1/20
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Energy Consumption
Digital devices increase global energy demand, particularly impacting greenhouse gas emissions and pollution.
Data Centers
Facilities that use 1-3% of global energy, often utilizing fossil fuels.
Environmental Impact of Energy Consumption
Includes greenhouse gas emissions, air and water pollution, land degradation, and effects on wildlife.
Manufacturing Issues
Involves excessive use of scarce natural resources and leads to environmental damage such as water pollution and habitat destruction.
Replacement Cycle Issues
Short cycles lead to increased e-waste and faster depletion of natural resources.
Disposal Issues
Landfills can cause toxic leakage, methane emissions, and hazardous exposure from e-waste in regulated countries.
Copyright
Protection against unauthorized use of content to prevent intellectual property theft.
Cybersecurity
Defensive measures against hacking and cybercrimes, including identity theft.
Data Protection
Ensuring responsible handling of personal data in compliance with legal standards.
Privacy Issues
Concerns related to unauthorized data collection and usage, including surveillance and monitoring.
Data Protection Act (2018) Principles
Fair processing, specified purposes for data collection, relevant usage, accurate records, necessary retention.
Computer Misuse Act (1990) Offenses
Includes unauthorized access, access with intent to commit further crimes, and unauthorized modification of data.
Cookies Regulation
Requires informing users about cookies, explaining their purpose, and obtaining consent.
AI (Artificial Intelligence)
Machines simulating human intelligence for task automation.
Machine Learning
AI systems that improve by analyzing data and identifying patterns.
Intellectual Property Protection Methods
Includes copyright, patents, trademarks, and licensing.
Malware
Types of malicious software including viruses, worms, Trojans, keyloggers, and ransomware.
Social Engineering
Manipulative techniques used to extract confidential information from individuals.
Security Measures
Includes anti-malware software and encryption to protect data.
Acceptable Use Policies (AUP)
Guidelines for responsible usage of networks or systems.
Backup Strategies
Methods like RAID, off-site storage, and standby equipment to ensure data security.