Social implications Flashcards

1
Q

The effect on workplace and employment practices

A

the impact of tech is continuously changing with technological advancements. Face-to-face meetings have often been given away to video conferences and file rooms to mass storage devices. Traditional offices have changed to “desk space” in a large office where employees sit anywhere ,or they may work from home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Acceptable user policy

A

is a set of rules drawn up by the management of a company to protect the company , the network the company’s devices, and data from misuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

mobile offices vs virtual offices

A

mobile offices
=comfortable working space
=need good internet .laptop, headphones
=limits to battery life
=lack of power outlets
=aim to have fewer devices so that transportation is easy

virtual offices
=give the business the appearance that it physically exists
=laptops, phones, and the Internet to interact with its customers through the service provider
=savings are made
=use of paper is kept to a minimum ,online resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

advantages of decentralization of labor

A

= Transport and space costs are reduced
= Some employment categories lend themselves well to decentralization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

disadvantages of decentralization of labor

A

=loss of cohesion and common purpose
=others would benefit more by maintaining interaction in the formal office environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

robotics

A

complex machines that perform dangerous ,repetitive or distasteful jobs that are boring or risky for humans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

advantages and disadvantages of robotics

A

A = They reduce injuries
D= requires more skilled labor that is able to program and maintain

it s used in medicine and manufacturing industries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

artificial intelligence

A

=a branch of science that deal with machines finding solutions to complex problems n a more human-like manner
=borrowing characteristics from human intelligence and applying them algorithms in a computer-friendly way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

unmanned aerial vehicles

A

a type of aircraft that operates without human pilot on board(drone)
=used to check lands, delivery and other things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

social engineering

A

the act of manuipulating people into giving out personal information in order to commit fraud or gain unauthorised computer access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

name 3 technological advancements that could replace the workplace

A

=robotics
=AI
=Unmanned aerial vehicles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is ergonomics

A

the science which deals with the design of equipment ,furniture and environment to fit the user’s capabilities and to promote user safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

physical probelms that come with computers

A

-text messaging
-repetitive strain injuries
-carpal tunnel syndrome
-eyestrain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the reasons for a digital divide

A

-infrasturucture
-poverty
-education
-political

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a digital divide

A

the gap between the haves and have-nots. The haves are the people that have regular access to digital and information technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

discuss economic reasons for using computers

A

-the computer does more things quickly and more accurately than the alternate option of doing the tasks manually provided that the user feeds the computer accurate data
-productivity in the industry is much greater, more cost-effective more efficient, and more reliable when computers are used in manufacturing, replacing manual labor.
-It allows us to tear extremely large amounts of data with effortless retrieval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

reverse social engineering or role-playing

A

an attack in which an attacker convinces the target that the target has a problem or might have a certain problem in the future and that the attacker, is ready to help solve the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

effects of computer crime

A

-social engineering
-shoulder surfing
-dumpster diving
-phising
-reverse social engineering or rola playing
-use of social media for social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

shoulder surfing

A

where the attacker uses observational techniques such as:
-looking over the shoulder to get information while the user inputting sensitive data
-can be performed at a long range using binoculars , vision-enhancing devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

dumpster diving

A

when an attacker uses thrown documents t get info about the company , employees and network structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

phishing

A

-convincing email that is sent to a user requesting the user to click on a link that will take them to a fake spoofed website, requiring personal or like banking details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

reverse social engineering involves what 3 parts ?

A

sabotage
marketing
support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

sabotage

A

when the ttacker corrupts the system so the user may ask fr help

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

marketing

A

the attacker advertises himself as the only person who can solve the problem so the user can approach him

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

support

A

the attacker gains the trust of the target and gets access to sensitive information .

26
Q

use of social media for social engineering

A

hackers create a fake account using someone else’s details, then requests the person’s friends and tells them that there is a problem ,
send a link that when clicked, will install a virus on the target’s machine

= Use popular sites also linked in
=use Facebook to gain personal information

27
Q

hackers and cracker 3 categories are :

A

-white hat: non-malicious hackers, like employees who test the security of the film’s computer system by trying to break into it.
-black hat/crackers: malicious , hack into systems with the internet to steal or vandalize
-grey hat: in between hackers, sometimes act illegally

28
Q

virus writers

A

computer programs that are spread from one computer to another. Others used viruses to prevent their software from being pirated, it’s malicious.

29
Q

hardware theft

A

If the hardware is stolen, the software goes with it, and the hardware and applications may be replaced at a considerable cost and should be insured. If the data is stored remotely and is regularly backed up, it can be easily replaced. If the data is confidential it should be encrypted.

30
Q

software theft

A

illegal copying , sharing, or usage of copy-right protected programs

happens when someone performs:
-steals software media
-deliberately erases programs
-illegal copies or distributes a program
-register or activates software program illegally

31
Q

information theft

A

illegally copying any info that is confidential , personal, including passwords.

32
Q

identity theft

A

when a person pretends to be someone else in order to access resources /credit or other benefits in that person’s name.

33
Q

bandwidth theft

A

-connecting to the Wi-Fi /internet which you don’t belong to or don’t have permission to use.
- can be used to gain access to the owner’s computer and commit identity theft.

34
Q

theft of time

A

when employees accept payment for work not done.

35
Q

theft of services

A

using a service without paying for it.

36
Q

effect of cyber crimes

A

-everybody who uses the internet is at risk, financial impact
-individuals and companies could potentially lose everything
= People must take every possible precaution to protect themselves.

37
Q

how to protect your personal info and stay safe online

A

-install anti-malware and a firewall
- surf and download safely
-never click “agree” or “ok” to close a pop-up window you may be unaware of what you are agreeing to.
-update your software regularly to make security security
- use an updated web browser
-be wary of email attachments
- store sensitive data securely
-be cautious about giving out your personal information to anyone
-choose secure passwords
-never cellphone bank on public computers and Wi-Fi
-stay alert to the latest scams
-be wary of entering online competitions

38
Q

evaluating information

A

we need to be aware that there is a great deal of inaccurate information on the web.

39
Q

fake news

A

fake news, stories, or hoaxes created to deliberately misinform or deceive readers

40
Q

different types of fake news are generated;

A

-clickbait
-propaganda
-satire/parody
- sloppy journalism

41
Q

evaluating websites

A

It is important to be able to evaluate websites and select the most relevant information. When you use a search engine, you need to be able to make informed choices when selecting appropriate websites from the vast list provided by the search engine

42
Q

affiliation

A
  • who supports the website
    -is the company or institution or individual affiliated with any professional organization?

companies may present biased information promoting their products or causes. One should always check to see if an organization has affiliations and to whom they are accountable.

43
Q

audience

A
  • who is it intended for
  • is the content appropriate for the intended audience

the level of language, as well as the content of a site, is normally a quick indication of the intended audience.

44
Q

authority

A

-who is the author and what are their credentials or qualifications -are they listed??
-check the domain of the document ,what institution publishes the document

often the author is not given, but it is published by a reputable company. If a site does do not have an author and it is not published by a reputable organization, it should be rejected

45
Q

content

A

-is the content of the site organized logically?
-are the links all working
-is the info presented cited correctly??

if the content and language of a site is badly written and presented it can be an indication that the information may be incorrect.

46
Q

currency

A

-is the information on the web page up to date?
-when was it produced??
-when was it updated?
-how up-to-date are the links?

topics where new developments occur should be up to date

47
Q

design

A
  • is it easy to navigate and visually pleasing
    -can you view the information properly?
    -does the webpage load easily ?
    -are you required to register and provide personal information

if a website is difficult to vavigate then mst users will leave after 3 clicks of the mouse to hyerlinks. If the site requires you to register

48
Q

design

A
  • is it easy to navigate and visually pleasing
    -can you view the information properly?
    -does the webpage load easily?
    -are you required to register and provide personal information

if a website is difficult to navigate then most users will leave after 3 clicks of the mouse to hyperlinks. If the site requires you to register, generally avoid it unless you are sure that site will be beneficial

49
Q

objectivity

A
  • does it reflect preconceptions?
    -is the page a mask for advertising? If so, the information might be biased.
    -how detailed is the information
    -does the author use emotive language
  • does the author cite a few limits to support their arguments

it has to do with whether the info is presented in a fair and balanced way, by offering different points of view. To understand objectivity, understand the purpose of the website.

50
Q

what is green computing

A

the study of designing devices in a way that reduces their environmental impact ,engineering,manufacturing , using and disposing of computing

51
Q

name the 4 approaches to green computing

A

-green use
green disposal
green design
green manufacturing

52
Q

green use

A

minimizing the electricity consumption of computers and their peripheral devices and using them in an eco frienf\dly manner

53
Q

green disposal

A

repurposing existing equipment or appropriately disposing of or recycling unwanted electronic equipment

54
Q

green design

A

designing energy-efficient computers ,servers and printers and other digital devices .

55
Q

green manufacturing

A

Reduce waste during the manufacturing of computers and other computing devices to reduce the environmenta l impact

56
Q

green manufacturing

A

Reduce waste during the manufacturing of computers and other computing devices to reduce the environmental impact

57
Q

what are the strategies to make your computer usage greener?

A

-use the hibernate or sleep mode when away for the computer
-buy energy-efficient notebook computers instead of desktops
- activate the power management features for controlling energy consumption
-make arrangements for safe disposal
-turn off the computer at the end of each day
-don’t buy,upgrade the existing one

58
Q

Data misuse

A

when data is used for a different purpose than the original reason it was collected

59
Q

Cyberbullying

A

bullying that takes place over digital devices which includes sending, posting or sharing negative content about someone else

60
Q

Child pornography

A

images of children involved in sexual activities traded on the internet often using the dark web around the clock

61
Q

Electronic Communications and Transactions Act

A

any form of communication by email, the internet etc it does not include voice communications between two people

62
Q

Cryptocurrencies

A

a form of payment that can be exchanged online for goods and services