Provide some examples of why it is difficult to keep private information safe on the internet. - Social media encourages you to share personal data ; cloud computing; companies sharing your personal information with third parties., What do some governments do to ensure we are protected against terrorism. - The intelligence agencies use packet sniffers and other software to monitor internet traffic looking for certain keywords which might alert them to a plot., What is internet censorship? - A controversial topic which enforces restriction on users to prevent access to certain websites such as pornography, gambling and other inappropriate web-sites. Some countries censor much more than others., In what ways does technology impact on our social well-being? - You can feel pressured into buying products; there is peer pressure on children to have the latest phones and computers; smart phones intrude in peoples lives and there is less relaxation time which can increase stress levels and effect mental health., What form does cyberbullying take? - Intimidation; threats to harm; insults; humiliation or damage, destroy reputation, Provide examples of how technology can impact our health. - Eye strain; repetitive strain injury; back problems caused by poor posture., What causes the digital divide? - Financial deprivation; the post code lottery i.e. network coverage; lack of expertise in using technology (not always determined by age!), Provide some examples of how technology has changed the way we do business. - We now have access to digital streaming 24/7 entertainment so businesses benefit through subscription services; we can share economies such as through Airbnb when you can let out your house in the summer months etc. Food orders can be made through companies such as Uber etc, In what ways does making devices impact on the environment? - They make use of raw materials that require extraction from the Earth; they also use rare minerals; they use plastics which are made from oils. All these raw materials create pollution when they are extracted and require large amounts of energy to get them into a useful form., Why does using your devices have such an impact on electricity production. - All computers generate a lot of heat which means they are inefficient. Most electricity comes from non-renewable energy sources (although this is gradually changing). Servers use a lot of energy and are not always fully operative i.e. in states of idling., What can we do to reduce the amount of electricity consumed in devices? - Virtual servers are starting to become more common which means as they are software based and therefore they don't directly create heat so they waste less energy. More computers are being designed to go into more efficient idling states when not in use. There are many advertisement campaigns that reduce energy loss e.g. don't leave TV's etc. in standby modes., What is WEEE? - Waste Electric and Electronic Equipment, an e-waste strategy to dispose of electronic waste safely. It tries to recycle reusable minerals and precious metals used in electrical devices., State the main aspects of the Data protection Act 1998 - A policy that imposes strict criteria about the collection of data. It must be relevant data for the collector, limited, secure, not be collected under false pretenses, and must be for a particular purpose. It must only be kept for a certain amount of time, must be available to the person it is held for, regularly updated and must not be transferred to countries that don't hold the same regard to data safety., What are the main features of the Computer misuse act. - This act works to prevent hackers gaining unauthorised access, it makes gaining unauthorised access to a network illegal, it makes modifying computer material without permission illegal. For example, if someone guesses their friends password and gains access to their school account and then deletes a file, they would have committed two crimes., How does the copyright, designs and patent act protect innovation - It stops people stealing your hard-work, anything you have created should be protected provided you have registered it. Patents cover new inventions; copyright covers written or recorded content., What does the freedom of information act allow? - It allows the public to access information held about them, it covers emails and data files., Explain the creative commons license - Allows you to legally share media and software online, without having to ask for permission first. There are four versions of this license., What issues can the use of technology raise? - Ethical; legal; cultural; environmental, What is a stakeholder? - This is a group of people who are interested or are affected by a certain situation, i.e. company owners; customers. workers etc. This is to ensure that all features and viewpoints of a piece of software can be reviewed by the people that would benefit from it when it is completed.,

1.8 [Ethical, legal, cultural and environmental concerns]]

Leaderboard

Flip tiles is an open-ended template. It does not generate scores for a leaderboard.

Visual style

Options

Switch template

Continue editing: ?