Social and ethical issues Flashcards

1
Q

has the correct data been entered into the computer system?

A

reliability and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Has somebody deliberately or accidentally changed the data?

A

reliability and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Are there any inconsistencies in the data?

A

reliability and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How trustworthy is the computer hardware?

A

reliability and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How often does the hardware fail?

A

reliability and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How trustworthy is data stored on the computer?

A

reliability and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is the data stored on the computer outdated?

A

reliability and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can the computer hardware be protected from damage or unauthorized modification?

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can the data be protected from being changed, deleted or copied by unauthorized people?

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who is allowed to access the hardware and the files stored on a computer?

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can we protect the computer systems from computer virus and other malware?

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can we protect the computer systems from hackers?

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What data should be considered private and what shouldn’t?

A

privacy and anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can data be kept private?

A

privacy and anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is it acceptable (or to what extent is it acceptable) to reduce privacy for the purpose of public safety?

A

privacy and anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can intellectual property of people be protected?

A

intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What intellectual property issues are specifically related to IT?

A

intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What intellectual property rights do people have?

A

intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What authentication method should be used?

A

authenticity

20
Q

How secure are the authentication methods?

A

authenticity

21
Q

what are some consequences of identity theft?

A

authenticity

22
Q

Do all people have equal opportunities to accessing the benefits of IT?

A

the digital divide and equality of access

23
Q

Can the information published on websites be read by all those it is intended for?

A

the digital divide and equality of access

24
Q

How does the cost of IT hardware and software limit certain groups of people in using IT?

A

the digital divide and equality of access

25
Do all people have the same opportunities for using the resources of the Internet?
the digital divide and equality of access
26
should employees be monitored by their bosses?
surveillance
27
Under what circumstances is this acceptable?
surveillance
28
How can people be controlled with the help of IT?
surveillance
29
what benefits and problems does control offer?
surveillance
30
.  How can IT help reduce the boundaries between cultures, countries and continents?
globalization and culture diversity
31
How can the globalization of the WWW be both a threat and an opportunity to minority groups?
globalization and culture diversity
32
What influence does the dominance of the English language on other cultures?
globalization and culture diversity
33
Is the Internet a threat or an opportunity to the culture of a society?
globalization and culture diversity
34
what should a policy contain?
policies
35
who is responsible for making the policy?
policies
36
what are possible consequences if users (or organisations) do not adhere to the policy?
policies
37
How long will the used standards and protocols be supported?
standards and protocols
38
What problems do people encounter when they want to upgrade old hardware systems?
standards and protocols
39
how well do people accept new technology?
people and machine
40
which task are performed better using robotics and which task are performed better by a person?
people and machine
41
Which tasks are done better with the help of a computer and which tasks are not?
people and machine
42
What are possible health and safety consequences arising from the use of ICT?
people and machine
43
what is the appropriate behaviour when using the computer
digital citizenship
44
What precautions should users take to minimize the possibility of data loss?
digital citizenship
45
how can computers be used ethically?
digital citizenship