Issues and Impact in Computer Science (EdExcel)

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

Energy Consumption

Digital devices increase global energy demand, particularly impacting greenhouse gas emissions and pollution.

2
New cards

Data Centers

Facilities that use 1-3% of global energy, often utilizing fossil fuels.

3
New cards

Environmental Impact of Energy Consumption

Includes greenhouse gas emissions, air and water pollution, land degradation, and effects on wildlife.

4
New cards

Manufacturing Issues

Involves excessive use of scarce natural resources and leads to environmental damage such as water pollution and habitat destruction.

5
New cards

Replacement Cycle Issues

Short cycles lead to increased e-waste and faster depletion of natural resources.

6
New cards

Disposal Issues

Landfills can cause toxic leakage, methane emissions, and hazardous exposure from e-waste in regulated countries.

7
New cards

Copyright

Protection against unauthorized use of content to prevent intellectual property theft.

8
New cards

Cybersecurity

Defensive measures against hacking and cybercrimes, including identity theft.

9
New cards

Data Protection

Ensuring responsible handling of personal data in compliance with legal standards.

10
New cards

Privacy Issues

Concerns related to unauthorized data collection and usage, including surveillance and monitoring.

11
New cards

Data Protection Act (2018) Principles

Fair processing, specified purposes for data collection, relevant usage, accurate records, necessary retention.

12
New cards

Computer Misuse Act (1990) Offenses

Includes unauthorized access, access with intent to commit further crimes, and unauthorized modification of data.

13
New cards

Cookies Regulation

Requires informing users about cookies, explaining their purpose, and obtaining consent.

14
New cards

AI (Artificial Intelligence)

Machines simulating human intelligence for task automation.

15
New cards

Machine Learning

AI systems that improve by analyzing data and identifying patterns.

16
New cards

Intellectual Property Protection Methods

Includes copyright, patents, trademarks, and licensing.

17
New cards

Malware

Types of malicious software including viruses, worms, Trojans, keyloggers, and ransomware.

18
New cards

Social Engineering

Manipulative techniques used to extract confidential information from individuals.

19
New cards

Security Measures

Includes anti-malware software and encryption to protect data.

20
New cards

Acceptable Use Policies (AUP)

Guidelines for responsible usage of networks or systems.

21
New cards

Backup Strategies

Methods like RAID, off-site storage, and standby equipment to ensure data security.