social and ethical issues LU8 Flashcards

1
Q

economic reasons for using computers

A

quicker and more accurate
reliable,efficient
makes globalised business possible-communication through internet
saves paper
productivity increased-cost effective,efficient,more reliable,replaces manual labour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

why is there digital divide

A

lack of infrastructure
poverty and no access to basic necessities
lack of education,basic literacy and schooling facilities
politics- civil wars and violence-no time for divide. internet taken away in wars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how do we bridge the digital divide

A

improving infrastructure
reduced poverty
improved education
introduce cellphones,easier than computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is ergonomics

A

Hardware that is designed with the user in mind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

sore thumb syndrome

A

texting and making many repeated movements limiting blood circulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is RSI and how does it occur

A

repetitive strain injuries
occurs from repeated physical movements that cause damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

symptoms of RSI

A

damage to tendons,nerves,muscles +other soft body tissues
tightness,discomfort,tingling,coldness,numbness,stiffness,soreness,burning,pain IN hands,wrists,fingers,forearms,elbows,upperback,shoulders+neck

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what makes you more likely to develop injuries with texting

A

using incorrect typing techniques or body positions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is CTS

A

carpal tunnel syndrome
a painful condition involving the median nerve, flexor tendon + transverse carpal ligament.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how does CTS occur

A

as you move your hand + fingers - the flexor tendons rub against the sides of the tunnel created by the carpals and transverse carpal ligament.
The rubbing causes irritation of the tendons causing them to swell, which applies pressure to the median nerve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how to treat CTS

A

splints and braces
anti inflammatory medication
cortisone injections
surgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are the effects of CTS

A

tingling
numbness
debilitating pain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how do you prevent eye strain

A

take frequent breaks from viewing the computer
test eyes regularly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how is eyestrain caused

A

continual refreshal of CRT screens and detectable flickering
amount of time spent on computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how much of the world’s electricity is used by computer systems

A

between 5 and 10 percent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

physical problems caused by computers

A

sore thumb syndrome
repetitive strain injuries
carpal tunnel syndrome
eye strain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

how to recycle computer components

A

take to reliable IT waste disposal centre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what to do with printer cartridges

A

if cannot be refilled, dispose at printer cartridge store or IT waste disposal centre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

how to practice green computing

A

upgrade components of new device before buying to extend life of device
recycle computer components
reduce amount you print
check manufacturing company’s green manufacturing policy and commitment to minimise waste during manufacturing of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

green computing

A
  • designing , engineering, manufacturing or disposing computer components in a way that reduces their environmental impact
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

effect of technology on workplace

A

-video conferences instead of face to face meetings
-mass storage devices instead of file rooms
access to information is simplified (efficiency and productivity increased)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

acceptable user policy

A

set of rules drawn out by management of a company to protect company, its network and data from misuse - outline how network + internet should be used in a company
employees have to sign AUP
eg. usb ports on all networked computers, strict policies w size pf attachments in emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

mobile office

A

caravans/shipping containers customised to include comfortable working space + equipment to connect to internet
for need to work at remote locations, can be done w ability to synchronise necessary ICT devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

virtual office

A

range of services (video conferencing, customer contact) offered by service providers that give business appearance that it physically exits
using laptop, mobile devices and internet access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

decentralisation of labour

A

as employees don’t have to physical work in an office environment, labour becomes decentralised
transport and office costs reduced
loss in cohesion and common business

26
Q

robotics

A

study of complex machines that perform dangerous, repetitive or distasteful jobs that are boring or risky for human workers
reduce employee injuries

27
Q

AI

A

artificial intelligence
branch of science which deals with helping machines find solutions to complex problems in a more human-like manner
involves borrowing characteristics from human intelligence and applying them as algorithms in computer friendly way

28
Q

UAV

A

unmanned aerial vehicles
type of aircraft that operates w/o human pilot on board eg drone
used for pest and weed control, military, farming
cuts down labour costs

29
Q

social engineering

A

act of manipulating people into divulging confidential info w view to commit fraud or gain unauthorised computer access
shoulder surfing, dumpster diving, phishing, role playing, use of social media

30
Q

shoulder surfing

A

attacker uses observational techniques to get info while user is inputting sensitive data
combat- privacy screens

31
Q

dumpster diving

A

large orgs dump items w company info into public dumpsters - attacker can use these items to get info abt company, employees, network structure

32
Q

phishing

A

convincing email sent to user requesting user to click on link that will take user to spoofed website which requests user to enter sensitive info
persuades user to disclose confidential personal data

33
Q

role playing

A

attacker convinces target that he has a problem or will have a problem, and that attacker is only one who can solve it

34
Q

use of social media

A

hackers create a profile using someone’s details and will send friend requests to cloned persons friends w message that old account is wrong
then gets access to friend and clones friend account and send request to og account that was hacked- nos has access to them without person “accepting random ppl”

35
Q

hackers types

A

white hat hackers: non-malicious (company employees that test security system)
black hat hackers/crackers: malicious, hack w intent to steal/vandalise
grey hat hackers: sometimes act illegally

36
Q

theft

A

hardware theft- if hardware stolen/software goes w it , costly
software theft-illegal copying,sharing or usage of copyright-protected software programs
information theft: illegal copying or storage of confidential,personal or financial information (passwords, algorithms, databases). data can be moved to thumb drive (thumb sucking), transmitted through emails, printed
identity theft: person pretends to be someone else by assuming their identity to access resources or obtain benefits in persons name, fraud
bandwidth theft- connecting to internet through wireless internet router that you do not have permission to use
theft of time: employee accepts payment for work not done
theft of services: intentionally use service without paying

37
Q

safeguard against cyber crimes

A

install firewall/anti malware
surf and download safely
update software regularly
never click agree on pop-up window without knowing what you agreeing to
use updated web browser
be wary of email attachments+ links
store sensitive data securely w secure passwords
never log into financial accounts from public computers

38
Q

fake news

A

news,stories or hoaxes created to deliberately misinform or deceive readers
clickbait- deliberately fabricated to gain more visitors and increase advertising revenue
propaganda: deliberately mislead to promote biased view
satire/parody- fake news for entertainment
sloppy journalism- unreliable info

39
Q

evaluating website

A

affiliation (who supports it, bias?)
audience (look at language- who is it intended for, appropriate?)
authority (qualifications of author, publishing institution reputable?)
content (chronological, working links, cited correctly?)
currency ( up to date? produced date, updated date?)
design (easy to navigate and view, load easily, requires registration ?)
objectivity (preconceptions, mask for advertising-bias, emotive language, limited examples cited?)

40
Q

approaches to green computing

A
  • manufacturing, designing or disposing computers components in a way that reduces their environmental impact
  • use: minimise electricity consumption
  • disposal: repurpose/reuse or recycling/disposing correctly
  • design: design energy efficient devices
  • manufacturing: reduce waste
41
Q

make computer greener

A

sleep mode when away from computer
turn off computer at end of the day
upgrade instead of buying new
activate power management features

42
Q

positives of computers

A
  • less paper
  • easier communication (globally- advance business) - reduce need to travel- travel costs, road wear and tear+ pollution decreased
  • makes production processes more efficient
  • accessibility + mobility- can work anywhere- increased productivity
43
Q

disadvantages of tech on environment

A

-overconsumption of energy
hazardous materials in devices- disposed of incorrectly
-ink cartridges pollute soil and water
-highly toxic dumping grounds for technology
-average lifespan of an electronic device is 2 years

44
Q

benefits of AI

A

-medical care + research
-self driving cars
-tracking wildlife to prevent extinction
-predict occurrence of natural disasters
-fight spam email
-protect national security
-less room for errors
-improved efficiency
-takes risks instead of humans
-faster decision

45
Q

AI cons

A

high development cost
unemployment
makes humans dependent
lack of creative thinking

46
Q

bridge digital divide

A

digital literacy classes, make technology more affordable, donate old digital devices, improving infrastructure + education

47
Q

tech improve education

A

provide those who cannot enroll in school/uni access to free online courses

48
Q

tech improve poverty

A

create jobs, allow entrepreneur to reach wider market and create opportunities

49
Q

smart cities

A

create more efficient buildings and streets
urban area where technology and data collection help improve quality of life as well the sustainability and efficiency of city operations

50
Q

tech improve transport

A

electric cars- reduce CO2 emissions
sensors in roads- monitor parking + traffic to reduce congestion
self driving cars

51
Q

tech improve public safety

A

LBS emergency communications + apps

52
Q

tech improve healthcare

A

efficient electronic medical records (EMRs)-access anytime anywhere
blockchain technology resolve counterfeit drug prevention
IoT wearables provide user generated health data

53
Q

sexual offences act

A

prohibits prostitution, brothel-keeping and procuring and procuring pf minors over the internet

54
Q

electronic communications and transactions act

A

( excluding voice communications)
you can be held responsible for any electronic communication signed by you and used for/against you in a court of law

55
Q

protection from harassment act

A

gives victims of harassment an effective solution when they are being subjected to harassment against behaviour

56
Q

cyber bullying

A

bullying that takes place over digital devices, causing embarrassment or humiliation

57
Q

Protection of Personal Information Act

A

POPIA
- protects obtaining of personal info in a lawful + fair manner
- info can only be used for the specified purpose it was obtained for

58
Q

deep web advantages

A

increased depth + thoroughness of content not accessible by search engines
more efficient search engines, retrieve higher quality, more relevant content

59
Q

deep web disadvantages

A

search engines are slower
search string needs to be precise
ethical dilemmas- returns personal info from normally restricted databases
risk of encountering illegal, harmful + criminal activity

60
Q

dark web advantages

A

difficult to block
helps ppl to maintain privacy + freely express their views
allows undercover police officers to communicate

61
Q

dark web disadvantages

A

slow speed due to multiple layers of encryption
easier to commit crime
can be used to violate privacy of others
may expose computer to sites designed to spread malware or hack your computer