our daily activities.

136
Q

Give three arguments that support smart devices continually recording

A

For smart devices continually recording:

-Data encryption makes it private
-Voice input is convenient
-Processing sound data allows for additional functionality
-Can assist disabled users
-Intelligence may save lives
-If you have nothing to hide then privacy is not an issue
-Data is not recorded for other purposes

137
Q

Give two arguments that oppose smart devices continually recording

A

Against smart devices continually recording:

-It is an invasion of privacy
-TV may also be taking video footage
-Data is sent over the Internet for processing
-The data may not be used just for the purpose intended

138
Q

By 2016, how many Nintendo DSs were sold?

A

By 2016, 154 million Nintendo DSs had been sold

139
Q

By 2016, how many Xboxs were sold?

A

By 2016, 160 million Xboxs were sold

140
Q

By 2016, how many Playstations 1-4 were sold?

A

By 2016, 448 million Playstations 1-4 were sold

141
Q

By 2016, how many smartphones were sold?

A

By 2016, 1.5 billion smartphones were sold

142
Q

Give three benefits of the Internet

A

Benefits of the Internet:

Vast repository of knowledge
Communication
Education
Research
E-commerce

143
Q

Give three drawbacks of the Internet

A

Drawbacks of the Internet:

Decrease in privacy
Distribution of illegal images
Offensive content
Fraud
Hate speech
Fake news