Moral and ethical issues Flashcards
What do the terms moral, social, ethical, and cultural refer to in the context of digital technology?
- Moral relates to behaviour that is right or wrong.
- Social relates to society and its organisation.
- Ethical relates to moral principles that govern an individual’s behaviour.
- Cultural relates to the ideas, customs and social behaviour of a society.
How has computer technology changed the skill set required in the modern workforce?
Factories now require technicians to maintain welding robots instead of human welders.
What impact has online shopping had on the job market?
Fewer traditional high street shops and ‘in-person’ roles.
What monitoring capabilities do computers provide in the workplace?
Computers can assess productivity, work patterns, work quality, social media activity, etc.
What is the purpose of automated decision-making systems?
To analyse data and reach conclusions about what action to take.
Fill in the blank: Automated decision-making systems use _______ to reach a decision.
[complex algorithms]
List three applications of automated decision-making.
- Electrical power distribution
- Emergency services
- Stock market trading
Define artificial intelligence (AI).
An area within computer science that devises software that behaves as if it were intelligent.
What is machine learning?
A subset of AI that uses algorithms and statistical models to analyze data and adapt without explicit instructions.
List two examples of AI applications.
- Spotting fraudulent activity
- Medical diagnosis
What is the Turing test?
A test for intelligence in a computer, requiring that a human cannot distinguish a machine from a human based on replies.
What are the main components of an expert system?
- Knowledge base
- Inference engine
- User interface
What is an artificial neural network?
A series of algorithms that tries to recognise underlying patterns and relationships within a set of data.
True or False: AI can match or better a human’s ability to spot patterns while processing data.
True
What are some environmental impacts of computer technology?
Manufacturing, running, and disposing of computer systems and hardware.
List two toxic materials commonly found in computers.
- PVC
- Mercury
What is internet censorship?
The deliberate suppression of what can be accessed or published on the internet.
List three reasons governments might impose internet censorship.
- To limit access to socially unacceptable material
- To limit access to politically unacceptable material
- To limit access to dangerous information
What is one challenge of internet censorship?
Total control of information is difficult to apply unless there is a single central censor.
What are some reasons for monitoring behavior with computer technology?
- To monitor workforce activities
- To monitor criminal activity
- To monitor transport flow
Fill in the blank: The environmental impact of technology includes issues related to _______ waste.
[hazardous]
What environmental benefits can arise from computer technology?
- Smart home devices for energy control
- Computer-controlled car engine management for fuel efficiency
What is monitoring in the workplace?
Tracking performance, internet activity, and breaks taken by employees
Monitoring can include various methods such as task completion times and internet use.
What is one use of tagging devices in monitoring?
To ensure known criminals remain within prescribed areas
Tagging devices help enforce restrictions on individuals who are banned from certain locations.
What role do social media activities play in monitoring?
They can be monitored by employers and the press, and once posted, are difficult to remove
This data can be accessed long after the original post.
What is end-to-end encryption?
A method where only the sender and receiver can access messages
This complicates monitoring communications by authorities.
What does data mining involve?
Automated processes that search for patterns in large data sets
It is used in various fields including crime prevention and business analysis.
What does the Data Protection Act do?
Provides legislation on sharing data between organizations
It aims to protect individuals’ data privacy.
What obligations does GDPR impose on organizations?
Organizations must be clear about what data they collect and why
This legislation enhances individual data rights.
List three ways computers may monitor the workforce.
- Performance tracking
- Internet activity monitoring
- Break duration logging
What is piracy in the context of copyright?
Unauthorized reproduction of copyrighted material
This is illegal under the Copyright, Designs and Patents Act.
What are two consequences of accessing pirated software?
- Software may not work correctly
- Risk of malware infection
What is cyberbullying?
Any form of bullying that takes place online
This includes aggressive behavior via social media.
What does the Communications Act 2003 criminalize?
Sending indecent or offensive communications
This includes online threats and harassment.
What layout pattern do viewers typically use for text-based websites?
E pattern
Viewers scan down the left side and the first few words of paragraphs.
What layout pattern do viewers typically use for graphics-based websites?
Z pattern
This involves scanning across the top, diagonally down, and across the bottom.
What is ASCII?
A character set providing 128 basic characters
It was initially used for electronic communication.
What does Unicode do?
Represents over 1.1 million characters
It allows for communication in multiple languages and symbols.
What are colour paradigms?
Established ideas about the messages different colours convey
Cultural differences can affect the interpretation of colours.
What is one requirement of the Equality Act 2010 regarding website design?
Websites must be accessible and easy to navigate for all users
This includes providing support for individuals with disabilities.
What strategies can be used to support users with visual impairments?
- Alternative text for images
- Screen magnification
- High contrast between text and background
Fill in the blank: Digital rights management uses _______ to restrict access to content.
product keys