Unit 6 Flashcards
6 restricted material and their usages
Cadmium:For rechargable battery, printer ink and toner.
Lead: For cable sheathing and circuit board.
Mercury: For LCD screens.
Hexavalent Chromium: For casing.
Polychlorinated bilphenyls &
Polybrominated diphenylethers (Toxic compounds for plastic , circuit board, connectors to make them fire retardant)
Ways to reduce carbon footprints in data center
•Energy Efficiency measures
•Use of renewable energy
E-waste consequences
Toxic substances will leak out to the ground ->
• Contaminating water
•Infiltrating food chain
•polluting air
How technology help preserve the environment?
1.Climate Change by monitoring temp,pressure, to see why and how certain things happen (Sea level rises as Eg)
2.Early Warning by detecting approaching disaster and communication infrastructure for issue timely warnings.
3.Conservation of Animals (Track them and alert the ranger)
4.Energy saving by automatic electricity adjustment with sensors.
Ethics
Moral principles governing a person’s behavior
How government can use personal data rules.
•Data processed fairly and lawfully
•obtain and used for specific and lawful purpose
•Data must be adequate, relevant and not excessive
•accruate and UpTo date
•kept no longer than necessary
•Kept secure
Why give personal information to organisation?
•Enable organization to understand their needs better •Provide a personalized service
Differences between cookies and spyware?
1.Cookies are small data that keep records your web browsing history. Enable online stores to learn about you.
2.Spyware are sorted on hard drive(w/o permission) to collect information and transmit to third party
Private Enhancing tools
1.Encryption
2.Cookies Cleaner,Anti-spyware,adblocker
3.Identity Management Service (Trusted third party Allow to conduct transaction without revealing person information)
4.Password Manager(Stores all web login information in encrypted password database with master password)
What if personal data got into the wrong hand?
•Vulnarable to phishing,scams,identity theft and fraud.
What happen when personal data is inaccurate
•Affect How they are seen by others and treated
When is invasion of privacy justified (Needs of Society>Personal Data)
-When Keeping society from crime, improving road safety and protection of key installation such as nuclear power station
What’s digital inclusion?
Providing everyone with affordable access to computing technology and skill to use it.
Why digital exclusion is bad?
•Less job opportunities
•Less business growth as no exploiting of technology
•Limited freedom of expression
•Save money with online services
•Connects with others
What’s professionalism?
The skill and competence expected of a person in professional setting.
Behave ethically and must abide the law.
1.Accomplish task efficiently
2.Build new software
3.Invent new product
Intellectual Property(IP)?
A unique creative product of human.
Terms of software licenses
1.How many copies of software are allowed to use.
2.can install in a computer or more ?
3.how long can it be used.
4.What type of organization can use.
Creative Commons?
Allowing to copy software without charge as long as without commercially
How does patent protect u as an inventor of product?
A patent offers more protection than copyright. Protects the idea or design of an invention than particular form.
(patent: Exclusive rights to inventor to make,use,sell an invention for a fixed period of time)
Machine Learning?
Ability of computers to learn without being explicitly programmed
Bits of DNA
- Adenine (A)
- Thymine(T)
3.Guanine(G)
4.Cytosine(C)
What’s codon?
•Consists of three digits
•Each digit can have four values
•64 possible combinations
Pros of DNA computing
1.DNA supply is always available.
2.DNA is cheap (Large supply)
3.DNA biochips can be made cleanly (w/o toxic substances)
4.Smaller than today’s computers
Cons of DNA computing
1.Took long time to analyze the combinations to find correct one.
2.Require Human assistance
What’s nanotechnology?
Manipulation of matter on an atomic and molecular scale
Nanotechnology used areas
1.Self cleaning glass(UV causes dirt to breakdown and loosen organic molecules)
2.Clothing(Protection from UV)
3.Scratch resistanct coatings
4.Medicine(Anti cancer drugs)
What’s quantum computing?
-Quantum Computers are based on quantum mechanics.
-Calculate a vast number of possible outcomes simultaneously
(Eg.Cracking password,solve complex encryption)
What’s superposition?
An idea of an object can have all possible states until its state has been measured.
What’s a qubit?
Quantum but(Bits of quantum computing)
Each qubit is both 1 and 0 (Can present all 15 possible solutions at the same time)
Entanglement?
A pair of qubis exist in a single quantum state can influence each other.
Quantum Computing usages
1.Stimulate chemical composition of electrical batties to improve performance
2.to create new drug
3.calculate most fuel efficient ascent and descent paths
AI?
Ability of digital computer or robots to perform tasks associatied with intelligent beings
Why DNA is suitable for storing data?
DNA consist of 4 digits arranged in 3 groups. It can encode information represented by the bits and bytes of computer system
Why is cookies good?
It enables organizations to understand the users’ needs better and provide them with more personalized service.
(Setting up an account with an online supplier makes it faster and more convenient to purchase from them.)
Examples of Big Data benefits to society?
-Retail:
•Companies analysing customers data to provide smarter shopping
-Health Care:
•Big analytics is being used to predict outbreaks of disease (such as dengue and malaria)
Pros and Cons of Surveillance technology?
Pros:Track potential criminal activities to keep people from safe(Or viewing the case back to get information/identify)
Cons: Criminals knows the routine (time u leave the house), Companies knowing your shopping habit)
Pros and Cons of Location based services?
Pros: Can share the location to arrange the meetup with friends or to keep ones safe by letting guardians know your location
Cons: Others can track ones location