NEW - Unit 5: Issues and impact Edexcel GCSE Computer Science

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

E-waste

Discarded electronic equipment (computer technology, mobile devices, etc)

2
New cards

Carbon footprint

Carbon dioxide produced as a result of consuming energy

3
New cards

4
New cards

Personal data

Information that is personal and unique to an individual

5
New cards

Identity theft

Stealing someones personal details in order to commit fraud, or another crime

6
New cards

Data protection act 2018

Law that controls how organisations can use personal data they have gathered

7
New cards

Computer Misuse Act (1990)

It is illegal to make any unauthorised access to data:

with the intent to commit further offences

with the intent to modify data (e.g. viruses)

8
New cards

Copyright, Designs and Patents Act (1988)

Law that makes it illegal to copy or modify intellectual property without permission

9
New cards

Proprietary software

Software that is paid for, not open for modification

10
New cards

Open-source software

Software that is free, can be modified by users

11
New cards

Algorithmic bias

occurs when AI makes prejudiced decisions that discriminate against certain individuals

12
New cards

Artificial intelligence

Any machine programmed to think, work and react like humans

13
New cards

Machine Learning

Training devices or software to perform a task and improve its capabilities, through feeding it data.

14
New cards

Ethics

The principles of right and wrong that guide an individual in making decisions

15
New cards

Licensing

a legally binding contract that specifies how software can be used

16
New cards

Cybersecurity

Measures taken to protect a computer system against unauthorized access or attack

17
New cards

Cyber attack

An attempt by hackers to damage or destroy a computer network or system.

18
New cards

Malware

Software that is intended to damage or disable computer systems.

19
New cards

Cloud computing

A system in which all data is stored on a central server owned by a company (e.g. Google) and accessed virtually

20
New cards

Social engineering

Techniques that trick a person into disclosing confidential information

21
New cards

Worm

A software program capable of copying itself that can spread over a network, without the need for a host file (e.g. sending itself via email)

22
New cards

Virus

A piece of code that inserts itself in a host file, and then copies itself, corrupting the system or destroying data.

23
New cards

Trojan

A program that appears harmless but is malicious

24
New cards

Baiting

Persuading victims with something desirable, such as a free download, to trick them into downloading malware.

25
New cards

Ransomware

A type of malicious software designed to block access to a computer system until a sum of money is paid.

26
New cards

Quid pro quo

Offering a service or benefit in exchange for sensitive information (e.g. promising IT assistance in return for login credentials.)

27
New cards

Replacement cycle

The period of time between the purchase of a product and its replacement with an equivalent product.

28
New cards

Data breach

The unintended release of sensitive data or the access of sensitive data by unauthorized individuals.

29
New cards

Data subject

The individual who’s data is being collected (such as the patient at a medical facility, a company employee or a retail store customer).

30
New cards

Intellectual property

A unique creation of the human mind, such as an invention or computer program

31
New cards

Trademark

Used by companies to distinguish goods and services from others and to protect their brand, lasts for 10 years

32
New cards

Spyware

Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

33
New cards

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

34
New cards

Phishing

When attackers trick individuals into revealing sensitive information by posing as trustworthy people

35
New cards

Pretexting

Attackers create a fake scenario to gain someone's trust and extract sensitive information (e.g. pretending to be a coworker to obtain company data)

36
New cards

Software patch

Designed to update a computer program in order to fix a software vulnerability or improve the program.

37
New cards

anti-malware software

detects, quarantines and removes malware from a computer

38
New cards

Backup and Recovery Plan

ensures critical data can be recovered if they are lost/corrupt. Backups can be automatic, scheduled, manual, incremental or full.

39
New cards

Acceptable Use Policy (AUP)

Helps to protect users by clearly stating what use of network resources are acceptable and what are not

40
New cards

Harmful materials from computer disposal

Dioxins

Mercury

Radioactive isotopes

41
New cards

Advantages of the replacement cycle

Up to date technology reduces chances of systems getting hacked

Replacing tech with more energy efficient devices can reduce costs with energy consumption

42
New cards

Disadvantages of the replacement cycle

Constant replacement can lead to increased waste as people throw away old technology.

Replacing technology can be expensive

43
New cards

Issues with the disposal of e-waste

E-waste may not be recycled but instead disposed of in landfill, which can be expensive and pollute the environment as they release toxic chemicals.

44
New cards

Issues with the collection and use of personal data

(POC MD)

Privacy (Who has access?)

Ownership (Who owns data about you?)

Consent (How is your data collected?)

Misuse (Hacking, phishing scams)

Data protection

45
New cards

Ways personal data is collected

Interaction with websites

Face recognition

GPS technology

46
New cards

Privacy and Electronic Communications Regulations 2003

Any website using cookies must:

tell users cookies are there

explain what the cookies are doing

obtain users consent to store cookies on their device

47
New cards

Robotics

Machines which carries out work following a set of programmed rules.

48
New cards

AI considerations

(ALAS)

Accountability

Legal Liability

Algorithmic bias

Safety

49
New cards

Copyright

A legal term used to describe the rights a creator has over their own work, lasts for 70 years after the death of the holder

50
New cards

Patents

An exclusive right granted for an invention. A patent prevents someone from copying an invention because it gives the inventor exclusive right to use it for 20 years.

51
New cards

Keylogger

Software that obtains info from another computer by silently recording their keystrokes

52
New cards

Information that companies must tell people when requesting consent to use their personal data (not the laws)

  • What the data is being collected for

  • How long it will be stored

  • That they are giving consent

53
New cards

Data protection legislation principles (that organisations must follow)

(LASAS)

Lawfulness

Accountability

Storage limitation (time kept)

Accuracy

Security

54
New cards

Ways data used to train an algorithm could cause algorithmic bias

(BIN)

Biased data

Inaccurate data

Not enough data

55
New cards

Data protection act laws for data collectors

Data you hold must be kept for no longer than necessary

Data you collect must be accurate and kept up to date

Data must be securely stored and prevent unauthorised access

56
New cards

Data protection act laws for data subjects

Subjects have a right for data to be processed appropriately

Subjects have the right to access data held about them to check and update it