Social Implications Flashcards
Give TWO ways of reducing the possible negative impact of ICTs on the environment
(1) Recycle/Reuse old computers/devices/parts
(2) Buy energy efficient hardware
(3) Switch off computers when not in use
(4) Proofread before printing/Print on both sides of the paper/Print 2 pages per sheet/Print in draft/eco-mode
(5) Adjust device settings to use less energy, etc.
Explain TWO dangers of sharing your location online
(1) You could be spammed with location-based advertising
(2) You could be stalked and harassed
(3) Criminals could target your premises while you are away
What can you do to prevent the spread of fake news when using social media?
(1) Verify the authority of the source/content/Check the facts
(2) Do not forward messages that are emotionally charged/not confirmed/seems too good to be true
(3) Educate people about fake news
(4) Report fake news
Discuss TWO consequences for victims of identity theft
(1) Others will have access to bank accounts and steal your funds
(2) Financial implications, e.g. others are able to take out loans in your name that you will have to repay/You may be blacklisted
(3) Reputational damage/Emotional distress as a result of being a victim of identity theft
(4) Others can impersonate you so that they can commit fraud/to commit criminal activity
Why is a screen lock pattern on a computing device generally considered less secure than a strong password?
(1) Easier to trace the pattern by following the marks (residue) that your fingers have left on the screen
(2) Easy for someone to see if they are looking over your shoulder
(3) There are a limited number of patterns available/Strong passwords require alphabetical characters, digits and other characters (symbols) offering more combinations
Give TWO recommendations to prevent ransomware attacks
(1) Update all software
(2) Install and update antivirus/anti-ransomware software
(3) Do not click on links in pop-up windows or phishing e-mails/Spam filtering for less exposure to adware
(4) Implement advanced security measures on the network
What is the difference between a bot and a zombie?
A bot is software/application used to automate certain tasks and actions
A zombie is an infected computer that has been taken over/is remotely controlled
Explain why users may not realise when they are victims of a spoofing attack
The e-mail address appears to be valid
Give TWO reasons why DDoS attacks are harmful
1) Legitimate users are not able to use the website/service/internet
2) Website/Company can lose income
3) Reputational damage done to the company
Discuss the risk of posting videos that you made on social media platforms (such as TikTok or Instagram)
1) Others can use and share your content as if it belongs to them/identify theft
2) You may become a victim of stalking/phishing/cyberbullying
3) Agreement may state that you have transferred the ownership of your content to that platform
4) Consequences such as legal liability/harming minors and others
5) Disadvantaging yourself on a social/professional level
Give TWO ways to reduce the risk of your computer getting infected by a virus, other than installing an antivirus program or keeping software up to date
1) Do not click on links/attachments in suspicious e-mails or websites
2) Do not use pirated/cracked software
3) Only download files from safe sources
4) Use a browser known for good security e.g. Firefox/Pop-up blocker
5) Minimise use of untrustworthy/external media to transfer data
6) Scan external media before data transfer
Give TWO examples of how artificial intelligence (AI) can be useful in a school environment
1) Educational apps to personalise learning experience
2) Digital classroom assistant can help with internet research
3) Facial recognition on CCTV can assist with better management of the school disciplinary system
4) Automated management of attendance using data gathered from CCTV and fingerprint scanners
5) Analysis of trends based on data gathered by sensors such as facial recognition and fingerprint scanners, regarding attendance of school functions, academic performance, etc.
Give an example of a product that is considered to be intellectual property
1) Music
2) Software
3) Art
4) Books
5) Design/Industrial design
6) Podcast
Give TWO guidelines that can be found in a school’s BYOD policy
1) Install an antivirus program
2) Use legal/approved software
3) Do not store sensitive/personal information
4) School has the right to install software on your device
5) Limitation placed on data usage
Explain TWO ways to protect your privacy when using the internet through a public hotspot
1) Do not perform financial transactions
2) Do not give out/enter personal information/Do not share data over network
3) Do not login to any apps that have your sensitive information
4) Ensure that nobody is looking at your screen/shoulder surfing
5) Use a VPN/Incognito mode