ICT in engineering/computer ethics & legal issues/components & functions of computer systems Flashcards

week 1,2 and 3

1
Q

what do we use mobile devices for?

A

texting messages, sending emails, gaming, shopping and learning online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what does ict stand for

A

information communication technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what does information mean in ict

A

-knowledge obtained from studying, investigating, reading or researching.
the tools used to transmit information are telephone, television, radio, computer, phone.
-helps us fufill our daily tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what does communication mean in ict

A

-act of transmitting messages, it is a process whereby information is exchanged between indviduals using symbols, signs or verbal interaction,
-communication helps us gain knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is technology mean in ict

A

-use of scientific knowledge, experience and resources to create processes and products that meet human needs
-important In communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what 2 components is ICT made of?

A

computer technology and communication technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

why is ict useful in engineering?

A
  • design new products/systems
    -minimise cost
    -minimise power consumption
    -minimise time to market
    -maximise yield
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what activities do engineers coordinate

A

-simulation
-modelling
-prototyping
-manufactoring
-testing
-installation
-project management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what goals to engineers apply ICT to achieve

A

-eliminating flaws
-reducing variation
-minimising iterations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does engineering generally focus on?

A

-designing products /systems
-building
-testing
-commissioning
-decommissioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what role does ICT play in engineering

A
  • enhancing delivery
  • electronic communication
  • creation of virtual prototypes
  • analyses of stresses
    -cost analysis
    -improvement to efficiency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are the 3 legal issues

A

-computer misuse
- data protection
-intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what legal issue is related to computer crime

A

computer misuse act 1990

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what legal issue is related to protecting personal data

A

data protection act 1998

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the 2 types of intellectual property

A

copyright and patents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the definition of computer crime

A

-a crime involving computers and network
- can be defined as the unlawful acts whereby the computer is either a tool or target or both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

who can computer criminals be?

A

-authorised employees
-employees who were not authorised to use a computer system
-outside users - hackers/crackers
-an organisation’s competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

why do we care about computer crime?

A

it is important for computing professionals to understand cyber terrorism for their benefit and society as a whole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what are the types of computer crime?

A

-hardware / software theft
-hacking
-spamming
sniffing
-denial of service attack
-identify theft (phishing and skimming)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is hardware theft?

A
  • act of stealing computer equipment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

examples of hardware theft?

A

-opening computers and taking parts out of them
-hardware theft happens in retail stores, breaking in , opening the package and shoplifting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what is software theft?

A

-unauthorised duplication and/or use of computer software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

examples of software theft

A
  • Physically steal a media that contain the software
  • Remove or disable the programs that have been written from the company computers. Programmers are the ones that cause this disturbance
    Software is stolen form the software manufactures, and later is duplicated for sale in black market (also known as piracy)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is the definition of hacking?

A

any action that leads to unathorized interference with a computer, computer system or network. a hacker writes or uses ready made programs to break into a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what are some types for hacking

A
  • stealing financial information
    -stealing personal info
    -damage/modify data
    -launch computer attacks
    -gaining access
    -transit a virus via malicious software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what is spamming

A

Automated sending of large quantities of unsolicited e-mails to recipients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

why does spamming exist?

A

This may be for marketing purposes
Can disrupt or disable network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what is sniffing

A

Is the electronic eavesdropping on electronic data transmissions
This may be of e-mails or of data which might be used for financial gain, for e.g., credit card details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

what is denial of service attack

A

An attempt to make a machine or network resource unavailable to its intended users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

what is identity theft?

A

The fraudulent acquisition and use of person’s private identifying information, usually for financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

what are the two types of identity theft?

A

phishing and skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

what is phishing?

A

technique to fish for information that you would not disclose to others such as bank details, card details, PIN numbers, national insurance number, passport number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

what is an example of phishing?

A

an email asking you to click on a link, visit the site and verify or update some personal information, the email appears to be legitimate, making you feel comfortable enough to give information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

what is skimming?

A

illegal copying of information from the magnetic strip of a credit or ATM card using electronic device known as skimmer, once scammers have skimmed your card they can create a fake card with your details on it before starting to run charges on your account. this is done without knowledge o original card holder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

what are some examples of legalisation as a response to computer crimes and abuses

A

computer misuse act 1990
computer misuse amendment bill 2002

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

what is computer misuse act 1990

A

made it illegal to attempt to make unathorised access or changes to computer material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

what 3 specific offences does the computer misuse act define

A

Sect 1: Unauthorised access to computer material is the basic offence of hacking
Sect 2: Unauthorised access with intent to commit or facilitate commission of further offences (comes in when the hacking leads to another offence (e.g. theft))
Sect 3: Unauthorised modification of computer material (covers the use viruses, worms; also phishing and Denial service of attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

what is privacy?

A

Privacy is the ability of an individual/group to stop data or information about themselves from becoming known to people other than those whom they choose to give access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

what was introduced to counter privacy issues

A

UK introduced the Data Protection Act (1994, 1998) and the Data Protection Act 2018 which is the UK’s implementation of the General Data Protection Regulation (GDPR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

what is the data protection act 2018

A

Under the Data Protection Act 2018, you have the right to find out what information the government and other organisations store about you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

what are the rights under the data protection act 2018

A

These include the right to:

  • be informed about how your data is being used
  • access personal data
  • have incorrect data updated
  • have data erased
  • stop or restrict the processing of your data
  • data portability (allowing you to get and reuse your data for different services)
  • object to how your data is processed in certain circumstances

You also have rights when an organisation is using your personal data for:

  • automated decision-making processes (without human involvement)
  • profiling, for example to predict your behaviour or interests
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

what is intellectual property?

A

Intellectual property (IP) is intangible property created by an individual or organisation

such as Literary works, music, video, art, designs, inventions and trademarks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

why is intellectual property called “intellectual”

A

It is called “intellectual” property because it is the product of human imagination, creativity, and inventiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

why is it important to protect your intellectual property?

A

Protecting your intellectual property makes it easier to take legal action against anyone who steals or copies it, with an aim of making profit.
The type of protection you can get depends on what you have created

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

what are the two types of protection?

A

copyright and patents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

what things can be copyright?

A

literary works, art, music, films ,sound recordings, web content

47
Q

what are patents?

A

A patent protects your invention and lets you take legal action against anyone who makes, uses, or sells your invention without your permission

invention and products, e.g. machines and machine parts, tools, medicines

48
Q

does copyright protect the idea?

A

no copyright does not protect ideas, but only the expression of ideas

49
Q

do patents protect the idea?

A

Protects the idea behind an invention
The ideas should be original and not obvious

50
Q

are patents published?

A

Patents are published, thus benefiting public knowledge

51
Q

What do we mean by Ethics?

A

The field of study that is concerned with questions of value, that is, judgements about a human behaviour is good or bad.

52
Q

what are some ethical issues in IT

A

extracting data to gain competitive advantage, installing unlicensed software, accessing personal information and revealing trade secrets.

53
Q

what are codes of ethics

A

consent, withdrawal , confidentiality

54
Q

how do you secure digital world?

A

-install anti virus software
-install updates
-choose passwords and don’t share
-encrypt sensitive data
-regular data back ups

55
Q

what does a computer process data into?

A

A Computer process data into information

56
Q

what does data consists of?

A

raw facts and figures

57
Q

information is data that has been :

A

summarised and transformed

58
Q

what is a computer?

A

A computer can be defined as a programmable, electronic device that:

accepts data

performs operations

presents the results

stores the results (or information)

58
Q

what are the 4 basic operations of computers

A

Input – entering data into a computer

Processing – manipulating operations performed on the data

Output – presenting results

Storage – saving data, programs, or output for future use

59
Q

what are the advantage of a computer

A

speed, reliability, increased storage, consistency and automation

60
Q

what are the disadvantages of a computer

A

impact on labour force, violation of privacy/public safety and health issues

61
Q

what are internal hardware components?

A

located inside the main box or system unit of the computer.
examples:

network card
mother board
hard drive
RAM

62
Q

what are external hardware components?

A

located outside the system unit and connected to the system unit via a wired or wireless connection
examples:

keyboard
mouse
touch pad
gaming controller

63
Q

what is an input device

A

An input device is any piece of equipment that is used to input data into the computer

64
Q

examples of input device

A

keyboard
mouse
digital pen

65
Q

what is an output device

A

An output device accepts processed data from the computer and presents the results to the user or to another machine

This can be through a screen, on paper, speaker etc.

66
Q

what is an example of output devices

A

monitor/display screen
printer

67
Q

what is the main processing device for a computer is ?

A

The main processing device for a computer is the central processing unit (CPU) often considered the “brain” of the computer

68
Q

what does CPU perform and control

A

Performs:

calculations
comparisons needed for processing

Controls:

the computer’s operations

69
Q

What kind of storage are storage devices

A

non - volatile storage

70
Q

where is information about the files stored

A

in a directory

71
Q

what are storage devices used for?

A

Storage devices are used to save data, program settings, or output for future use

72
Q

how can storage devices be installed, attached, or accessed?

A

Storage devices can be installed inside the computer, attached to the computer as an external device, or accessed remotely through a network or wireless connection

73
Q

examples of storage devices

A

Hard drive
CD/DVD
flash memory card
flash memory card reader
USB flash drive

74
Q

what do communication devices allow users to do?

A
  • communicate electronically with others
    -access remote information such as internet, home/school, company computer network
75
Q

examples of communication devices

A

modems, network adapters, routers

76
Q

define network adapters

A

used to connect a computer to a computer network

77
Q

define modem

A

used to connect a computer to the internet

78
Q

define router

A

used to create a small network so a variety of devices can share an Internet connection and data

79
Q

define usb flash drive

A

used to store documents, digital files, music files and other content that can be moved from one PC to another

80
Q

define flash memory cards

A

used to store digital photos, music, files and other content

81
Q

what is a mouse

A

used to make on screen selections - a primary input device

82
Q

what are CD/DVD discs

A

used to deliver programmes and store large multimedia files such as movies

83
Q

define keyboard

A

used to type instructions into the computer - a primary input device

84
Q

what is a usb port

A

it connects external devices that use usb interface

85
Q

define speakers

A

produce audio output

86
Q

define microphone

A

captures spoken input

87
Q

define flash memory card reader

A

reads and writes flash memory cards

88
Q

define DVD drive

A

reads and writes CD and DVD discs

89
Q

define hard drive

A

located inside the system unit, stores programs and most data

90
Q

define system unit

A

case that contains the CPU, memory, power supply, storage devices and all other internal hardware

91
Q

define monitor

A

lets you see your work as you go, primary output device

92
Q

define printer

A

produces printed copies of computer output

93
Q

what is software?

A

Software refers to the programs or instructions used to tell the computer hardware on what to do

94
Q

what are the 2 basic types of softwares

A

system software and operating system

95
Q

define system software

A

The programs that allow a computer to operate are collectively referred to as system software. The main system software is the operating system

96
Q

define operating system

A

-starts up the computer and controls its operation
-sets up new hardware
-allows users to run other software
-allows users to manage the documents stored on their computers

97
Q

examples of software

A

windows, Mac OS, linux

98
Q

examples of some mobile operating systems

A

android, IOS, windows phone

99
Q

can a computer function without an operating system

A

no

100
Q

what are some basic tasks of an operating system (OS)

A

-provides a user interface so that we can interact with the computer

-manages applications that are running on the computer, starting them when on requests and stopping them when no longer needed

101
Q

What are 4 basic tasks of OS

A

manages files, helping us save our work, organise our files, find files that we have saved and load files

manages the computer memory, deciding what should be loaded into memory and what should be removed

looks after the computer security, preventing unauthorised access to the system

manages the computer’s input and output hardware such as disk drives and printers

102
Q

what does application software mean?

A

Application software consists of programs designed to allow people to perform specific tasks using a computer

103
Q

what can you use application software for?

A

-creating letters (word processing software)
-preparing budgets (spreadsheet software)
-managing inventory and customer databases (database software)
-playing games (gaming software)
-watching videos or listening to music (multimedia software)
-editing digital photographs (image editing software)
-exchanging e-mail (e-mail programs)

104
Q

what is hardware (8 points)

A
  • physical parts of the computer are called hardware
  • touch/see/feel hardware
  • hardware is made using physical materials or components
  • computer is hardware which operates under control of software
  • if hardware is damaged its replaced with new one
    -hardware is not affected by viruses
    -hardware cannot be transferred from one place to another electronically through network
    -user cannot make new duplicate copies of the hardware
105
Q

what is software (8 points)

A
  • a set of instructions given to the computer is called software
    -cant touch/feel software
    -software is developed through writing instructions in programming language (coded)
    -operations of computer are controlled through software
    -if software is damaged or corrupted, its backup copy can be reinstalled
    -affected by computer viruses
    -software can be transferred from one place to another electronically through network
    -users can make many new duplicates of the software
106
Q

what is user interface?

A

A user interface an interaction method by which a user and the computer exchange information and instructions

107
Q

what are the 2 types of user interface?

A

command line interface (CLI)
graphical user interface (GUI)

108
Q

What is CLI (command line interface)

A

A Command Line Interface (CLI) allows the user to interact with the computer by typing in commands i.e. set of instructions

The computer displays a command prompt, then a user key(s) in the command and press enter or return

109
Q
A
110
Q

what is the disadvantage of CLI

A

The user would have to learn a whole set of commands so that they could make use of the computer system

this is only suitable for expert users

111
Q

what is graphical user interface (GUI)

A

it is an interface built around visual/graphical displays.

-Windows are regions of the screen used to display information
-Icons are small pictures that are used to represent folders, software, etc
-Menus are list of options the user can select from

112
Q

what is a disadvantage of GUI

A

a lot of memory and processing power is used to display all of the graphics required by the GUI

113
Q

examples of GUI

A

windows, apple OSX and ubuntu