Social Implications Flashcards

1
Q

Give TWO ways of reducing the possible negative impact of ICTs on the environment

A

(1) Recycle/Reuse old computers/devices/parts
(2) Buy energy efficient hardware
(3) Switch off computers when not in use
(4) Proofread before printing/Print on both sides of the paper/Print 2 pages per sheet/Print in draft/eco-mode
(5) Adjust device settings to use less energy, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain TWO dangers of sharing your location online

A

(1) You could be spammed with location-based advertising
(2) You could be stalked and harassed
(3) Criminals could target your premises while you are away

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What can you do to prevent the spread of fake news when using social media?

A

(1) Verify the authority of the source/content/Check the facts
(2) Do not forward messages that are emotionally charged/not confirmed/seems too good to be true
(3) Educate people about fake news
(4) Report fake news

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Discuss TWO consequences for victims of identity theft

A

(1) Others will have access to bank accounts and steal your funds
(2) Financial implications, e.g. others are able to take out loans in your name that you will have to repay/You may be blacklisted
(3) Reputational damage/Emotional distress as a result of being a victim of identity theft
(4) Others can impersonate you so that they can commit fraud/to commit criminal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is a screen lock pattern on a computing device generally considered less secure than a strong password?

A

(1) Easier to trace the pattern by following the marks (residue) that your fingers have left on the screen
(2) Easy for someone to see if they are looking over your shoulder
(3) There are a limited number of patterns available/Strong passwords require alphabetical characters, digits and other characters (symbols) offering more combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give TWO recommendations to prevent ransomware attacks

A

(1) Update all software
(2) Install and update antivirus/anti-ransomware software
(3) Do not click on links in pop-up windows or phishing e-mails/Spam filtering for less exposure to adware
(4) Implement advanced security measures on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between a bot and a zombie?

A

A bot is software/application used to automate certain tasks and actions

A zombie is an infected computer that has been taken over/is remotely controlled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain why users may not realise when they are victims of a spoofing attack

A

The e-mail address appears to be valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give TWO reasons why DDoS attacks are harmful

A

1) Legitimate users are not able to use the website/service/internet
2) Website/Company can lose income
3) Reputational damage done to the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Discuss the risk of posting videos that you made on social media platforms (such as TikTok or Instagram)

A

1) Others can use and share your content as if it belongs to them/identify theft
2) You may become a victim of stalking/phishing/cyberbullying
3) Agreement may state that you have transferred the ownership of your content to that platform
4) Consequences such as legal liability/harming minors and others
5) Disadvantaging yourself on a social/professional level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Give TWO ways to reduce the risk of your computer getting infected by a virus, other than installing an antivirus program or keeping software up to date

A

1) Do not click on links/attachments in suspicious e-mails or websites
2) Do not use pirated/cracked software
3) Only download files from safe sources
4) Use a browser known for good security e.g. Firefox/Pop-up blocker
5) Minimise use of untrustworthy/external media to transfer data
6) Scan external media before data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give TWO examples of how artificial intelligence (AI) can be useful in a school environment

A

1) Educational apps to personalise learning experience
2) Digital classroom assistant can help with internet research
3) Facial recognition on CCTV can assist with better management of the school disciplinary system
4) Automated management of attendance using data gathered from CCTV and fingerprint scanners
5) Analysis of trends based on data gathered by sensors such as facial recognition and fingerprint scanners, regarding attendance of school functions, academic performance, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Give an example of a product that is considered to be intellectual property

A

1) Music
2) Software
3) Art
4) Books
5) Design/Industrial design
6) Podcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give TWO guidelines that can be found in a school’s BYOD policy

A

1) Install an antivirus program
2) Use legal/approved software
3) Do not store sensitive/personal information
4) School has the right to install software on your device
5) Limitation placed on data usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain TWO ways to protect your privacy when using the internet through a public hotspot

A

1) Do not perform financial transactions
2) Do not give out/enter personal information/Do not share data over network
3) Do not login to any apps that have your sensitive information
4) Ensure that nobody is looking at your screen/shoulder surfing
5) Use a VPN/Incognito mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Suggest TWO ways in which to prevent computer hardware theft in schools

A

1) Install security gates and burglar bars
2) Limit access/employ security companies/guards
3) Install security cameras
4) Install alarm systems
5) Biometric security for entry into the computer lab
6) Place devices in a strong room/safe

16
Q

Give ONE reason why some companies may NOT allow their employees to telecommute

A

1) Security of sensitive information
2) Cannot easily measure their performance/productivity when employees are not in the office/Too many distractions at home
3) Costly to set up work infrastructure/resources at the office and at the homes of employees
4) Job description requires physical presence
5) Eliminate professional isolation/Encourages teamwork

17
Q

Discuss TWO negative effects a user can experience if he/she overuses social media

A

1) Lack of social interaction/Person becomes anti-social
2) Can become addicted to social media/Neglects important work
3) Addictive behaviour can lead to depression/Body dysmorphia
4) Could affect the normal development of children/Could lead to low self-esteem
5) High data usage may lead to financial strain
6) More likely to become a victim of online harassment/cyberbullying, etc.

18
Q

Give the term for a type of malware designed to encrypt or block access to your computer system and files until you pay a sum of money

A

Ransomware

19
Q

Why do recruitment agencies check the social media accounts of jobseekers?

A

(1) To check a jobseeker’s work or study history/track record
(2) To confirm evidence of claims made on the job-seeker’s CVs
(3) To do a background check on the type of character and social activity of the job-seeker

20
Q

Some free apps are not really free

Give ONE reason to support the statement above

A

(1) The apps generate an income through advertising
(2) The apps sometimes ask users to pay to activate additional features/In-app purchases
(3) Could be for a trial period after which payment is expected

21
Q

Explain how user-centred design (UCD) can be applied when creating an electronic form that will be used by partially sighted people

A

(1) Text should be larger
(2) Images or illustrations should be large enough and clear
(3) Layout and structure of the form should be well spaced and user friendly
(4) Consistent use of styles and sequence of objects for a text reader
(5) Add alternative text to explain the content of images
(6) Use a high display contrast between foreground and background colours
(7) Add custom sounds/voice prompts

22
Q

Give TWO measures to prevent cyber criminals from accessing a computer system

A

(1) Use a firewall/antivirus
(2) Use (strong) passwords/Use a password manager
(3) Never share passwords/personal details with others
(4) Use biometric security
(5) Run regular updates to fix software vulnerabilities