Chapter 7 #2 Flashcards

(51 cards)

1
Q

SECTION 1 — Legal, Moral, Ethical & Cultural Implications

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the definition of Morality?

A

An understanding of the difference between right and wrong, often founded in personal beliefs.

Note: Something can be immoral in one culture but acceptable in another. Immoral does not always mean illegal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the definition of Ethics?

A

Moral principles governing an individual’s or organisation’s behaviour, such as a code of conduct.

Note: Ethics is more commonly used in a professional context (e.g. a professional code of ethics).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the term ‘Legal’ relate to?

A

Relating to, or permissible by, law — whether or not an action is punishable by law.

Example: Copying software and then selling it without the permission of the copyright holders is illegal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the definition of Culture?

A

The attitudes, values, and practices shared by a group of people or society.

Example: When writing computer games, programmers need to avoid items that some cultures might find offensive or obscene.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Intellectual Property Rights (IPR)?

A

Rules governing an individual’s ownership of their own creations or ideas, prohibiting the copying of (for example) software without the owner’s permission.

Example: Copying software without the copyright holder’s permission violates IPR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Privacy in a computing context.

A

The right to keep personal information and data secret, and for it not to be unwillingly accessed or shared through, for example, hacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Plagiarism?

A

The act of taking another person’s work or ideas and claiming them as one’s own.

Proper citation: Acknowledge the originator using references at the end of a document or footnotes on each page. Plagiarism-detection software exists to check for it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Computer Ethics? What are its three main factors?

A

Computer ethics is a set of principles set out to regulate the use of computers.

Three main factors:
1. Intellectual Property Rights (e.g. copying software without permission)
2. Privacy Issues (e.g. hacking or illegal access to personal data)
3. Effect of Computers on Society (e.g. job losses, social impacts)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Can an act be immoral but not illegal? Give an example.

A

Yes. Creating a fake news website is not illegal but may be considered immoral if it causes distress to others.

However, if the creator attempts to obtain personal and financial data through it, it becomes an illegal act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When does hacking become an illegal act?

A

Hacking is generally regarded as immoral but not always illegal.

It becomes ILLEGAL if it:
• Compromises national security
• Results in financial gain
• Reveals personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is unethical behaviour defined?

A

Unethical behaviour is the breaking of a professional code of conduct.

Example: If someone works for a software company and passes on ideas to a rival company, it is regarded as unethical.
• If the software relates to national security or is formally copyrighted, it is also illegal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the benefits of joining a professional ethical body (e.g. BCS, IEEE)?

A

• Access to legal advice if action is taken against them
• Networking opportunities
• No missing out on contacts / jobs
• Access to training and professional development
• Clear, laid-out ethical guidelines

[Past Exam Q&A adds:]
• He does not have to decide what is ethical — it is written down.
• Clients / staff know he is reputable.
• Recognition of his skills / knowledge (there may be a test / requirements for entry).
• They run training courses to keep his skills up-to-date.
• So clients/other staff know the standards being applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What four main areas are covered by the BCS Code of Conduct?

A
  1. The Public Interest
  2. Professional Competence and Integrity
  3. Duty to Relevant Authority
  4. Duty to the Profession
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of the IEEE?

A

The IEEE (Institute of Electrical and Electronics Engineers) was set up in the USA to:
• Raise awareness of ethical issues
• Promote ethical behaviour among professionals in the electronics industry
• Ensure engineers and scientists respect the need for ethical behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Summarise the key commitments in the IEEE Code of Ethics.

A

Members commit to:
1. Prioritise public safety, health, and welfare
2. Avoid conflicts of interest
3. Be honest and realistic in claims / estimates
4. Reject bribery in all forms
5. Improve public understanding of tech implications
6. Maintain technical competence
7. Accept/offer honest criticism; credit others
8. Treat everyone fairly (no discrimination)
9. Avoid injuring others by malicious actions
10. Support colleagues in professional development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the 8 principles of the joint IEEE/ACM Software Engineering Code of Ethics?

A
  1. PUBLIC — Act consistently with the public interest
  2. CLIENT & EMPLOYER — Act in the best interests of client/employer, consistent with public interest
  3. PRODUCT — Ensure products meet the highest professional standards
  4. JUDGMENT — Maintain integrity and independence in professional judgment
  5. MANAGEMENT — Promote an ethical approach to software development/maintenance
  6. PROFESSION — Advance the integrity and reputation of the profession
  7. COLLEAGUES — Be fair to and supportive of colleagues
  8. SELF — Participate in lifelong learning; promote ethical approach to practice
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why are employees required to sign a professional code of conduct before starting work?

A

• To confirm they understand the code of conduct
• To make sure they know what behaviour is expected of them
• To make sure they understand there may be consequences for some actions
• To ensure all employees adhere to the same standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SECTION 2 — Copyright Issues

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the definition of Software Piracy?

A

The practice of using or making illegal copies of software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Product Key?

A

A security method — a unique reference number used during software installation to prevent illegal copying or unauthorised use.

During installation, the user is required to enter the product key supplied with the original software (e.g. 4a3c 0efa 65ab a81e).

22
Q

Define Digital Rights Management (DRM).

A

Technology used to control access to copyrighted material by preventing unauthorised copying or distribution.

Goal: To ensure any attempt to break copyright protection results in a defective, unusable copy.

23
Q

What is the Free Software Foundation (FSF)?

A

An organisation that promotes the free distribution of software. It gives users the freedom to run, copy, change, or adapt software coding as needed.

Philosophy: Focuses on the moral and ethical rights of users to control their software.

24
Q

What is the Open Source Initiative (OSI)?

A

An organisation that offers the same freedoms as the Free Software Foundation. Focuses on the practical consequences of the four shared rules, such as enabling collaborative software development.

Philosophy: Emphasises practical benefits like collaborative development.

25
What is Freeware?
Software available for free download at no cost. Key restrictions: • Still covered by copyright laws • Users CANNOT modify the source code • Users CANNOT repurpose the code in other software
26
What is Shareware?
Software available free initially (as a trial). The full version becomes accessible only after paying the full fee. Key points: • Trial version may be feature-limited • Users cannot access/modify source code • After payment, users receive updates and support • Users must not repurpose the source code without permission
27
What legal standing does software have regarding copyright?
Software is protected by copyright laws, similarly to music CDs, videos, magazine articles, and books.
28
List FIVE illegal actions related to purchased commercial software.
1. Making and distributing copies for sale or to give away 2. Using software on a network/multiple computers without a multi-use licence 3. Using code from copyrighted software to create and distribute new software without the copyright holder's permission 4. Renting out a software package without the copyright holder's permission 5. Using the name of copyrighted software on other software without permission
29
What are the five main anti-piracy measures used by software companies?
1. Product Key — unique reference number entered during installation 2. Licence Agreement — user must agree to terms before installation 3. Genuine Packaging — hologram sticker/label warning copying is illegal 4. Hardware Restrictions — software only works when original media (CD/DVD/USB) is present 5. Dongle — hardware device plugged into USB port required for software to function
30
What is a Dongle and how does it protect software?
A hardware security device that must be plugged into a computer port (usually USB) for specific software to function. This prevents unauthorised use on other machines and adds an additional layer of security beyond a product key.
31
What was the original purpose of DRM, and how has it expanded?
Original purpose: DRM was initially developed to control what devices a CD could play on, reducing illegal copying (e.g. preventing CDs from being copied onto computers). Expansion: DRM now applies to music tracks, video files, ebooks, and more. Example of DRM Licensing: Apple Music uses DRM to prevent downloading all music during the trial month and then cancelling the subscription.
32
Give TWO examples of DRM restrictions.
• Allowing a music file to be streamed but not downloaded/copied • Restricting an ebook to a specific registered tablet only • Requiring an internet connection to play a game (online authentication) • Limiting the number of devices software can be installed on
33
What are the 'Four Freedoms' of Free Software (FSF/OSI)?
Freedom 0: Run the software for any legal purpose Freedom 1: Study and Modify the source code as needed Freedom 2: Redistribute software copies Freedom 3: Share Modified Code with others Access to source code is a prerequisite for Freedoms 1 and 3.
34
What are the specific restrictions placed on users of Free/Open Source Software?
Users CANNOT: • Integrate source code from copyrighted (proprietary) software • Create software that mimics copyrighted software • Adapt source code in ways that infringe on other copyrighted software • Create software with offensive or harmful content
35
What is the key philosophical difference between the FSF and the OSI?
Free Software Foundation (FSF): Focuses on the user's RIGHTS to control the software — a moral and ethical stance. Open Source Initiative (OSI): Emphasises PRACTICAL BENEFITS like collaborative development and business value of open-source software.
36
Summarise the 10 principles of the Open Source Initiative (OSI).
1. Free Redistribution — licence must not restrict selling/giving away software 2. Source Code — must include source code; must be modifiable 3. Derived Works — licence must permit modifications and distribution under same terms 4. Integrity of Author's Source Code — modified distributions must be allowed 5. No Discrimination Against Persons or Groups 6. No Discrimination Against Fields of Endeavour (business, research, etc.) 7. Distribution of Licence — rights apply to all recipients without extra licensing 8. Non-Specific Product Requirement — rights apply independently of distribution package 9. No Restriction on Other Software — cannot restrict other programs distributed alongside 10. Technology-Neutral Licence — must not rely on specific technologies/interfaces
37
What is a 'Technology-Neutral' licence?
A licence that does not require the software to be used with a specific technology, individual interface, or style of operation. This is OSI Principle 10 — ensures software can be used across different platforms and environments.
38
Compare the four types of software licensing.
COMMERCIAL: Paid; copyright-protected; cannot modify code; single/multi-use licence. FREE/OPEN SOURCE (FSF/OSI): Free; can run, modify, redistribute, share modified code; source code must be included. FREEWARE: Free; cannot modify/repurpose; still copyright-protected. SHAREWARE: Free trial (may be feature-limited); must pay after trial; no source code access; paying users get updates/support.
39
SECTION 3 — Artificial Intelligence (AI)
40
What is the definition of Artificial Intelligence (AI)?
A machine or application that performs tasks requiring some degree of intelligence when performed by a human. AI refers to machines or applications carrying out tasks that require human-like intelligence.
41
List FIVE tasks that AI can perform.
1. Using a language (Natural Language Processing) 2. Performing mathematical calculations or functions 3. Recognising a person's face (facial recognition) 4. Operating machinery — such as cars, aeroplanes, or trains 5. Analysing data to predict future events (e.g. weather forecasting)
42
Describe FOUR different applications of AI with examples.
1. Police/Security — image recognition to identify wanted people (features, characteristics in an image) 2. Natural Language Interfaces — speech recognition; adapts to learn regional accents 3. Self-Driving Cars — detects position on road; follows routes; collision avoidance; self-parking 4. Spoken Interfaces — uses NLP to take a sentence and work out its meaning (e.g. Siri, Alexa) 5. Game Playing — models AI characters to react according to player's movements 6. Medical Procedures — e.g. precise eye operations
43
Explain how AI is used in an application (e.g. a game-playing AI). Give 5 steps.
1. The rules/past moves/decision-making algorithms are stored 2. The AI program is trained by repeating the process many times 3. The AI looks ahead at possible scenarios and/or analyses patterns of past choices 4. The AI chooses the move most likely to be successful 5. The computer learns to improve by storing positive/negative results of choices and changing future choices accordingly
44
What are the SOCIAL impacts of AI? (positive and negative)
POSITIVE: • Improved healthcare precision (e.g. surgical robots) • Better security and crime detection (facial recognition) • More accessible interfaces for people with disabilities NEGATIVE: • Increased surveillance and loss of privacy • Job displacement in many sectors • Potential for algorithmic bias and discrimination • Over-reliance on technology
45
What are the ECONOMIC impacts of AI? (positive and negative)
POSITIVE: • Increased efficiency and productivity • New industries and jobs created • Reduced costs for businesses through automation • AI-driven vehicles reduce transport costs NEGATIVE: • Significant job losses through automation (manufacturing, admin, transport) • Economic inequality if benefits concentrated in few companies/countries • Countries without AI development may fall further behind economically
46
What are the ENVIRONMENTAL impacts of AI? (positive and negative)
POSITIVE: • AI optimises energy consumption in buildings and networks • Better climate modelling and prediction • Smart grid management reduces energy waste NEGATIVE: • High energy consumption for training large AI models • Increased electronic waste (e-waste) from AI hardware • Data centres have a large carbon footprint
47
State Isaac Asimov's Three Laws of Robotics.
1st Law: A robot may not harm a human being or, through inaction, allow a human being to come to harm. 2nd Law: A robot must obey orders given by humans, except where this would conflict with the First Law. 3rd Law: A robot must protect its own existence, as long as this does not conflict with the First or Second Law.
48
Name FIVE applications of AI beyond traditional robotics.
1. Autonomous (driverless) vehicles 2. Artificial limb technology (controlled by neural signals) 3. Drones for dangerous tasks (bomb disposal, welding, nuclear site inspection) 4. Climate change predictions using large-scale data analysis 5. Medical procedures — such as high-precision eye operations
49
Describe what is meant by copyright.
1. The formal and legal rights to ownership // intellectual property rights. 2. Protects against unauthorised reproduction of work. 3. Provides for a legal right of redress.
50
Explain the reasons why it is important to act ethically in relation to team members.
These questions require five types of answer: 1. A form of being fair. 2. A form of building trust within a team. 3. A form of working as a team. 4. A form of feeling valued, getting help, giving help. 5. A form of producing the best product for the client and employer.
51
Describe the ways in which a professional can act ethically when required to use an unfamiliar IDE or tool.
1. Tell the manager they have not used it and explain how they will get up-to-date. 2. Perform their own research on how to use it. 3. Explain to the manager that additional training is needed. 4. Ask the manager to book a training course. 5. Ask for a mentor / to shadow someone more experienced. 6. Practise at home before starting.