Social + Professional Flashcards

1
Q

First Generation - period

A

1950-1959

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Second Generation - Period

A

1960-1968

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Thrid Generation - Period

A

1969-1977

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fourth Generation - Period

A

1978-2009

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fifth Generation - Period

A

2010-Now

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

First Generation - Innovation

A

Vacuum Tube

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Second Generation - Innovation

A

Transistor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Third Generation - Innovation

A

Integrated Circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fourth Generation - Innovation

A

Microprocessor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fifth Generation - Innovation

A

SoC - System on Chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wheel of Reincarnation

A

Technology goes out of fashion then comes back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2 kinds of encryption

A

Symmetric and Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Symmetric encryption + example of use

A

Encryption and deception with the same shared key.
Examples:
Ceasear cipher
AES - Advanced Encryption Standard
Communication after keys transferred with asymmetric (e.g. WhatsApp)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Asymmetric encryption + example of use

A

Encryption with the receivers public key, decryption with the receivers private key
Examples:
Initial key transfer for communication (e.g. WhatsApp)
Bank transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does Asymmetric encryption solve key distribution problem?

A

Key distribution problem - can’t share encryption keys in safe/encrypted way because you would need encryption already established
Hence - asymmetric encryption used just to send encryption key (since it’s safe), then key used for symmetric encryption (since it’s cheaper)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Setup, encryption and decryption for asymmetric

A
Setup:
1. 2 large primes, p and q
2. n = p x q
3. z = (p-1) x (q-1)
4. Choose e to be relatively prime to z (no common factors)
5. Choose d such that (d x e) mod z = 1
Public key = (e,n)
Private key = (d,n)

Encryption:
M = plaintext
C = ciphertext
C = M^e mod n

Decryption:
M = C^d mod n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Argument for encryption

A

Allows good people to go about there business without government surveillance or criminal hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Argument against encryption

A

Allows bad people to do bad things without government detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is PGP

A

PGP is Pretty Good Privacy

128 bit encryption free for all in 1991

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Snowden Report

A

Ed Snowden revealed mass surveillence by US NSA

Google, Yahoo and other companies started using strong encryption in responce (http -> https) - The internet goes dark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Fiat Currency

A

Any money declared by a government to be legal tender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cryptocurrency

A

A decentralized digital medium of
exchange, governed by cryptography
- Digital currency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Safety of fiat currency/risk with cryptocurrency

A

Hard to forge or double-spend metals or tokens
which are physical (fiat) money, but easy for electronic money.
Almost all fiat currency transactions go through a trusted third party (multiple banks) which use a shared register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Hash function + 3 benefits

A

A hash function takes a string, 𝑀, and returns a number,
𝐻(𝑀).
One-way - easy to generate H(M) but hard to go back
Leakage free - hard to find out anything about M from H(M)
Collision free - hard to find W such that H(W) = H(M)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Cryptocurrency trusted 3rd party

A

Blockchain

- ledger maintained by many, untrusted nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

3 points blockchain is based on

A

Transactions
Extension
Mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Blockchain - transactions

A

Transactions - a transaction is sent to one of the nodes maintaining the ledger, and the node passes it on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Blockchain - extension

A

Extension - node may attempt to extend the blockchain with a batch of transactions for a reward. New blocks flooded to nodes and nodes add to blocks which make the longest chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Blockchain - mining

A

Mining - A nonce (number-used-once) is chosen for each block, so that its hash is less than the current threshold.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Cryptocurrency wallet

A

A public key to allow it to receive payments from other wallets, and a private key to allow it to make payments to other wallets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Advantage of cryptocurrency

A

Allows people to store money and make payments without money devaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Disadvantage of cryptocurrency

A

Allows people to store money and make payments without getting taxed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

4 laws relating to intellectual property

A

Copyright
Trademarks
Patents
Trade secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Copyright law

A

Gives the creator of a work the right to control how it is used. Applies to work, not the idea behind it. Can copyright ‘Pride and Prejudice’ but not romantic novel in general. Automatically valid when a work is created and lasts for 70 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

When can copyright materials be used without permission?

A

∙ non-commercial research and private study;
∙ text and data mining for non-commercial research;
∙ criticism, review and reporting current events;
∙ teaching;
∙ parody

36
Q

Copyright law regarding contracts

A

If commissioned to create work (program), you keep copyright by default. If tasked by boss/company you work for, the company has the copyright by default.

37
Q

4 freedoms of free/libre software

A

The freedom to run the program as you wish, for any
purpose;
The freedom to study how the program works, and change it so it does your computing as you wish;
The freedom to redistribute copies so you can help others;
The freedom to distribute copies of your modified versions to others.

38
Q

Trademarks

A
A word or sign to identify goods or services from a particular source. Lasts for 10 years. Cannot be:
∙ offensive; - swear
∙ descriptive; - 'red shirt'
∙ misleading; - 'carbon-free' (but not)
∙ three dimensional;
∙ common/non-distinctive;
∙ used; - 'apple'
39
Q

Patents

A

Gives someone the right to stop others from making,
using or selling their invention without permission. Inventor given monopoly of its use for 20 years (in return for disclosing the invention)

40
Q

Requirements to patent invention

A

Invention must:
∙ be new;
∙ involve an inventive step;
∙ be capable of industrial application.

41
Q

Trade secrets

A

Stuff like recipes and production methods which give the company an advantage. Given to employees on a need to know basis

42
Q

Computer Misuse Act 1990

A

1) Unauthorised access
- Access or attempt to access someone’s computer and know its unauthorised
- Up to 1 year in prison + unlimited max fine
2) Ulterior intent
- Unauthorised access and…
- Intent of further offence
- Up to 1 year in prison (or 5 for indictment charge e.g. national military hack) + unlimited max fine
3) Unauthorised modification
- Basically accessing and changing something + know what you’re doing
- Up to 10 years in prison + unlimited max fine

43
Q

3 types of computer hackers

A

1) Apprentice hackers
- Noobs with premade scripts
- High volume of attacks but easy to defend against
2) Journeyman hackers
- Use scrips but are able to make some modifications or construct a similar script
- Smaller volume, harder to defend
3) Master hackers
- Can create entirely new, bespoke toolkits
- Small volume of attacks, very difficult to defend against (zero-day vulnerabilities. Bespoke so the victim has never seen algorithm before, has nothing to base defence off)

44
Q

Malware

A

∙ is attached to some host software;
∙ carries out some malicious act;
∙ propagates by attachment to some other host software

45
Q

Not all crimes with a computer have to be computer misuse, can be charged with traditional crimes too, e.g:

A

Fraud
Extorsion
Theft

46
Q

Data Protection Act - 1984 is concerned with:

A

Personal data relating to an identifiable living, individual

47
Q

Data Protection Act considers:

A

∙ data subjects — individuals on whom data is held;
∙ data users — those who process and control data;
∙ computer bureaux — those who only process data. (physical records typed out in low wage countries)

48
Q

Data Protection Registrar

A

Responsible for promoting data protection and enforcing the Data Protection Act at tribunals (minor courts)

49
Q

Concern about public bamboozling

A

Public confused into handing over data with

  • Massive T&Cs
  • Extra unnecessary permissions
  • Fake/Hidden checkboxes
  • e.t.c.
50
Q

6 Data processing principles according to GDPR

A

Data must be

1) Processed lawfully, fairly, and transparently
2) Collected only for specific + legitimate purposes
3) Adequate, relevant, limited to what’s required
4) Accurate and kept up to date (where necessary)
5) Stored only as long as necessary
6) Processed in a way that ensures adequate security

51
Q

The right to be forgotten

A

The GDPR gives individuals the “right to be forgotten” —the right to have personal data erased, including links from search results in Europe

52
Q

What if you ‘forget’ cryptographic keys in a court case?

- Regulation of Investigatory Powers Act

A

Still get up to 2 years in jail even if there is no other concrete evidence (5 years for national security cases)

53
Q

What should a contract between two parties set out?

A

∙ their aims;
∙ their obligations and responsibilities;
∙ the criteria for fulfilment;
∙ the procedure for resolving disputes
A contract requires a valuable consideration — some profit for one party, or some loss for another.

54
Q

A contract for software development should provide what? (9 points)

A
1 scope of the work;
2 client’s responsibilities;
3 project control;
4 warranty and maintenance;
5 confidentiality;
6 ownership of copyright;
7 indemnity;
8 arbitration procedures;
9 termination criteria.
55
Q

Contract - Scope

A

What software is to be developed

56
Q

Contract - Client responsibilities

A

What does client need to do or provide

57
Q

Contract - Project Control

A

How software development is managed (boss man and time control)

58
Q

Contract - Warranty and maintenance

A

How software is to be supported after delivery

59
Q

Contract - Confidentiality

A

What parties must keep secret about each other (e.g. trade secrets)

60
Q

Contract - Ownership of copyright

A

Who gets copyright? How is it assigned or licenced

61
Q

Contract - Indemnity

A

How client is protected by supplier copyright infringement - supplier is blamed not client

62
Q

Contract - Arbitration procedures

A

What is done in event of disputes

63
Q

Contract - Termination criteria

A

How client or supplier and end contract

63
Q

Contract - Termination criteria

A

How client or supplier can end contract

64
Q

Contract - Termination criteria

A

How client or supplier can end contract

65
Q

Liability for faulty software

A

Sale of Goods and Supply Act 1994 - Goods must me fit for purpose

Supply of Goods and Services Act 1982 - Supplier must take reasonable skill and care

Law of Negligence
- a duty of care must exist; that is, an individual can
reasonably foresee that their acts may injure someone.

66
Q

Neo-Luddites

A

Don’t like computers
They think computers lead to:
1 unemployment;
2 manufactured needs; - influencers generate need for useless shit
3 social inequity; - rich minority enjoy benefits of technology while poor majority left behind
4 social disintegration; - literacy destroys orality
5 benefits to big business/government; - always on
6 an ominous uniformity of knowledge; - thwart the development of social and intellectual skills and human values

67
Q

Artificial intelligence

A

A branch of computer science that makes computers perform tasks we (used to) think of as
requiring human intelligence.
- machine learning for facial recognition

68
Q

2 ethical theories relevant to computer science

A

Consequentialism

Deontologism

69
Q

Consequentialism

A

Believe that an action is right or wrong depending on it’s consequences
Look at overall impact on society
(Utilitarian)
(Chose to switch tracks to kill less people on train problem)

70
Q

Deontologism

A

Believe action is the thing that is right or wrong regardless of consequences
(Pulling leaver in train problem is killing someone who wouldn’t have died - wrong!)

72
Q

Professional dilemmas (5 examples)

A
Claiming false experience
Conflict of interest
Copyright infringement
Reporting crime
Safety concerns
73
Q

Claiming experience

A

Pretending to have experience in a specific field or attribute that you do not have.

74
Q

Conflict of Interest

A

Should you disclose a relationship that might influence your judgement?

75
Q

Copyright Infringement

A

Should you record a film from a streaming service for a colleague?

76
Q

Reporting crime

A

Should you report a colleague who is overcharging a customer?

77
Q

Safety concerns

A

Should you delay the launch of a product that could be unsafe (e.g. self driving car)

78
Q

Professional ethics matter because:

A

Professionals have great knowledge / great reach

79
Q

Professionals have great knowledge

A

Professionals have great knowledge expressed through their work, but others cannot easily check their work (plagiarism)

80
Q

Professionals have great reach

A

Professionals have great reach achieved through their work, but others cannot easily avoid their work (plagiarism)

81
Q

BCS (British Computer Society) Code of conduct considers

A

Public interest
Professional competence and integrity
Duty to relevant authority
Duty to the profession

82
Q

BCS - Public interest

A

Make IT for everyone. Have due regard for public health, privacy, security and well-being all all in society

83
Q

BCS - Professional Competence and Integrity

A

Show what you know, learn what you don’t. Only undertake work you’re able to complete

84
Q

BCS - Duty to Relevant Authority

A

Respect the organisation or individual you work for. Work with diligence, avoid conflict of interest

85
Q

BCS - Duty to the Profession

A

Keep IT real, Keep IT professional, Pass IT on. Dont act in a way that dishonours the profession