Paper 1 (my version) Flashcards

1
Q

ALU definition

A

part of the CPU that completes all the arithmetical and logical calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Control Unit definition

A

component of the processor which directs the operations of the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CU jobs (5)

A
  • accepting next instruction
  • decoding instructions
  • storing resulting data into memory
  • managing flow of data between CPU and other components
  • controlling and coordinating CPU activities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PC definition

A

holds address of next instruction to be executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ACC definition

A

stores results from calculation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MAR definition

A

holds address of location that is to be read from or written to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MDR definition

A

temporarily stores data that has been read or data that needs to be written

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIR definition

A

holds the current instruction being executed, divided up into operand and opcode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data bus

A

bi-directional bus used for transporting data and instructions between components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Address bus

A

used to transmit the memory addresses specifying where data is to be sent to or retrieved from

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Control bus

A

bi-directional bus carrying command and control signals to and from every other component in a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fetch Decode Execute

A

The complete process of retrieving an instruction from store, decoding it and carrying it out. Also known as the instruction cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Factors affecting performance of CPU (3)

A
  • clock speed
  • cache
  • number of cores
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of pipelining?

A

To reduce the amount of CPU which is kept idle, thereby improving efficiency and performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Von Neumann Architecture definition (3)

A
  • a computer architecture with a single control unit, ALU and special registers within the CPU
  • instructions and data are stored in the same place in memory, in the same format
  • instructions and data use the same set of buses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Approaches to overcome Von Neumann bottlenecking (3)

A

Caching, prefetching, multithreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Von Neumann bottleneck

A

idleness of the processor due to the shared buses being unable to fetch instructions and data from memory fast enough

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Von Neumann Architecture disadvantages (3)

A

program can be corrupt, overwritten, bottleneck

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Harvard Architecture Advantage

A

quicker execution as memory and data can be fetched in parallel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

RISC advantages (4)

A
  • enables pipelining as each instruction is the same length and takes a single cycle to complete
  • program runs faster
  • simple hardware as fewer circuits are needed for the lower number of operations,
  • lighter and produces less heat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RISC definition (2)

A
  • Reduced instruction set computer
  • instruction set is comprised of a small number of simple, fixed length instructions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CISC definition (2)

A
  • Complex instruction set computer
  • instruction set comprised of a large number of complex variable length instructions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CISC advantages (2)

A
  • programming simple as single instruction can do complex operation
  • code small so little RAM needed to store instructions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CISC info (6)

A
  • emphasis on hardware
  • multiple instruction sizes and formats
  • less registers
  • more addressing modes
  • extensive use of microprogramming
  • pipelining difficult
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
RISC info (6)
- emphasis on software - instructions of same set with few formats - uses more registers - fewer addressing modes - instructions take one cycle time - pipelining is easy
26
GPU definition
coprocessor that has a large number of cores allowing it to process multiple streams of data at the same time, and has its own RAM, effective for simpler operations on larger data sets, designed to perform a single repetitive task
27
CSS definition
Cascading style sheets and defines the appearance of a webpage using selectors such as classes. Can be place within HTML or externally in a file.
28
Server definition
a device that provides a central point of access
29
client definition
a device that requests data stored on a server
30
Pipelining definition (4)
- concurrent processing of multiple instructions - one instruction is fetched while the previous one is being decoded and the one before is being executed - increases speed of execution - in case of a branch, the pipeline is flushed
31
HTML definition
hypertext markup language, and defines the structure and content of a webpage using tags
32
Indexing (4)
- a spider visits a site, either by selecting it from an existing list or following a link - it then records information, such as text and metatags and records the position of each word within the page - storing them in an index - it the follows links to other sites
33
Damping factor
a value from 0 to 1 that is the probability that a user will not follow a link
34
object
instantiated from a class
35
method
an action an object performs
36
attribute
a value held by the object
37
3 factors affecting output value by the PageRank algorithm
- damping factor - number of links to target site - PageRank score of other sites linking to it
38
PageRank algorithm (2)
- checks the number and quality of links to a page to determine roughly how important the page is - the assumption is that websites of greater importance are more likely to be linked to from other websites
39
client-side processing advantages (2)
- reduces load on server - websites will work quicker for user
40
server-side processing advantages (1)
- processing done away from user's control
41
packet switching (5)
- data split into equally sized chunks called packets - each packet has a header of information that includes destination device IP address and TTL - each packet is then placed on the network and may travel by a different route - at each node, the destination address is read and the best rope is found - packets need to be reordered at the destination
42
Why are protocols important for networking?
allows devices to communicate by ensuring all devices follow the same rules so they interpret data the same way
43
Benefits of OOP (4)
- modularity: easier to test and debug as objects are self-contained with their data and behaviours. This allows a team to work on multiple objects simultaneously - reusability of code: inheritance and polymorphism can be used to create subclasses that allow, with a small amount of extra code, to have many objects with various functionalities and characteristics. the high level of abstraction means classes can be used as a black box which saves development time - flexibility: polymorphism allows the same method to acquire different behaviours from the parent class - encapsulation of data: maintains the object's data's security , as encapsulation forces developers and user to use methods (with built in validation) to change data stored in attributes
44
Object-oriented programming
Makes use of classes (templates that have methods and attributes) from which objects that represent real-world items are made
45
encapsulation
a method of maintaining data integrity by only allowing class methods access data in an object's attributes
46
disadvantages of OOP (5)
- different style of programming and requires alternative style of thinking - difficult for programmers accustomed to other paradigms to pick up - not suited to all types of problems - where few components are reused, OOP may lead to longer more inefficient program - unsuitable for smaller problems
47
encapsulation advantages (3)
- protects data - reduces the chance of inconsistencies - ensures objects can only be changed in the intended way
48
inheritance (2)
- when a class takes on the attributes and methods of a parent class - may override and have additional attributes of its own
49
LAN
group of devices connected over a small geographical area, where infrastructure is usually owned by the network owner
50
advantages of inheritance (2)
- promotes reusability: when a class inherits another class, it can access all the functionality of the parent class - reliability: the parent class's code will already be tested and debugged
51
disadvantages of inheritance (2)
- inherited methods work slower than normal functions as there is indirection - data members in the parent class are often left unused which may lad to memory wastage
52
polymorphism (3)
- when methods behave differently according to the context in which they are used - overriding is used to redefine a method within a subclass and alter the code so that it functions differently and produces a different output - overloading is passing in different parameters into a method
53
advantages of polymorphism (2)
- subclass can have their own behaviours from parent class - supports a single variable name for multiple variable types
54
immediate addressing (3)
- operand holds the actual data to be used - allows quick and simple data access (as no fetch required) - limited by the size of the operand
55
direct addressing (3)
- operand holds the address of the data to be used - data can potentially be larger than that of immediate addressing - address range limited by size of operand
56
indirect addressing (3)
- operand holds the address of where the data to be used is stored - allows larger range of addresses to be fetched - multiple fetches required to access data
57
indexed addressing (2)
- operand holds an address which is offset using Index Register to find true address of data to be used - allows Index register to be manipulated to access data stored sequentially
58
switch (2)
- joins devices on a LAN - receives packets and sends them to the devices with a MAC address corresponding to the MAC address in the packets header
59
bridge
a device that connects two similar networks
60
router (3)
- a device that routes packets between networks based on network-layer addresses - determines the best path across a network - used to connect separate LANs to form a WAN
61
TCP/IP stack layers (in order of application) (4)
- Application: specifies what protocol needs to be used to relate the application that's being sent (e.g. HTTP, POP3) - Transport: establishes an end-to-end connection between the source and recipient devices, breaks the application data down into segments (TCP) or datagrams (UDP). Sequence numbers are allocated, and source and destination port numbers are added to the header. For TCP, delivery is acknowledged, and lost segments are retransmitted - Internet: prepares packets for the internet. Source and destination IP addresses are added at this stage Link: this is the connection between network devices
62
Von Neumann Architecture (3)
- computer architecture with a single control unit, ALU and special registers within the CPU - instructions and data are store in the same place in memory and in the same format - instructions and data use the same set of buses
63
Functions of an OS (5)
- provides a user interface - manage peripherals - handling interrupts - provide security - provide utilities for system maintenance
64
Harvard Architecture
a computer architecture with separate memory and buses for instructions and data
65
prefetching
fetching instructions or data from their original storage in slower memory to a faster local memory before it is actually needed
66
caching (2)
- temporary storage of program instructions or data that has already been used once and may be needed again - they can be fetched again more quickly increasing processing speed
67
virtual storage
storing information remotely and accessing it through a computer with access to the same system
68
virtual storage limitations (2)
- network connection speed - high costs
69
RAM
random access memory, a form of primary storage used to hold programs in use and is volatile
70
fastest cache
L1
71
largest cache
L3
72
co-processor
an additional processor used for a specific task
73
GPU (3)
- graphical processing unit - a coprocessor that has a large number of cores, allowing it to process multiple streams of data at the same time, and has its own RAM - effective for simpler operations on larger data sets
74
gateway
Provides a connection between two dissimilar networks
75
Firewall
A piece of software that monitors/filters packets going to and from a network
76
paging (2)
- memory split into fixed size physical divisions called pages - causes internal fragmentation
77
segmentation (2)
- memory split into unevenly sized divisions call segments - causes external fragmentation
78
Why scheduling is important (3)
- to process as many jobs as possible, quickly and fairly - maximise number of interactive users with fast response time - efficient use of recourses
79
Why memory management important (4)
- organises use of main memory by converting logical addresses to physical addresses - allows programs to share or allocate memory - protects processes and data from each other - enables programs larger than main memory to run
80
Preemptive scheduling algorithm
Jobs are actively made to start and stop
81
Non preemptive scheduling algorithm
Once a job is started, it is left alone until (it is) finished
82
First Come, First Served
A non preemptive scheduling algorithm where jobs are dealt with in the order they arrive (queue)
83
Round Robin
A preemptive scheduling algorithm where a time slice is given to each job and they are dealt with on a FIFO basis. If the job does not finish within a time slice it joins the end of the queue
84
Shortest Job First
A non preemptive scheduling algorithm where the queue is sorted/ordered by expected execution time, with shorter jobs at the front
85
Shortest Remaining Time
A preemptive scheduling algorithm where the queue is sorted by expected remaining execution time with shorter jobs at the front. If a new job requires less time than the currently running job the currently running job is stacked so the new job can run
86
multi-level feedback queue (4)
- a preemeptive scheduling algorithm that uses queues of tasks, where each queue has different levels of priority - jobs are initially added to a queue with a certain level of priority - if a process uses too much CPU time, it is moved to a lower priority queue and if a process has been idle for a long time, it is moved to a higher queue to avoid starvation - processes that depend on input/output devices require a lot of processing time, so are kept in high priority queues, and processes that are quick to complete are served first
87
interrupt
a signal generated by software or hardware to indicate to the processor that a process needs attention
88
interrupt service routine (4)
- current FDE cycle completed - if interrupt if higher priority than current task, contents of registers pushed to a stack - the relevant ISR is loaded by loading the address of its first instruction into the PC - when the ISR is complete the previous contents of the registers are popped and loaded back into the registers
89
multi-user system (2)
- multiple users can access the same system - uses a scheduling algorithm to ensure processor time is shared fairly and avoid the risk of processor starvation so users can access the same system at the same time without affecting the other user
90
multi-tasking system (2)
- enable the user to run more than one program at the same time - this is done by time slicing to quickly switch between programs and applications in memory
91
multi-core processor
more than one processing unit in a single processor which can independently process instructions at the same time
92
distributed system (2)
- a system which is run across multiple devices - allowing the load to be spread across multiple computer processors using parallel processing
93
embedded system (3)
- software used to manage the device - built into the device itself and specific to the hardware - stored in ROM so it cannot be changed
94
real-time system (3)
- a system that gives a response within a fixed time frame - redundancy is built in so the system can handle sudden increases in input - rarely run at capacity
95
BIOS
responsible for loading the OS when the computer fist turns on
96
devices drivers
utility software used by the OS to communicate with peripherals, specific to the computer's architecture and OS
97
Utility software
software that performs a specific task, usually related to the upkeep of the system
98
Register (2)
- temporary storage within the CPU used for a single specific purpose - faster access than RAM
99
Operating system
A collection of software that works together to provide an interface between the user and computer
100
What is BIOS (4)
- power-on-self-test: ensures all hardware is correctly connected and functional - checks the CPU clock, memory and processor are operational - tests for external memory devices connect to the computer - bootloader passes control to the kernel which initialises the OS
101
Virtual machine
a computer system created using software on one computer in order to emulate the functionality of another separate computer
102
First Normal Form (1NF)
A relation that has a primary key and in which there are no repeating groups.
103
Second Normal Form (2NF)
a relation that is in first normal form and has no partial dependencies (no attribute can depend on part of a composite key)
104
Third Normal Form (3NF)
a relation that is in second normal form and has no transitive dependencies
105
Transaction
A single operation executed on data
106
Redundancy
the unnecessary duplication of data, resulting in larger files, slower performance and inconsistencies
107
Rules for transactions (4)
- atomicity: a transaction must be processed in its entirety or not at all - consistency: a transaction must maintain the referential integrity rules between linked tables - isolation: simultaneous executions of transactions should lead to the same result as if they were executed consecutively - durability: once a transaction has been executed it will remain so regardless of the circumstances surrounding it, such as the event of a power cut
108
The 4 database operations
- create: create table and insert into - read: from select - update: alter table and update - delete: drop table and delete from
109
Foreign key
primary key used to make a relationship from one table to another
110
Secondary key
non-identifying attribute that can be used as an index for quick searching
111
Flat file
a database where all data is stored in a single table
112
Flat file advantages
Quick and easy to set up
113
referential integrity
the value for a foreign key must be either null or match one of the data values in the primary key of the corresponding table
114
Flat file disadvantages
Data redundancy
115
IP address
a logical identifier that uniquely identifies a device on the network
116
Hash (2)
- a fixed-size value generated by applying an algorithm to an input - hash functions are one-way
117
How a hash table can be used to handle collisions (2)
- linear probing: move through the structure one space at a time to find the next free space - chaining: each location points to a new linked-list, the new item is added to the end of the linked list
118
Big O complexity for Linked List (3)
- linked list searched by starting at the first node and following the pointers until the desired value is found or the end of the list is reached - a list of size n on average takes a time of n/2 to search - this makes the big O complexity O(n)
119
Big O complexity for Hash table (4)
- searching hash table requires the key to be hashed and the correct location accessed - the time this takes is dependent on the time to create the hash - if we ignore collisions, O(1) / constant complexity - as list grows collisions more likely, so time taken grows linearly
120
Hash benefits (2)
- security: hash security in database to make sure they cannot be read if they are stolen as hashing is a one-way process - Access: values can be quickly access by using the hash values
121
Features of a good hashing algorithm (3)
- Low chance of collision - quick to calculate - provides a smaller output than input
122
Linked list (2)
- a dynamic data structure where each node consists of data and a pointer - the pointer gives the location of the next node
123
Application software
software designed to be used by the end user to perform a specific task
124
Applications software examples (3)
word processors, spreadsheets, web browsers
125
System software
low-level general software that is responsible for running the computer system smoothly
126
System software examples (4)
library programs, utility programs, operating system, device drivers
127
Compiling stages (3)
- lexical analysis: comments and white spaces removes, variables and subroutines are stored in symbol table, code is converted into a series of tokens, which is passed to the syntax stage alongside the symbol table - syntax analysis: the code is checked to ensure it follows the rules of the language, this is often accomplished by placing the tokens into a tree, where it breaks, errors are generated, if not rules are broken it moves onto the next stage - code generation: the object code is searched through to find the areas that can be made more efficient, insignificant, redundant parts of code are detected and removed, repeated sections of code may be grouped and replaced with a more efficient piece of code
128
Object code
the output of a compiler or an assembler
129
Library
A prewritten program
130
Linkers
links external modules and libraries included within the code
131
Static linkers (3)
- modules and libraries are added directly into the main file - this increases the size of the file - any updates to modules and libraries externally will not affect the program
132
Dynamic linkers (3)
- addresses of modules and libraries are included in the file where they are referenced - when the program is run, the loader retrieves the program at the specified address so it can be executed - files remain small and external updates feed through to the main file; there is no need to rewrite code
133
Loader
when file executed, loader retrieves the library or subroutine from the given memory location
134
Optical devices (2)
- are read from and written to using lasers - binary information is represented by parts of the disc which either reflects or scatter the incident laser light written in spiral tracks on the disc's surface
135
Flash memory (2)
- uses silicon semiconductors to form logic gates NAND and NOR to store electrical charges in the states high and low (representing 1 or 0) - non-volatile
136
Magnetic memory
- data stored by altering the magnetic field of a small section of the tape or disk - one orientation represents binary 1, the other represents 0 - written using a read head - the read head can then read the magnetic field to retrieve the data
137
Immediate code (2)
- code that is halfway between source code and machine code - independent of processor architecture so can be used across different machines and operating systems
138
Uses of virtual machines (2)
- protection from malware: malware will affect the virtual machine not the device being used - running incompatible software: programs specific to different operating systems can be run within a virtual machine, saving money required to purchase that OS
139
Virtual machine drawbacks
Running intermediate code in a virtual machine can be considerably slower compared to running low-level code on the device it was designed for
140
Open source software
open source code can be used by anyone without a license and is distributed with the source code
141
Closed source software
software that has been developed by a company and has restrictions on its use, copying and modification
142
Compiler (4)
- translates high-level code into object code all at once - once compiled can only be executed on certain devices - specific to a processor type and OS - code can run without translator present
143
Interpreter (4)
- translates and executes a program line-by-line - interpreter is required for code to run on different devices - code can be run on a range of devices - code more portable
144
GPU uses (2)
- image processing - machine learning
145
ROM (4)
- read only memory - memory which its contents can be read but not written to - software fixed during manufacturing - non-volatile
146
Assembler
translates a program in assembly language into machine code.
147
Waterfall model (2)
- each identified stage of development flows from the previous one and down to the next - feedback from each to the previous takes place independently of the forward flow
148
Waterfall advantages (4)
- linear: easier to manage, low cost, schedule/ end dates, allocate roles, check progress - user involved early and late stages - more resilient to staffing changes (heavily doc.) - ideal when requirements clear
149
Waterfall disadvantages (4)
- too rigid for some projects - heavily documented - deliverable late in project - not much customer involvement
150
Extreme programming (3)
- intended to improve software quality and responsiveness to changing customer requirements - advocates frequency releases in short development cycles - improves productivity and introduces checkpoints where requirements can be adjusted
151
XP disadvantages (2)
- suffer from creep scope - can be affected by staffing changes
152
XP advantages (2)
- paired programming - high quality code
153
Spiral model (2)
- four quadrants: planning, risk analysis, design methods, client and management evaluation - moves around each cycle one at a time in a spiral
154
Spiral disadvantages (1)
- expensive
155
RAD model (2)
- includes online development and repeated prototyping and evaluation - suited to interactive systems
156
RAD advantages (1)
- quicker development
157
Agile methodologies (2)
- describes the responsive development of a system made of small software modules - group of collaborators who work concurrently and closely under a leader
158
Lossy Compression
A compression scheme where their generally involves a loss of resolution in parts of the image where experiences shows that it will be least noticed.
159
Lossless Compression
A compression scheme that allows the original images to be recreated.
160
Symmetric Encryption
a secret key is applied to the text to change the content in a particular way
161
Asymmetric Encryption
involves a pair of keys to encrypt and decrypt a message so that it arrives securely
162
Primary Key
A field that uniquely identifies a record in a table
163
Normalisation
The process of arranging data in tables and setting their relationships to move them through normal forms
164
Ways to capture data (4)
- cheques - MICR - OMR - OCR
165
Record Locking
A technique of preventing simultaneous access to data in a database, to prevent inconsistent results. The classic example is demonstrated by two bank clerks attempting to update the same bank account for two different transactions.
166
DNS
The Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses
167
Protocol Layering
simplify networking designs by dividing them into functional layers, and assigning protocols to perform each layer's task.
168
WAN
a collection of computers on the same network spread out over a geographically large area
169
Circuit Switching
A method of sending data over a WAN in which two network nodes establish a dedicated communications channel through the network before the nodes may communicate. All data then follows this same path for the duration of the data transfer.
170
Proxies
applications that accesses data on a different computer system or network. It controls the access of authorised users to data and allows the operation of the system to be isolated from control by external users.
171
Client-Server
A method of network organisation in which network stations make use of resources available at one or more servers.
172
Peer to Peer (2)
- a network where all of the devices have the same level of authority - devices share data
173
Directed Graph
the order of the vertices in the pairs in the edge set matters
174
Undirected Graph
the order of the vertices in the pairs in the edge set doesn't matter.
175
Stack
a dynamic data structure of the form Last In First Out (LIFO)
176
Queue
a dynamic data structure of the form First In First Out (FIFO)
177
Tree
abstract data type that simulates a hierarchical tree structure, with a root value and sub-trees of children with a parent node, represented as a set of linked nodes
178
Binary Search Tree (3)
- similar to tree - each node can have only up to 2 nodes - all left nodes have smaller value than root node
179
Hash Table (2)
- calculated value used to mark the position in the table where the data item should be stored - accessed directly
180
the purpose of a D-type flip-flop
to store the value of a bit
181
Flip Flops (3)
- exist in two states: 0 or 1 - faster RAM updates more quickly - updated every clock cycle
182
inputs and outputs used by D-Type flip flop (5)
- inputs: D and clock - outputs: Q and not Q - Q and not Q only change when clock is 1 - D is the value to be stored - Q is the value being stored, not Q is the inverse
183
Half Adders
adds two input variables
184
Full Adders (2)
- adds two input variables - carries a bit from another addition as well as two inputs
185
HTML id attribute vs HTML class attribute (2)
- only one element can have an id - class can be used assigned to multiple elements
186
purpose of constructor
set initial value of attributes
187
2 advantages of client-server over peer-to-peer (2)
- central updates - data is stored in one place, so secure
188
client-server disadvantages
expensive to set up and maintain
189
peer-to-peer disadvantages
less secure, everyone has same level of authority
190
DNS role in loading website (4)
- DNS locates IP address of domain - DNS checks if resolver has IP, if dos sent straight back to user - if not resolver checks root name server where domain is form - resolver checks top level domain where domain is form, which then checks authoritative name server which sends IP address found to DNS, DNS saves IP and domain then sends to user
191
procedural programming
breaks a solution down into subroutines, these subroutines are rebuilt and combined to form a program
192
procedural programming advantages
can be divided between a team with different team members tackling different subroutines
193
Copyright, Designs and Patents Act (4)
- regulated intellectual property - brought to protect people's property online - doesn't expire until 25-70 yrs after death of creator - if individual believes work has been copied, their responsibility
194
Regulation of Investigatory Powers Act (4)
- investigation, surveillance and interception of communication by public bodies - enforces internet providers and mobile phone companies to give up information upon request from authorised authority - ensures their networks have sufficient hardware installed to facilitate surveillance - powers extend to small agencies
195
Data Protection Act (7)
- data shouldn't be kept longer than necessary - data should be accurate and up to date - data shouldn't be transferred out of the EU - data should be protected by adequate security measures - data collected should not be excessive - data only used for specific purpose - customer has right to see and ask for data
196
Computer Misuse Act (5)
- aimed at criminalising unauthorised access to a computer system - unauthorised access to computer materials - unauthorised access with intent to commit further offences - unauthorised modification of computer materials - creating and distributing material such as viruses
197
computer in the workforce (4)
- increase efficiency and productivity - higher productivity lowers labour costs - removes need to work in repetitive environment - contributes to rise in structural unemployment
198
Automated decision making (4)
- what users displayed on social media (closed-mindset society) - relying on algorithms could result in people being mistreated - ethical questions (e.g. driverless cars) - algorithms should be tested more so no bias
199
artificial intelligence (4)
- raises questions about accountability - used in voice recognition - used to detect patterns and fraud - used in expert systems to replicate knowledge of an expert
200
environmental effects (4)
- people throw away more devices as more affordable - computer components toxic and contaminate water - to power devices uses fossil fuels - growth in environmentally friendly tech
201
censorship and the internet (4)
- ISPs block content associated with terrorism - people worry that censorship is misused to push certain ideology - some believe in 'free internet', nothing filtered - may be used to maintain productivity and prevent distractions
202
monitor behaviour (4)
- employers tracking websites workers accessing - surveillance systems - some argue unethical and against basic human rights - others argue essential to put people off committing crimes
203
analyse personal information (3)
- data reveals insights about people - pressure on large firms to be more transparent with data collected - ethical concerns about whether companies have responsibility to feedback trends uncovered
204
layout, colour paradigms and character set (4)
- equality act, illegal to discriminate certain groups - must be easy to navigate between pages - people with visual impairments should be able to alter text - websites should be as accessible as possible