1.6 Flashcards

(17 cards)

1
Q

What are ethical issues in computer science?

A

Questions about what is morally right or wrong in the use of technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are legal issues in computer science?

A

Concerns about whether technologies comply with legislation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are cultural issues in computer science?

A

How different societies view technology based on their values, traditions or beliefs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are environmental issues in computer science?

A

The impact of technology on the natural world, including energy usage, e-waste, and harmful materials in devices when disposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give one negative environmental impact of technology.

A

The production of hardware consumes the Earth’s limited natural resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give one way technology can help the environment.

A

Reduces paper use by enabling electronic communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why do most citizens value data privacy?

A

They may not want governments or organisations to access their private information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What argument do governments make for accessing private data?

A

They claim it helps protect citizens from terrorism and other threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the Data Protection Act 2018 do?

A

Regulates how organisations use personal data, ensuring it is handled lawfully, fairly, and securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give some examples of personal data.

A

Name, address, date of birth, phone number - anything that can identify an individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What rights does everyone have under the Data Protection Act 2018?

A

The right to be fully informed about how their personal data is being used; the right to request access to the personal data that an organisation holds about them; the right to have their personal data erased; the right to request that an organisation stops processing their personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Computer Misuse Act 1990?

A

A law that prevents unauthorised access or changes to computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Under the Computer Misuse Act 1990, which offence is this an example of? You notice your sibling has written their username and password down in a notepad. You use their login details to access their laptop and read their private emails without their consent.

A

Unauthorised access to computer material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Under the Computer Misuse Act 1990, which offence is this an example of? You guess your colleague’s password and login to their online banking. You then transfer money to your own account without their knowledge.

A

Unauthorised access with intent to commit or facilitate commission of further offences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Under the Computer Misuse Act 1990, which offence is this an example of? You send a virus as an email attachment to a rival’s business computer system, knowing it will slow their operations, hoping to give your company an advantage.

A

Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Under the Computer Misuse Act 1990, which offence is this an example of? You break into a hospital’s computer system as a prank, not realising that your actions would crash the server and delay patient records being accessed in emergencies.

A

Unauthorised acts causing, or creating risk of, serious damage.

17
Q

Under the Computer Misuse Act 1990, which offence is this an example of? You write the code for a phishing website that mimics a bank’s login page, intending to collect other users’ login details, even if you haven’t shared the code with anyone or put the website onto the internet.

A

(From the Act: making, supplying or obtaining articles for use in offence; if you want this exact wording included, I can add it once visible in the next page of your file.)