Module 3 Flashcards

1
Q

Where does technology play a significant role in human activities?

A

Education: e-learning
Economic/Economy: e-commerce, e- business, online shopping, e-governance, telecommuting
Entertainment: culture, gaming
Health Care: e-surgery
Safety and Security: Privacy, surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

——-

What are some IT/Cybersecurity threats/crimes?

A

electronic eavesdropping; cyber terrorism, cyber
bullying, hacking; identity theft, spoofing, phishing, hardware theft and vandalism, piracy, information theft, spam, denial of service, pharming, propaganda, industrial sabotage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can hardware and software be vulnerable to cybercrime/ or damage?

A

Hardware: Theft, Vandalism, Destruction
Software: Glitches, Misuse, Abuse, Tampering, Bugs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some other computer crimes?

A

Identity theft: Stealing one’s identity,
Manipulation of information to give false representations/ Disinformation
Invasion of privacy

Phishing: This is where a target is contacted by email, text message by a person posing as a legitimate institution to lure them into providing sensitive data

Pharming: This is where the traffic of a website is manipulated and confidential information is stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

+++++

What are some mitigation strategies to these cybercrimes/theft/destruction risks?

A

disaster recovery plan, backup;
uninterruptible power supply (UPS); surge
protectors, firewalls; authentication: usernames,
passwords, key cards, biometric devices, encryption, anti-virus.

Transaction Log: Records everything done in the database.
Intrusion Detection Software: Intrusion detection involves the process of identifying attempts to penetrate a system and gain unauthorized access.
Audit trails: Maintain a record of system activity and user activity. It records interactions with tools and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some policies and practices that can safeguard an organization’s information?

A

Internet policies:
Educating staff on malware

Email policies: Follow the rules regarding sending emails.

Security measures: Firewall, Biometrics, Physical protection, Access Control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some health and safety risks

A

Carpal Tunnel Syndrome: A condition in which the median nerve is compressed at the wrist, leading to pain, numbness, and muscle weakness in the hand.

CVS (Computer vision syndrome): A condition where someone is experiencing eye and vision problems due to computer use. This can happen when constantly using the monitor for a long period in a poor lit area.

Repetitive Strain Injury: Repetitive strain injury is damage to your muscles, tendons or nerves caused by repetitive motions and constant use.

Computer addiction: A disorder in which an individual turns to the internet/games to change moods, overcome anxiety and reduce isolation or loneliness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

~~~~~

What are computer security risks?

A

Computer security risks including Internet and
network attacks, unauthorized access and use,
hardware theft and vandalism; software and
information theft,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some environmental risks?

A

High energy consumption
Environmental pollution
Air pollution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some intellectual properties?

A

Copyright: Copyright is the legal ownership of intellectual property such as original works of fiction and non-fiction and conveys the right to control its reproduction and distribution.

Patent: A patent is a right granted to the owner of an invention that prevents others from making, using, importing or selling the invention

Trademark: A sign that you can use to distinguish a business’ goods or services from those of other trades.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some licensing arrangements?

A
  1. Open Source Software
    Definition: Software whose source code is freely available for modification and redistribution.
  2. Proprietary Software
    Definition: Software owned by a company or individual; users cannot modify or redistribute it.
  3. Freeware
    Definition: Software that is free to use but not open source.
  4. Shareware
    Definition: Software distributed freely on a trial basis, but requires payment for continued use.
  5. Software Licensing Agreements
    Definition: Legal contract between software provider and user.

Product Activation
Definition: Process of verifying a legal copy of software (to prevent piracy).

Digital Rights Management (DRM)
Definition: Technology to control the use of digital content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is plagiarism? and the types?

A

Plagiarism is the act of using someone else’s work, ideas, or intellectual property without proper acknowledgment, presenting it as one’s own.

(e.g. word-for-word, paraphrasing, failure to cite,
incorrect citation, claiming sole ownership),
digital media as intellectual property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some negative implications of plagarism?

A

Destroyed students reputation- Plagiarism allegations can cause a student to be suspended or expelled.

Destroy Professional Reputation: A professional business person, politician, or public figure may find that the damage from plagiarism follows them for their entire career.

Destroy Academic Reputation- Once scared with plagiarism allegations, an academic career can be ruined.

Legal Repercussions- The Legal repercussions of plagiarism can be quite serious, some plagiarism may also be deemed a criminal offense, possibly leading to a prison sentence.

Plagiarized Research- If the research is medical in nature the consequences of plagiarism could mean the loss of people’s lives. This kind of plagiarism is particularly heinous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the consequences of software piracy?

A

If caught, they can be held liable under civil and criminal laws.

The owner can seek injunction that can stop the distribution of the pirated software, and seek compensation. (damages cost).

Developers lose revenue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the implications of interacting with the online environment?

A

Positives: Global connectivity, Enhanced communication, Community building

Negatives: Cyberbullying and harassment, Misinformation, Isolation and addiction
Lack of privacy, Adult content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is wearable computing

A

Wearable computing refers to electronic devices worn on the body that integrate computing, connectivity, and sensor technologies to enhance user experience. These devices are becoming increasingly important in healthcare, fitness, communication, and workplace efficiency.

17
Q

What is HMI?

A

HMI, or Human-Machine Interface, is a user interface that allows operators to interact with machines or processes.

18
Q

What are some examples of HMI

A

Customer service bots, Chatbots, ChatGPT, Siri, Google Assistant Bumass generative AI
ATMS, Reservations, Virtual nurses