Social + Professional Flashcards

1
Q

First Generation - period

A

1950-1959

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Second Generation - Period

A

1960-1968

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Thrid Generation - Period

A

1969-1977

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fourth Generation - Period

A

1978-2009

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fifth Generation - Period

A

2010-Now

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

First Generation - Innovation

A

Vacuum Tube

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Second Generation - Innovation

A

Transistor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Third Generation - Innovation

A

Integrated Circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fourth Generation - Innovation

A

Microprocessor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fifth Generation - Innovation

A

SoC - System on Chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wheel of Reincarnation

A

Technology goes out of fashion then comes back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2 kinds of encryption

A

Symmetric and Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Symmetric encryption + example of use

A

Encryption and deception with the same shared key.
Examples:
Ceasear cipher
AES - Advanced Encryption Standard
Communication after keys transferred with asymmetric (e.g. WhatsApp)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Asymmetric encryption + example of use

A

Encryption with the receivers public key, decryption with the receivers private key
Examples:
Initial key transfer for communication (e.g. WhatsApp)
Bank transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does Asymmetric encryption solve key distribution problem?

A

Key distribution problem - can’t share encryption keys in safe/encrypted way because you would need encryption already established
Hence - asymmetric encryption used just to send encryption key (since it’s safe), then key used for symmetric encryption (since it’s cheaper)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Setup, encryption and decryption for asymmetric

A
Setup:
1. 2 large primes, p and q
2. n = p x q
3. z = (p-1) x (q-1)
4. Choose e to be relatively prime to z (no common factors)
5. Choose d such that (d x e) mod z = 1
Public key = (e,n)
Private key = (d,n)

Encryption:
M = plaintext
C = ciphertext
C = M^e mod n

Decryption:
M = C^d mod n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Argument for encryption

A

Allows good people to go about there business without government surveillance or criminal hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Argument against encryption

A

Allows bad people to do bad things without government detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is PGP

A

PGP is Pretty Good Privacy

128 bit encryption free for all in 1991

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Snowden Report

A

Ed Snowden revealed mass surveillence by US NSA

Google, Yahoo and other companies started using strong encryption in responce (http -> https) - The internet goes dark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Fiat Currency

A

Any money declared by a government to be legal tender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cryptocurrency

A

A decentralized digital medium of
exchange, governed by cryptography
- Digital currency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Safety of fiat currency/risk with cryptocurrency

A

Hard to forge or double-spend metals or tokens
which are physical (fiat) money, but easy for electronic money.
Almost all fiat currency transactions go through a trusted third party (multiple banks) which use a shared register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Hash function + 3 benefits

A

A hash function takes a string, 𝑀, and returns a number,
𝐻(𝑀).
One-way - easy to generate H(M) but hard to go back
Leakage free - hard to find out anything about M from H(M)
Collision free - hard to find W such that H(W) = H(M)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Cryptocurrency trusted 3rd party
Blockchain | - ledger maintained by many, untrusted nodes
26
3 points blockchain is based on
Transactions Extension Mining
27
Blockchain - transactions
Transactions - a transaction is sent to one of the nodes maintaining the ledger, and the node passes it on
28
Blockchain - extension
Extension - node may attempt to extend the blockchain with a batch of transactions for a reward. New blocks flooded to nodes and nodes add to blocks which make the longest chain
29
Blockchain - mining
Mining - A nonce (number-used-once) is chosen for each block, so that its hash is less than the current threshold.
30
Cryptocurrency wallet
A public key to allow it to receive payments from other wallets, and a private key to allow it to make payments to other wallets
31
Advantage of cryptocurrency
Allows people to store money and make payments without money devaluation
32
Disadvantage of cryptocurrency
Allows people to store money and make payments without getting taxed
33
4 laws relating to intellectual property
Copyright Trademarks Patents Trade secrets
34
Copyright law
Gives the creator of a work the right to control how it is used. Applies to work, not the idea behind it. Can copyright 'Pride and Prejudice' but not romantic novel in general. Automatically valid when a work is created and lasts for 70 years
35
When can copyright materials be used without permission?
βˆ™ non-commercial research and private study; βˆ™ text and data mining for non-commercial research; βˆ™ criticism, review and reporting current events; βˆ™ teaching; βˆ™ parody
36
Copyright law regarding contracts
If commissioned to create work (program), you keep copyright by default. If tasked by boss/company you work for, the company has the copyright by default.
37
4 freedoms of free/libre software
The freedom to run the program as you wish, for any purpose; The freedom to study how the program works, and change it so it does your computing as you wish; The freedom to redistribute copies so you can help others; The freedom to distribute copies of your modified versions to others.
38
Trademarks
``` A word or sign to identify goods or services from a particular source. Lasts for 10 years. Cannot be: βˆ™ offensive; - swear βˆ™ descriptive; - 'red shirt' βˆ™ misleading; - 'carbon-free' (but not) βˆ™ three dimensional; βˆ™ common/non-distinctive; βˆ™ used; - 'apple' ```
39
Patents
Gives someone the right to stop others from making, using or selling their invention without permission. Inventor given monopoly of its use for 20 years (in return for disclosing the invention)
40
Requirements to patent invention
Invention must: βˆ™ be new; βˆ™ involve an inventive step; βˆ™ be capable of industrial application.
41
Trade secrets
Stuff like recipes and production methods which give the company an advantage. Given to employees on a need to know basis
42
Computer Misuse Act 1990
1) Unauthorised access - Access or attempt to access someone's computer and know its unauthorised - Up to 1 year in prison + unlimited max fine 2) Ulterior intent - Unauthorised access and... - Intent of further offence - Up to 1 year in prison (or 5 for indictment charge e.g. national military hack) + unlimited max fine 3) Unauthorised modification - Basically accessing and changing something + know what you're doing - Up to 10 years in prison + unlimited max fine
43
3 types of computer hackers
1) Apprentice hackers - Noobs with premade scripts - High volume of attacks but easy to defend against 2) Journeyman hackers - Use scrips but are able to make some modifications or construct a similar script - Smaller volume, harder to defend 3) Master hackers - Can create entirely new, bespoke toolkits - Small volume of attacks, very difficult to defend against (zero-day vulnerabilities. Bespoke so the victim has never seen algorithm before, has nothing to base defence off)
44
Malware
βˆ™ is attached to some host software; βˆ™ carries out some malicious act; βˆ™ propagates by attachment to some other host software
45
Not all crimes with a computer have to be computer misuse, can be charged with traditional crimes too, e.g:
Fraud Extorsion Theft
46
Data Protection Act - 1984 is concerned with:
Personal data relating to an identifiable living, individual
47
Data Protection Act considers:
βˆ™ data subjects β€” individuals on whom data is held; βˆ™ data users β€” those who process and control data; βˆ™ computer bureaux β€” those who only process data. (physical records typed out in low wage countries)
48
Data Protection Registrar
Responsible for promoting data protection and enforcing the Data Protection Act at tribunals (minor courts)
49
Concern about public bamboozling
Public confused into handing over data with - Massive T&Cs - Extra unnecessary permissions - Fake/Hidden checkboxes - e.t.c.
50
6 Data processing principles according to GDPR
Data must be 1) Processed lawfully, fairly, and transparently 2) Collected only for specific + legitimate purposes 3) Adequate, relevant, limited to what's required 4) Accurate and kept up to date (where necessary) 5) Stored only as long as necessary 6) Processed in a way that ensures adequate security
51
The right to be forgotten
The GDPR gives individuals the β€œright to be forgotten” β€”the right to have personal data erased, including links from search results in Europe
52
What if you 'forget' cryptographic keys in a court case? | - Regulation of Investigatory Powers Act
Still get up to 2 years in jail even if there is no other concrete evidence (5 years for national security cases)
53
What should a contract between two parties set out?
βˆ™ their aims; βˆ™ their obligations and responsibilities; βˆ™ the criteria for fulfilment; βˆ™ the procedure for resolving disputes A contract requires a valuable consideration β€” some profit for one party, or some loss for another.
54
A contract for software development should provide what? (9 points)
``` 1 scope of the work; 2 client’s responsibilities; 3 project control; 4 warranty and maintenance; 5 confidentiality; 6 ownership of copyright; 7 indemnity; 8 arbitration procedures; 9 termination criteria. ```
55
Contract - Scope
What software is to be developed
56
Contract - Client responsibilities
What does client need to do or provide
57
Contract - Project Control
How software development is managed (boss man and time control)
58
Contract - Warranty and maintenance
How software is to be supported after delivery
59
Contract - Confidentiality
What parties must keep secret about each other (e.g. trade secrets)
60
Contract - Ownership of copyright
Who gets copyright? How is it assigned or licenced
61
Contract - Indemnity
How client is protected by supplier copyright infringement - supplier is blamed not client
62
Contract - Arbitration procedures
What is done in event of disputes
63
Contract - Termination criteria
How client or supplier and end contract
63
Contract - Termination criteria
How client or supplier can end contract
64
Contract - Termination criteria
How client or supplier can end contract
65
Liability for faulty software
Sale of Goods and Supply Act 1994 - Goods must me fit for purpose Supply of Goods and Services Act 1982 - Supplier must take reasonable skill and care Law of Negligence - a duty of care must exist; that is, an individual can reasonably foresee that their acts may injure someone.
66
Neo-Luddites
Don't like computers They think computers lead to: 1 unemployment; 2 manufactured needs; - influencers generate need for useless shit 3 social inequity; - rich minority enjoy benefits of technology while poor majority left behind 4 social disintegration; - literacy destroys orality 5 benefits to big business/government; - always on 6 an ominous uniformity of knowledge; - thwart the development of social and intellectual skills and human values
67
Artificial intelligence
A branch of computer science that makes computers perform tasks we (used to) think of as requiring human intelligence. - machine learning for facial recognition
68
2 ethical theories relevant to computer science
Consequentialism | Deontologism
69
Consequentialism
Believe that an action is right or wrong depending on it's consequences Look at overall impact on society (Utilitarian) (Chose to switch tracks to kill less people on train problem)
70
Deontologism
Believe action is the thing that is right or wrong regardless of consequences (Pulling leaver in train problem is killing someone who wouldn't have died - wrong!)
72
Professional dilemmas (5 examples)
``` Claiming false experience Conflict of interest Copyright infringement Reporting crime Safety concerns ```
73
Claiming experience
Pretending to have experience in a specific field or attribute that you do not have.
74
Conflict of Interest
Should you disclose a relationship that might influence your judgement?
75
Copyright Infringement
Should you record a film from a streaming service for a colleague?
76
Reporting crime
Should you report a colleague who is overcharging a customer?
77
Safety concerns
Should you delay the launch of a product that could be unsafe (e.g. self driving car)
78
Professional ethics matter because:
Professionals have great knowledge / great reach
79
Professionals have great knowledge
Professionals have great knowledge expressed through their work, but others cannot easily check their work (plagiarism)
80
Professionals have great reach
Professionals have great reach achieved through their work, but others cannot easily avoid their work (plagiarism)
81
BCS (British Computer Society) Code of conduct considers
Public interest Professional competence and integrity Duty to relevant authority Duty to the profession
82
BCS - Public interest
Make IT for everyone. Have due regard for public health, privacy, security and well-being all all in society
83
BCS - Professional Competence and Integrity
Show what you know, learn what you don’t. Only undertake work you're able to complete
84
BCS - Duty to Relevant Authority
Respect the organisation or individual you work for. Work with diligence, avoid conflict of interest
85
BCS - Duty to the Profession
Keep IT real, Keep IT professional, Pass IT on. Dont act in a way that dishonours the profession