UNIT 2: IT Profession, Code of Ethics, and the Issues Flashcards

1
Q

Positive Impacts:

A

Global Connectivity
Access to Information
Empowerment of Social Movements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Positive Impacts:

______: Technology connects people worldwide, facilitating international business, collaboration, and cultural exchange.

A

Global Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Positive Impacts:

Example: Platforms like Zoom and Microsoft Teams facilitate remote work and global meetings.

A

Global Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Positive Impacts:

______: The internet provides access to educational resources, news, and diverse cultural content, fostering a more informed society.

A

Access to Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Positive Impacts:

Example: MOOCs like Coursera and Khan Academy provide learning opportunities to a global audience.

A

Access to Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Positive Impacts:

______: Social media platforms enable rapid organization and awareness for social causes.
Social media amplifies voices and mobilizes support for social and political causes.

A

Empowerment of Social Movements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Negative Impacts:

A

Digital Divide
Social Isolation
Cultural Homogenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Negative Impacts:

______: Disparities in technology access between different regions or socioeconomic groups hinder educational and economic opportunities.

A

Digital Divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Negative Impacts:

Example: Rural areas often have less access to high-speed internet compared to urban centers.

A

Digital Divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Negative Impacts:

______: Increased screen time is associated
with reduced social interactions and mental health
issues.

A

Social Isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Negative Impacts:

Example: Studies have linked excessive social media use to increased feelings of loneliness and depression.

A

Social Isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Negative Impacts:

______: Global media often promotes dominant cultures, potentially overshadowing local traditions and languages.

A

Cultural Homogenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Negative Impacts:

Example: Western media and entertainment can diminish the visibility of local cultural practices.

A

Cultural Homogenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ACM stands for ______

A

Association for Computing Machinery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

______ expresses the conscience of the computing profession, and it affirms an obligation of computing professionals both individually and collectively to use their skills for the benefit of society.

A

ACM Code of Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Principles Overview of ACM:
• ______: Act in the public interest and aim to enhance the well-being of society.
• ______: Ensure trustworthiness and honesty in dealings with clients and employers.’
• ______: Maintain a high level of competence and integrity in professional work.
• ______: Foster a professional and supportive environment among peers.
• ______: Encourage ethical practices and responsible behavior within
management roles.

A

Public
Client and Employer
Professional
Colleagues
Management

17
Q

IEEE stands for ______

A

Institute of Electrical and Electronic Engineers

18
Q

The ______ establishes principles for professional conduct for software engineers. The code is intended to provide guidance to software engineers on their ethical responsibilities.

A

IEEE Code of Ethics

19
Q

Key Elements of IEEE:
• ______: Avoid conflicts of interest and maintain transparency.
• ______: Perform only in areas of expertise and strive for continuous improvement.
• ______: Safeguard confidential information and avoid unauthorized disclosures.
• ______: Treat all individuals fairly and without bias

A

Integrity and Honesty
Professional Competence
Respect for Confidentiality
Fairness and Impartiality

20
Q

Known as ______ - that is the etiquette of cyberspace and “etiquette” means the forms of required by good breeding or prescribed by authority to be required in social or official life.

A

Network Etiquette

21
Q

In other words, ______ is a set of rules for behaving properly online.

A

netiquette

22
Q

______, or ______, is concerned with the “proper” way to communicate in an online environment.

A

Netiquette, network etiquette

23
Q

NETIQUETTE:

A
  • Remember the GOLDEN RULE
  • AVOID SLANG, ACRONYMS, AND TEXT TALK
  • AVOID “SCREAMING” IN TYPED MESSAGES
  • PROOFREAD YOUR MESSAGES BEFORE
    SENDING THEM
  • EXERCISE GOOD JUDGMENT WHEN SHARING
    INFORMATION WITH OTHERS ONLINE
  • RESPECT DIVERSITY IN VIEWPOINTS
24
Q

GOLDEN RULE:

A

“MAKE A GOOD IMPRESSION”

25
Q

If the material you share with others online came from another source, make every effort to gain permission from the original author or copyright holder. Copying someone else’s work and passing it off as your own is ______. It damages your reputation and could subject you to serious academic and legal
consequences.

A

plagiarism

26
Q

10 Commandments of Computer Ethics:

A

Rule 1: Remember the Human
Rule 2: Adhere to the same standards of behavior online that you follow in real life
Rule 3: Know where you are in cyberspace
Rule 4: Respect other people’s time and bandwidth
Rule 5: Make yourself look good online writing
Rule 6: Share expert knowledge
Rule 7: Help keep flame wars under control
Rule 8: Respect other people’s privacy
Rule 9: Don’t abuse your power
Rule 10: Be forgiving of other people’s mistakes

27
Q

Negative Practices in Social Media:

A

CYBERBULLYING
PRIVACY VIOLATIONS
SPREAD OF MISINFORMATION

28
Q

______
- The use of technology to harass, threaten, embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets, posts, or messages all count. So does posting personal information, pictures, or videos designed to hurt or embarrass someone else.

A

CYBERBULLYING

29
Q

______ occur when someone’s personal information is accessed, used, or shared without their permission. This can include hacking, identity theft, surveillance, or leaking sensitive data.

A

Privacy Violations

30
Q

______ is false or inaccurate information spread, regardless of intent to deceive.

A

Misinformation

31
Q

When misinformation spreads widely, it is called the ______.

A

spread of misinformation