Issues Relating to Computer Science Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Academic Dishonesty

A

in computing, this refers to the uncredited usage of AI in the academic environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Academic Integrity

A

describes values held to be essential in the UK’s academic environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Academic Misconduct

A

in computing, this refers to the uncredited usage of AI in the academic environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Associated Article

A

refers to any tangible object that you have created, such as a song or computer program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Computer Misuse Act 1990

A

legislation that protects personal data held by organisations from hackers, making unauthorised access to computers, unauthorised access to computer data and unauthorised modification of data illegal, or making supplying or obtaining anything which could be used in a computer misuse act, but intent has to be proven

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Copyright

A

a legal precedent that allows the creator to protect a piece of original artistic, literary, dramatic or musical work and comes into effect as soon as work is created. It is also possible to register your own copyright material, which makes it easier to prove ownership if someone copies your work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Copyright, Designs and Patents Act 1988

A

regulates copyright in the UK, protects intellectual property and associated article

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Creative Commons Licencing

A

an organisation that provides licences to individuals or organisations that want to give the public the ability to legally share and develop their work without needing to ask the owner’s permission to do this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CC-Attribution

A

allows work to be shared, copied and modified, but the creator must be credited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CC-Share-Alike

A

allows work to be shared, copied and modified, but the creator must be credited and released under the same terms as the original

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CC-Non-Commercial

A

allows work to be shared, copied and modified, but the creator must be credited and work cannot be used to make a profit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CC-No-Derivatives

A

allows work to be shared and redistributed but not modified in any way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Controller

A

the person who determines the purposes and means of processing of personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Protection Act 2018

A

laws about personal data held by an organisation, stating that personal data must be kept up-to-date and accurate, not held for any longer than is necessary, that individuals relating to that information can access it and correct it and that they can receive compensation if the law is not followed regarding their data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

First Data Protection Principle

A

processing of personal data for any of the law enforcement purposes must be lawful and fair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Second Data Protection Principle

A

the law enforcement purpose for which personal data is collected on any occasion must be specified, explicit and legitimate, and personal data so collected must not be processed in a manner that is incompatible with the purpose for which it was collected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Third Data Protection Principle

A

personal data processed for any of the law enforcement purposes must be adequate, relevant and not excessive in relation to the purpose for which it is processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fourth Data Protection Principle

A

personal data processed for any of the law enforcement purposes must be adequate, relevant and, where necessary, kept up to date, and every reasonable step must be taken to ensure that personal data that is inaccurate, having regard to the las enforcement purpose for which it is processed, is erased and rectified without delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fifth Data Protection Principle

A

personal data processed for any law enforcement purposes must be kept for no longer than is necessary for the purposes for which it is processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Sixth Data Protection Principle

A

personal data processed for any of the law enforcement purposes must be so processed in a manner that ensures appropriate security of the personal data, using appropriate technical and organisational measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Data Subject

A

the person to whom the data relates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Design Rights

A

this is granted if something is different from any other design and allows the same protections as content creators, protecting their designs from infringement, meaning people can make careers out of designing without fear of monetary losses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Digital Divide

A

the divide between people who have access to computers and the internet and those who don’t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Electronic Signature

A

data that is logically associated with other data and which is used by the signatory to sign the associated data

25
Q

Ethics

A

shared morals that a particular group of people recognise as necessary to ensure that the group behaves positively based on its own context

26
Q

Fair Use

A

a concept included in the Copyright, Designs and Patents Act of 1988 which governs the acceptable uses of a piece of copywrited work if you are not the author, allow creators to safeguard their content but not hoard it

27
Q

Freedom of Information Act 2000

A

was introduced to end a culture of secrecy in government, as it allows anyone to request information from the government and its associated organisations; prior to this law, there was nothing that required the government to reveal its processes and conduct to the general public

28
Q

GDPR

A

General Data Protection Regulations

EU framework for data protection laws, came into force on 25th May 2018

29
Q

ICO

A

Information Commissioner’s Office

since the Data Protection Act was updated, it is a legal requirement to register your data collection with the ICO, and any data breaches must be reported to them

30
Q

Intellectual Property

A

refers to any idea that an individual or group can own; it is a legal term and is used to give precedent for the possession of ideas

31
Q

Job Displacement

A

where people lose their jobs due to technological advances

32
Q

Morals

A

internal principles that an individual uses to make decisions about what is right and wrong, which generally originate from commonly held views in society

33
Q

Patent

A

protects innovations and designs, unlike copyright, which protects artistic and literary works

34
Q

Personal Data

A

any information related to an identified or identifiable living individual, such as name, ID number, location data or online identifier, or factors related to physical, physiological, genetic, mental, economic, cultural or social identity

35
Q

Piracy

A

recreational downloading of copyrighted materials

36
Q

Plagiarism

A

where a copyrighted item is not copied exactly, but is used as the basis for something somebody else has created, without creditation

37
Q

Recipient

A

a third party who receives the personal data

38
Q

Regulation of Investigatory Powers Act 2000

A

law that regulates the powers of public bodies to carry out surveillance and investigation, covering the purpose for which they may be used, which authorities can use the power, who should authorise each use of the power, the use that can be made of the material gained, independent judicial oversight, the means of redress for the individual

39
Q

RIPA Power 1

A

powers concerning the interception of communications

40
Q

RIPA Power 2

A

powers concerning the acquisition of communications data

41
Q

RIPA Power 3

A

powers concerning intrusive surveillance

42
Q

RIPA Power 4

A

powers concerning covert surveillance in the course of specific operations

43
Q

RIPA Power 5

A

powers concerning the use of CHIS and UCOs

44
Q

RIPA Power 6

A

powers concerning access to encrypted data

45
Q

Rights of the Individual

A

the rights that the person the data is about has under the Data Protection Act 2018

  1. Right to see what data of theirs is held by the organisation within a reasonable timescale, but the organisation can charge a small processing fee
  2. Right to update or correct inaccurate data
  3. Right to be compensated if the organisation damages them by breaking the act
46
Q

Skills Gap

A

where people are unable to learn basic skills due to those being done by computers so then are unable to advance and learn more advanced skills

47
Q

Society

A

one or more groups of people that exists with shared beliefs, practices, and ethic

48
Q

Telecommunications Act 1984

A

govern the collection of telecommunications data by the government and the police, in particular, section 94 allows broad regulation of telecommunications in secret in the interests of national security. Any secretary of state can issue commands to telecommunications providers with very little restrictions on what they can be

49
Q

Ten Commandments of Computer Ethics

A

published by the Computer Ethics Institute in 1992

50
Q

Commandment 1

A

thou shalt not use a computer to harm other people

51
Q

Commandment 2

A

thou shalt not use a computer to interfere with other people’s work

52
Q

Commandment 3

A

thou shalt not snoop around in other people’s computer files

53
Q

Commandment 4

A

thou shalt not use a computer to steal

54
Q

Commandment 5

A

thou shalt not use a computer to bear false witness

55
Q

Commandment 6

A

thou shalt not copy or use proprietary software for which you have not paid (without permission)

56
Q

Commandment 7

A

thou shalt not use other people’s computer resources without authorization or proper compensation

57
Q

Commandment 8

A

thou shalt not appreciate other people’s intellectual output

58
Q

Commandment 9

A

thou shalt think about the social consequences of the program you are writing or the system you are designing

59
Q

Commandment 10

A

thou shalt always use a computer in ways that ensure consideration and respect for other humans