Cards (47)

  • What are ethical issues in computing?
    Moral dilemmas from technology
  • Data security risks include hacking and malware.

    True
  • Social impact in computing includes effects on employment, social interactions, and the environment
  • What is data collection in the context of privacy concerns?
    Gathering user information
  • Common ethical issues in computing
    1️⃣ Privacy
    2️⃣ Security
    3️⃣ Intellectual Property
    4️⃣ Social Impact
  • Hacking involves unauthorized access to computer systems.

    True
  • Why is data security ethically important?
    Prevents harm and loss
  • Copyright laws prevent unauthorized copying of software.
    True
  • Copyright laws grant creators exclusive rights over the use and distribution of their work
  • Match the purpose of intellectual property rights with their description:
    Encourage innovation ↔️ Reward inventors and creators
    Prevent unauthorized use ↔️ Protect copyrighted works
  • Copyright protection generally lasts for the creator's lifetime plus 70 years.
  • Ethical issues in computing often involve conflicts between the benefits of technology and potential harm to individuals, society, and the environment
  • Balancing technology benefits with individual rights is essential in ethical computer science practice.

    True
  • Extensive gathering of user data through online activities is known as data collection.
  • What is the main focus of data security?
    Protection of data from threats
  • Respecting intellectual property rights supports creativity and fairness.

    True
  • Copyright duration typically lasts the creator's lifetime plus 70 years.
  • Algorithmic bias refers to the unfair or discriminatory outcomes produced by algorithms.
  • Match the type of algorithmic bias with its description:
    Representation Bias ↔️ Underrepresentation in training data
    Measurement Bias ↔️ Inaccurate or incomplete data
    Aggregation Bias ↔️ Failure to account for differences within groups
    Feedback Loop Bias ↔️ Perpetuation of historical biases
  • Accessibility in computing ensures technology can be used by people of all abilities.
  • Match the accessibility strategy with its benefit:
    Keyboard Navigation ↔️ Motor impairment access
    Screen Readers ↔️ Auditory access for visually impaired
    Adjustable Text ↔️ Improved readability for visual disabilities
  • High energy consumption by data centers contributes to environmental damage.
  • Digital divide refers to the gap between those with and without access to modern ICT.
  • Match the ethical dimension of the digital divide with its implication:
    Inequality ↔️ Exacerbation of social disparities
    Justice ↔️ Fair access to digital resources
    Opportunity ↔️ Limited educational and economic prospects
  • Privacy concerns in computing relate to the collection, storage, and use of personal data
  • Match the ethical issue with its description:
    Privacy ↔️ Collection and use of personal data
    Security ↔️ Risks of cybercrime
    Intellectual Property ↔️ Copyright and piracy issues
    Social Impact ↔️ Effects on employment and society
  • Privacy concerns include data sharing with third parties without consent.
    True
  • Surveillance involves the monitoring of user behavior and communications
  • What is data security in computing?
    Protecting data from threats
  • Phishing is a deceptive attempt to obtain personal information
  • Match the intellectual property right with its description:
    Copyright ↔️ Protects creative works
    Patent ↔️ Protects inventions
    Trademark ↔️ Distinguishes products
    Trade Secret ↔️ Confidential business information
  • What are intellectual property rights designed to protect?
    Creative works and inventions
  • Copyright laws primarily focus on protecting creative works.

    True
  • Why is respecting intellectual property rights considered ethically important in computer science?
    Ensures fair compensation for creators
  • Match the ethical issue with its description:
    Privacy ↔️ Concerns about personal data use
    Security ↔️ Risks of cybercrime and malware
    Intellectual Property ↔️ Protection of creative works
    Social Impact ↔️ Effects on employment and society
  • What is the primary ethical concern of privacy in computing?
    Collection, storage, and use of personal data
  • Order the key privacy concerns in digital environments:
    1️⃣ Data Collection
    2️⃣ Data Storage
    3️⃣ Data Sharing
    4️⃣ Surveillance
  • Unauthorized access to computer systems is called hacking.
  • Copyright laws, a key aspect of intellectual property rights, grant creators exclusive control over their creative works
  • Respecting intellectual property rights supports creativity and fairness.

    True