Social and Ethical Issues Flashcards

1
Q

What is the year 2000 (Y2K) Problem

A

in 1960s and 1970s storage was exepsensive so the software was required to use the absolute minimum amount of storage space. In order to adapt to this need, software developers often had used only 2 digits to represent the year within dates as it was never thought that these products would still be used when the year 2000 came along.

The consequence of this short-sightedness anticpated that the systems would fail as the year changed from 1999 to 2000 because the software would think the year was 1900 instead of 2000 similar to other years such 1960 being interpreted as 2060 which caused a variety of incorrect calculations in real-time and computer crashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is malware

A

a malware is any malicious software designed to damage or perform unwanted actions on computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a virus

A

a virus is a type of malware that replicates itself when executed, it does this by injecting its own code into other programs.

Attack vector: A virus requires user interaction to activate it (such as a hyperlink)

Propagation: A virus spreads by having an infected machine sending emails to other users who interact with it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a worm

A

a worm is a type of malware that aims to slow down a system and replicates itself to spread to other computers

Attack vector: It Doesn’t require interaction from a user to infect - it is exploits security flaws in the operating system and then install themselves on the hard drive.

Propagation: It can spread to other systems once a computer is compromised via vulnerabilities in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a Trojan horse in terms of malicious software

A

A Trojann horse is malicious software that is masquerading as a legitiamate software. They are often used to install malware that enables an outside user (or program) to take control of your computer.

Attack vector: need user interaction to activate it

Propagation: The developer of the malware creates botnets and instructs them to perform all of the malicous tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Spyware

A

Spyware aims to obtain your information without your knowledge. It captures your web browsing habits, reads your email contacts or even keystrokes.

attack vector: user interaction to activate it

Propagation: The criminal takes the information and starts using it for malicious intents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a Social Networking Site

A

A Social Network is an online, virtual community where people share their thoughts and activities with family, friends or those with similar interests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are some well known social networking sites

A

Facebook

LinkedIn

Twitter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Cyber safety

A

Cyber safety is about minimising the risks of dangers on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are things to look for when being Cyber safe

A

Location based services

Unwanted contact

Cyberbullying

Online firends

Your digital footprint

Online purchasing

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is intellectual property

A

Property resulting from the fruits of mental labour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some ways of evaluating information on the internet

A

who is the author?

Is the information up-to-date?

who is the intended audience

is the information accurate and unbiased

What is the purpose of the information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is Royalty

A

A compenstation, usually a protion of proceeds paid to the owner (author) of a right, for the use of a work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Publisher

A

One whose business is the copying, distribution and sale of works by an author

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Quality Assurance

A

Quality Assurance is used to ensure that the standards of their employees and products are met. It is an ongoing process throughout the design and development to ensure and verify the quality of the software. They are used to make sure that the customer’s expectations are met and/or exceeded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is quality determined

A

if a product is to be preceieved as one of high quality, the customer’s expectaions must be exceeded where if the product fails to meet the customer’s expectation then it is preceived to be of low quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are the factors that affect Software quality

A

Correctness: Does it do what is supposed to do?

Reliability: Does it do it all of the time?

Efficiency: Does it do it the best way possible?

Integrity: Is it secure?

Useability: Is it designed for the end user?

Maintainability: Can it be understood?

Flexibility: Can it be modified?

Testability: Can it be tested?

Portability: Will it work with other hardware?

Re-useability: Can parts of it be used in another project?

Interoperability: Will it work with other software?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what are the external factors that affect the quality of a product

A

hardware

operating system

other software

runtime errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is an operating system

A

an operating system provides the interface between the software application and hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is forward compatible

A

the ability of an older system to operate in harmony with a new system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is file association

A

defines the application that is executed when a data file is opened, usually by double clicking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what is a shared file

A

a file whose code is used by more than one program. Example a dynamic link libary file (.dll file)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is in the priority/severity table in response to problems

A

1 Critical: Affecting operations/financial loss: Immediate Resolution

2 Major: Affecting operations difficult workaroudn available: Resolution up to 3 months

3 Normal: affecting operations workaround available: resolution up to 12 months

4 Cosmetic: No effect on operations/Enchancement requests: as time constraints allow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is a code of conduct

A

A Code of Conduct is a set of standards by which Software Developers agree to abide. Many professional software developers are members of professional associations that
expect adherence to a written Code of Conduct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what is ergonomics

A

The study of the relationship between human workers and their work environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what is a user inteface

A

the screen designs and connections between screens that allow the user to communicate with software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what is the most important aspect of user interfaces

A

consistency of design. It allows users to transfer their skills from other applications and other areas of your applicatin to new areas.

28
Q

how to ensure consitency in User interfaces

A

Setting standards and sticking to them.

Use interface elements correctly.

Use colour appropriately

Use Fonts appropriately

Allignment of data entry elements

provide a consistent method of reversing actions.

29
Q

What is useability testing

A

it is a test to measure how sucessful your product meets the needs of the users (Usability). It is not as much about the performance and functionality of the product but rather the efficiency and satisfaction of the users experience when they use your product.

30
Q

What is inclusivity

A

Not excluding people based on their cultural background, economic background, gender, disability and etc.

31
Q

what are some issues related to design and development costs that influence the final purchase price for users

A

Quality

Nature of market

Management of software design and development process

influences on pricing

32
Q

how can software include functionality to adapt to people with disabilities

A

Visual disabilities: using larger fonts, providing facility for controls and graphics to be scaled, not using colour as the sole method of conveying information and using labels

Hearing disabilities: softare should not rely just on sound for commmunicating information. It should emphasise and/or reinforce visual clues. Provide functionality to convert between language, speeach into text or sign language.

Physical disabilities: adjusting keyboard inputs times, use technology to detect motion, simplify what they must do in order to use the software.

33
Q

what is a backup

A

a copy of software or data made to guard against accidental loss of the original

34
Q

what is software piracy

A

it is the illegal coppying and use of software. It occurs when the intellecutal property rights of the developer/author are infringed. Software piracy can occure when an individual illegally installs the software onto their own devices or on a grander scale distribute copies of the copyrighted software for financial gain.

35
Q

what is plagiarism

A

Plagiarism is appropriating or imitating another’s ideas and manner of expressing them and claiming them as your own.

36
Q

What are the rights in Copy Right

A

to repoduce the copyrighted work

to make derivative works (example a movie from a novel)

to distribute copyrighted works to the public

to perform certain works in public

one copy may be made for backup purposes only

when ownership of a licence is transferred, all copies must be handed over or destroyed

decompilation and reverse/backward engineering are not permitted. However they may be deompiled or reverse/backward engineered to provided information other developers in regard to their product interacting with the copyrighted product.

37
Q

what are the four classifcations of software in terms of Copyright

A

Commerical

Open Source

Shareware

Public Domain

38
Q

what is decompilation

A

the opposite of compilation. Translating machine executable code into a higher-level code (usually assembler). This allows the program’s design to be more easily understood

39
Q

what is Reverse/Backwards Enginnering

A

Analysing a product and its parts to understand how it works to recreate its original design, usually with the purpose of creating a similar product based on this design.

40
Q

what is commerical software

A

comercial software is most software purchased from software publishers, computer stores and other retailers and software distributers

41
Q

What is stated in Commercial software licenses

A

The software is covered by copyright

One archival copy may be made for use only if the original fails

modifications to the software are not permitted

Reverse engineering and decompilation are not allowed

Use of the work as part of another packaged is not allowed without permission

42
Q

what is Open Source

A

Although covered by copyright law, open source licences specifically remove many traditional copyrights. The source code is developed collaboratively and is available to all to modify and redistribute. The only restriction is that the author is recognised that modified products must be realsed using the same unrestricted open source licence.

43
Q

What is the aim of open source licences

A

it is to ensure users can freely use and modify software without fear of legal challenges. This is to encourage collaboration and sharing of ideas within the software development community

44
Q

what are the four freedoms that every user should have in Open Source software

A

The freedom to use the software for any purpose

the freedom to change the software to suit your needs

the freedom to share the software with your friends and neighbors

the freedom to share the changes you make.

45
Q

What is shareware

A

Shareware is covered by copyright, similar to commerical software you are acquiring a licence to use the product; you do not own it. Purchases are allowed to make and distributed copies of the software, and Once you have tested the software and decided to use it you have to pay for it.

46
Q

What does shareware licenses state

A

The sofftware is covered by copyright

Copies can be made for archival or distribution purposes

modifications to the software are not permitted

reverse engineering and decompilation are not allowed

use of the work as part of another package is not allowed without permission

47
Q

What is Public Domain

A

Software becomes public domain when the copyrights holder explicitly relinquishes all rights to the software. Software in the public domain must be clearly marked as such (just because it does not have a copyright symbol does not mean it is not covered by copyright)

48
Q

what does Public domain state

A

Copyright has been relinquished

Copies can be made with no restrictions

Modifications to the software are allowable

Decompilation is allowed

Developing new works based on the product is allowed without restriction

49
Q

What is a licence

A

A formal permission or authority to use a product.

50
Q

what is an agreement

A

a mutual arrangement or contract between parties.

51
Q

what is a term

A

the period of time the agreement is in force.

52
Q

what is an Warranty

A

an assurance of some sort- a guarantee.

53
Q

What is limited use

A

Software licences do not give unrestricted use of the product. Commonly usage of software products is retricted to a single machine.

54
Q

what is liability

A

An obligation or debt as a consequence fo some event,

55
Q

what is a program

A

Program refers to the computer software. This usually includes both the executable files and indluced files, but does not include the media( it refers to software stored on the media).

56
Q

What is reverse engineer in terms of licencing

A

the process of decompiling the product

57
Q

what is a back up copy in terms of licencing

A

A copy of the software made for archival purposes.

58
Q

What are some current and emerging technologies used to combat software priacy

A

Non-copyable datasheet

Disk Copy protection

Hardware serial numbers

Site licence installation counter on a network

Registration code

Encryption key

Back-to-base authentication

59
Q

What is a network

A

A collection of computers connected electronically to facilitate the transfer of data and software

60
Q

what is the response time

A

the elapsed time between a request (or user input) and a response (or output to the user) from the system

61
Q

what is marketing

A

The effort to determine and meet the needs and want of current and potential customers

62
Q

What are the Four P’s of marketing

A

Product - What do you sell

Place - Where do you sell it?

Price - what do you sell it for

Promotion - How do you spread the word

63
Q

What is the difference between the cost-plus method and the consumer based pricing

A

the cost-plus method is take the cost of producing the product and add the profit margin to the price, where as the consumer-based method is looking at what the consumer wants and how much they are prepared to pay for it.

64
Q

What is a custom software

A

a product designed to solve a particular problem or set of problems

65
Q

What was the RACV versus Unisys legal action about

A

RACV is a motor vehcile and general insurance company similar to the NSW NRMA. In 1993 the RACV issued a Request for Proposal (also known as a Request for tender (RFT) to convert from its current paper-based claims management system to an electronic storage and retrieveal system.

Unisys systems was the company that won the proposal to supply RACV their new system. During the presentations of the new system unisys assured RACV that the response times and functionality shown during the demonstrate would be indicative of the live system, and accpetance testing was signed off in march 1995.

However when the system was delivered however, the expected repsonse times and functionality failled to meet, and the system had to be redesigned but even after the redesign it failed to deliver on expectations.

In 1996 RACV terminated their contract with Unisys and sought damage through court for citing false representationa dn misleading conduct with regard to the functionality of the system.

RACV won the legal battle

66
Q

What was the NSW Tcard system legal court case

A

A new NWS Tcard system was a proposal put forward by the NSW State Government in 1996 to replace the automated ticketing system that was being used, and had hoped the new system would be operational in time for the Sydney 2000 Olympic GFames.

However the Syndey Olympic games had passsed with various legal wrangling between the parties preventing the start of the development. Finally in 20024 the contract was awarded to the ERG group and developmend commence with a 2005 deadline.

However the project were plagued by delays with both the NSW State Government and the ERG groupld blaming each other for failure to deliver on particular milestones, the deadline for a full commuter trial to take place was set for the end of 2004 but is was passed without the milestone being reached.

A trial was commenced in 2005 for school students and in 2006 expanded to include some private bus companies. However delays stilll continued and when the second deadline was met without the delievery of the system, the State government terminated the contract and sought damages of $95 million. Following the termination of the contract the school student Tcard system that was in operation was also brough to an end.

in the intial submissions the lawyers for the ERG group alleged that the NSW state govenermnet refused to allow live testing of its system and nothing could be installed until the system was 100% perfect. The law suit was set down to be heard by the end of year 2011

ERG alleged that it did not recieve sufficent cooperation from operators such as RailCorp and they were not provided with reliable system testing reports throught development

ERG had succesffuly developed other smart card transport systems for other countries

ERG filed a counter claime to the NSW Supreme court for $200 million for illegal termination of contract by NSW State Government