Jan 2025 ict theory Flashcards

1
Q

What is the Data protection Act?

A
  • law that protects personal data from being misused
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some examples of personal data?

A

name, address, date of birth, race, religion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the few exemptions of the data protection principles?

A

domestic purposes: if you only use personal data for writing to friends and family, or taking pictures for your own employment
law enforcement: police investigating a crime is not subject to DPA
intelligence services processing- personal data processed by the intelligence services is not covered by the DPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the data protection principles?

A
  • personal data must be fairly and lawfully processed
  • personal data must be collected for specified and lawful purposes
  • personal data must be adequate relevant and not excessive
  • personal data must be kept accurate and up to date
  • personal data will not be kept longer than is necessary
  • personal data must be processed in line with peoples rights
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the copyright designs and patents act?

A

protects the intellectual property of an individual or a company

It makes it illegal to copy, modify or distribute software or other intellectual property without the relevant permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is prohibited under the copyright designs and patents act?

A

primary breaches, secondary breaches and software piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are primary breaches?

A
  • Copying an original work
  • Issuing a copy of the original work to the public
  • Renting/lending a copy of the original work to the public
  • Performing, showing or playing the original work in public
  • Making an adaptation of the original work
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are secondary breaches?

A
  • Importing a copy of the original work
  • Possessing or dealing with a copy of the original work
  • Providing means to make copies of the original work
  • Permitting the use of premises for making copies of the original work
  • Provision of props/equipment for a performance of a copy of the original work
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the steps to prevent software piracy?

A

What is software piracy? illegal copying and distribution of software

  • Product key / license: Often a unique string or letters and numbers supplied with the software to activate it
  • Agreement of terms and conditions: Users will be asked to click to agree to the license agreement before being able to install the software
  • Holograms: Holograms are often used on the packaging of software and they indicate that the copy is genuine as they are too difficult and costly for pirates to implement
  • Some older software would only run if the CD ROM or memory stick was physically in the device using it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the exemptions to copyright law?

A
  • Uses for the benefit of people with a disability
  • Non-commercial research or private study
  • Recordings of broadcasts for archiving
  • Copies of books/documents made by a library, educational establishment, museums or archives
  • When used in a parody
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can individuals be monitored?

A
  • Closed circuit television (CCTV)
  • Automatic number plate recognition (ANPR)
  • Physical forms of identification (passports, bank cards, drivers licence etc.)
  • Network activity (IP/MAC addresses)
  • GPS data shared by apps
  • GPS trackers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can individual communication be monitored?

A
  • Parental control software to monitor children’s online activity
  • Social media
  • Web histories
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the benefits and drawbacks of the investigatory powers act?

A

Benefits: finding people who are lost, identify people on a network, locate friends for social activities, identify and locate potential criminals at events, verifying individuals for financial transactions to reduce financial crime

Drawbacks: compromising peoples privacy, expense setting up, energy consumption, making the public not feel trusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are health issues?

A

common side affect of the prolonged use of IT at home or in the workplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are strategies that are put in place to help prevent health issues?

A
  • Repetitive strain injury (RSI)
  • Back/neck problems
  • Eye strain
  • Headaches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the cause and prevention of Repetitive strain injury (RSI)?

A

Cause- Damage to the fingers, wrists and joints, traditionally cause d by prolonged use of a keyboard and mouse

Prevention- Have the correct posture (angle of arms to the keyboard and mouse), Use a wrist support if necessary, Take regular breaks, Make use of ergonomic keyboards

16
Q

What is the cause and prevention of back/neck problems?

A

Cause- Sitting in front of a computer screen for prolonged periods of time

Prevention- Use adjustable chairs, Take regular breaks, Use a foot rest

17
Q

What is the cause and prevention of eye strain?

A

Cause- Staring at a computer screen for prolonged periods of time or incorrect lighting causing reflections

Prevention- Take regular breaks, Use anti-glare screen filter, Change from CRT to LCD monitor

18
Q

What are the causes and preventions and causes of headaches?

A

Causes- combination of factors, including:
Poor lighting, Flickering screens, Reflections, Fatigue

Prevention- Take regular breaks, Have regular eye tests, Use an anti-glare screen filter

19
Q

What is physical safety?

A

creating a safe environment when using technology

It includes considering dangers that could lead to serious injury or loss of life

20
Q

What is the cause and prevention of electrocution?

A

Cause- Spilling drinks near electrical equipment
Prevention- Keep liquids away from electrical equipment

Cause- Touching live cables
Prevention- Ensure that cables are properly insulated and protected, Use non-conductive materials where possible, Ensure that electrical equipment is turned off and unplugged before cleaning or maintenance, Use circuit breakers or fuses to prevent electrical overload

21
Q

What is the cause and prevention of fire hazards?

A

Cause- Sockets being overloaded

Prevention- Use surge protectors to prevent electrical overload, Ensure enough plug sockets in the room, Don’t plug too many devices into the same plug socket, Don’t leave devices plugged in and unattended

Cause- Equipment overheating

Prevention- Ensure that equipment is properly ventilated and not obstructed, Keep flammable materials away from heat sources, Regularly check equipment for signs of wear or damage, Use fire extinguishers in case of emergencies, Turn off or unplug devices when away from the location, Do not cover any air vents on devices

22
Q

What is the cause and prevention of trip hazards?

A

Causes- Cables not properly secured or organised

Prevention- Use cable ties or clips to secure cables, Keep cables away from areas where people are walking, Secure cables where you can, like under desks to stop protruding into open areas, Use cable covers to protect cables and prevent tripping hazards, Regularly inspect cables for signs of wear or damage, Where possible use wireless devices to reduce cables

23
Q

What are the causes and prevention of personal safety?

A

Cause- Improperly secured equipment

Prevention- Ensure that equipment is properly secured and stable, Regularly check the stability of locations containing devices

Causes- Equipment not placed on stable surfaces

Prevention- Keep equipment away from edges and other potential hazards, Regularly inspect equipment and locations containing devices for signs of wear or damage