Podcast
Questions and Answers
What does 'Social Media' refer to?
What does 'Social Media' refer to?
Social media refers to the means of interactions among people where they create, share, and/or exchange information and ideas in virtual communities and networks.
What is a Social Media Platform?
What is a Social Media Platform?
A Social media platform refers to an online digital service or website that enables users to create, share, and interact with content. It allows users to interact and connect with others in a virtual environment.
Which of these are forms of Social Media? (Select all that apply)
Which of these are forms of Social Media? (Select all that apply)
- instant messaging (correct)
- micro-blogs (correct)
- photo-sharing sites (correct)
- virtual worlds (correct)
- podcasts (correct)
- widgets (correct)
- wikis (correct)
- Social networking sites (correct)
- video-sharing sites (correct)
- blogs (correct)
What is Cyber Ethics?
What is Cyber Ethics?
Cyberethics is also sometimes referred to as Internet ethics, computer ethics, and information ethics
Cyberethics is also sometimes referred to as Internet ethics, computer ethics, and information ethics
What are the key elements of Cyber Law?
What are the key elements of Cyber Law?
What does a Database refer to?
What does a Database refer to?
What is 'Data' in the context of computing?
What is 'Data' in the context of computing?
What is an application or 'App' in information technology?
What is an application or 'App' in information technology?
What is Artificial Intelligence (AI)?
What is Artificial Intelligence (AI)?
What is Machine Learning (ML) in the context of AI?
What is Machine Learning (ML) in the context of AI?
What is Machine Learning Technology?
What is Machine Learning Technology?
What is Machine Learning in Information Technology?
What is Machine Learning in Information Technology?
What are some applications of Machine Learning in communication?
What are some applications of Machine Learning in communication?
What are the main types of Machine Learning paradigms?
What are the main types of Machine Learning paradigms?
Describe Supervised Learning.
Describe Supervised Learning.
Explain Unsupervised Learning.
Explain Unsupervised Learning.
What is Reinforcement Learning?
What is Reinforcement Learning?
What is a DBMS?
What is a DBMS?
What are the key benefits of using a DBMS in system development?
What are the key benefits of using a DBMS in system development?
Which of these are well-known DBMS systems? (Select all that apply)
Which of these are well-known DBMS systems? (Select all that apply)
State the main characteristics of a database system.
State the main characteristics of a database system.
What is 'Data Independence' in a database system?
What is 'Data Independence' in a database system?
What is Logical Data Independence?
What is Logical Data Independence?
What does Data Model signify?
What does Data Model signify?
What is an Entity in the context of databases?
What is an Entity in the context of databases?
What are attributes in a database?
What are attributes in a database?
What is Database Security and what does it encompass?
What is Database Security and what does it encompass?
What are the key aspects addressed by Data Security?
What are the key aspects addressed by Data Security?
What does 'Privacy of Data Elements' signify?
What does 'Privacy of Data Elements' signify?
What does System-related Security Level mean in the context of database security?
What does System-related Security Level mean in the context of database security?
How does 'Maintaining Integrity of Database' contribute to data security?
How does 'Maintaining Integrity of Database' contribute to data security?
What are the key data security risks that a database faces?
What are the key data security risks that a database faces?
What does database security require to protect it from unauthorized access?
What does database security require to protect it from unauthorized access?
What are the different levels of database security?
What are the different levels of database security?
Define 'Database Integrity'.
Define 'Database Integrity'.
What are the key factors to consider for ensuring database integrity?
What are the key factors to consider for ensuring database integrity?
What are the key integrity rules or constraints in the relational database model? (Select all that apply)
What are the key integrity rules or constraints in the relational database model? (Select all that apply)
What does Entity Integrity Constraint specify?
What does Entity Integrity Constraint specify?
What does Referential Integrity Constraint ensure?
What does Referential Integrity Constraint ensure?
What does Domain Integrity Constraint specify?
What does Domain Integrity Constraint specify?
Why is implementing integrity constraint checking in a DBMS advantageous?
Why is implementing integrity constraint checking in a DBMS advantageous?
What is User Authentication and why is it important in the context of databases?
What is User Authentication and why is it important in the context of databases?
What are the common methods of user authentication in DBMS?
What are the common methods of user authentication in DBMS?
Explain the purpose of User Authentication in DBMS.
Explain the purpose of User Authentication in DBMS.
Describe the concept of User Authorization in databases.
Describe the concept of User Authorization in databases.
What are the key elements that User Authorization controls?
What are the key elements that User Authorization controls?
How is Authorization typically paired with Authentication in a system?
How is Authorization typically paired with Authentication in a system?
What are the various ways to gain authorization in a database system?
What are the various ways to gain authorization in a database system?
Define Data Encryption.
Define Data Encryption.
Why is Data Encryption important?
Why is Data Encryption important?
What are the two main types of data encryption?
What are the two main types of data encryption?
Describe Symmetric Key Encryption.
Describe Symmetric Key Encryption.
What is Access Control in the context of Encryption?
What is Access Control in the context of Encryption?
How does Access Control differ from Encryption?
How does Access Control differ from Encryption?
Which of the following are key types of access control? (Select all that apply)
Which of the following are key types of access control? (Select all that apply)
Explain Role-Based Access Control (RBAC).
Explain Role-Based Access Control (RBAC).
What is Attribute-Based Access Control (ABAC)?
What is Attribute-Based Access Control (ABAC)?
Define Discretionary Access Control (DAC).
Define Discretionary Access Control (DAC).
What are the roles and responsibilities of a Database Administrator (DBA)?
What are the roles and responsibilities of a Database Administrator (DBA)?
Describe the concept of 'Transaction Recovery' in DBMS.
Describe the concept of 'Transaction Recovery' in DBMS.
What are the ways a transaction can be terminated?
What are the ways a transaction can be terminated?
Define 'Database Backups'.
Define 'Database Backups'.
Why is Backup Planning crucial for databases?
Why is Backup Planning crucial for databases?
What are the two main types of backups? (Select all that apply)
What are the two main types of backups? (Select all that apply)
Explain 'Immediate Backups'.
Explain 'Immediate Backups'.
Explain 'Archival Backups'.
Explain 'Archival Backups'.
Why is database system recovery essential?
Why is database system recovery essential?
What are common reasons for a transaction to fail in the middle of execution? (Select all that apply)
What are common reasons for a transaction to fail in the middle of execution? (Select all that apply)
Define 'Big Data'.
Define 'Big Data'.
What are the three V's that characterize Big Data?
What are the three V's that characterize Big Data?
What is 'Data Analytics'?
What is 'Data Analytics'?
What are the four main forms of Data Analytics?
What are the four main forms of Data Analytics?
Explain 'Descriptive Analytics'.
Explain 'Descriptive Analytics'.
Explain 'Diagnostic Analytics'.
Explain 'Diagnostic Analytics'.
Explain 'Predictive Analytics'.
Explain 'Predictive Analytics'.
Flashcards
What are social media platforms?
What are social media platforms?
Social media platforms are online services or websites that enable users to interact with each other, share content, and create web content.
What is cyber ethics?
What is cyber ethics?
Cyber ethics examines the moral, legal, and social issues related to computer and communication technologies.
What is cyberbullying?
What is cyberbullying?
Cyberbullying is a form of bullying that occurs online through social media, where individuals are mocked or targeted based on their appearance, lifestyle, or preferences.
What is hacking?
What is hacking?
Signup and view all the flashcards
What is plagiarism?
What is plagiarism?
Signup and view all the flashcards
What is privacy in cyber ethics?
What is privacy in cyber ethics?
Signup and view all the flashcards
What is IPR?
What is IPR?
Signup and view all the flashcards
What is security in cyber ethics?
What is security in cyber ethics?
Signup and view all the flashcards
What is accuracy in cyber ethics?
What is accuracy in cyber ethics?
Signup and view all the flashcards
What is cyber law?
What is cyber law?
Signup and view all the flashcards
What is online fraud?
What is online fraud?
Signup and view all the flashcards
What is copyright law?
What is copyright law?
Signup and view all the flashcards
What is defamation?
What is defamation?
Signup and view all the flashcards
What is cyber harassment and stalking?
What is cyber harassment and stalking?
Signup and view all the flashcards
What is trade secret law?
What is trade secret law?
Signup and view all the flashcards
How does cyber law relate to online agreements?
How does cyber law relate to online agreements?
Signup and view all the flashcards
What is a database?
What is a database?
Signup and view all the flashcards
What is data?
What is data?
Signup and view all the flashcards
What is a DBMS?
What is a DBMS?
Signup and view all the flashcards
What is an application (app)?
What is an application (app)?
Signup and view all the flashcards
What is artificial intelligence (AI)?
What is artificial intelligence (AI)?
Signup and view all the flashcards
What is machine learning (ML)?
What is machine learning (ML)?
Signup and view all the flashcards
What is supervised learning?
What is supervised learning?
Signup and view all the flashcards
What is unsupervised learning?
What is unsupervised learning?
Signup and view all the flashcards
What is reinforcement learning?
What is reinforcement learning?
Signup and view all the flashcards
What is Facebook?
What is Facebook?
Signup and view all the flashcards
What is YouTube?
What is YouTube?
Signup and view all the flashcards
What is WhatsApp?
What is WhatsApp?
Signup and view all the flashcards
What is Instagram?
What is Instagram?
Signup and view all the flashcards
What is TikTok?
What is TikTok?
Signup and view all the flashcards
What is WeChat?
What is WeChat?
Signup and view all the flashcards
What is Facebook Messenger?
What is Facebook Messenger?
Signup and view all the flashcards
What is Telegram?
What is Telegram?
Signup and view all the flashcards
What is Snapchat?
What is Snapchat?
Signup and view all the flashcards
What is Douyin?
What is Douyin?
Signup and view all the flashcards
What are the key purposes of social media platforms?
What are the key purposes of social media platforms?
Signup and view all the flashcards
What are the key characteristics of social media platforms?
What are the key characteristics of social media platforms?
Signup and view all the flashcards
What are some of the security threats associated with social media platforms?
What are some of the security threats associated with social media platforms?
Signup and view all the flashcards
Study Notes
Information and Communication Technologies -III
- Paper Code: MDC0300603
Social Media Plateforms
- Social media refers to interactions among people, sharing and/or exchanging information in virtual communities and networks.
- Social media platforms are online services or websites enabling users to create, share, and interact with content.
- Platforms include blogs, micro-blogs, wikis, social networking sites, photo-sharing sites, instant messaging, video-sharing sites, podcasts, widgets, virtual worlds, and more.
- The Office of Communications and Marketing manages Facebook, X/Twitter, Instagram, LinkedIn, and YouTube accounts.
- Social media platforms facilitate content creation, sharing, and aggregation amongst virtual communities and networks.
- Common features include online platforms enabling users to create and share content and participate in social networking.
Cyber Ethics
- Cyber ethics examines moral, legal, and social issues at the intersection of computer/information and communication technologies.
- This field is also referred to as Internet ethics, computer ethics, and information ethics.
- Cyber ethics is "a branch of ethics concerned with behavior in an online environment."
- It is the "exploration of the entire range of ethical and moral issues that arise in cyberspace."
- Cyberspace is the electronic worlds made visible by the Internet.
Breaches of Cyber Ethics
- Cyberbullying: A form of bullying via internet technology, often social media, where individuals are mocked based on their physical appearance, lifestyle, or preferences. Teenagers/youngsters are often victims.
- Hacking: Stealing personal or organizational information without authorization, often resulting in data breaches that involve sensitive information such as passwords and bank details, passed to unauthorized third-party users.
- Copywriting:Claiming another individual's content or document as one's own, leading to plagiarism, a punishable legal offense.
Cyber Ethics Focuses
- Privacy: The content available online should not harm the moral, emotional, or personal ethics of individuals. Users should have rights to protect their information. Private information such as user contact details, addresses, and financial details must not be breached.
- IPR (Intellectual Property Rights): The owners retain full rights to the content posted online. No one can claim another's content as their own. Unauthorised content distribution is ethically incorrect and does not benefit the creator financially or otherwise.
- Security: Internet security is the most fundamental ethical right, and users should feel secure while using the internet. Only authorized users should access computer content. Confidential information must be safe.
- Accuracy: Online content must be accurate, as billions of users rely on it for facts and information. Inaccuracies can cause widespread misinformation.
Cyber Law
- Cyber law, also called IT law, covers legal informatics and oversees digital information circulation, software, information security, and e-commerce.
- It encompasses contract, intellectual property, privacy, and data protection principles.
- Software licensing is a controversial area.
Major Areas of Cyber Law
- Fraud: Laws protect consumers from online fraud, including identity theft and credit card theft.
- Copyright: Protects individuals and companies from copyright violations related to their creative works.
- Defamation: Covers civil laws protecting individuals from fake public statements, which can harm reputations.
- Harassment/Stalking: Online harassment and stalking violate criminal laws.
- Trade Secrets: Laws protect the trade secrets companies develop (e.g., algorithms, software etc).
- Contracts/Employment laws: These laws relate to the terms and conditions of using websites.
- Databases: Data management principles.
Databases
- A database is a structured collection of data stored in a computer system, usually controlled by a database management system (DBMS).
- Data querying and processing in databases is generally efficient because data is organized into tables using a structured query language (SQL).
- Databases are critical for organizations such as banks, universities, etc.
Artificial Intelligence (AI)
- AI is integrated seamlessly into various communication systems.
- It's applied to diverse areas of information technology, such as software development, data analysis, cybersecurity, and infrastructure management.
Machine Learning (ML)
- ML is a branch of Artificial Intelligence (AI) and Computer science that uses data and algorithms to enable AI.
- The aim is to improve accuracy by gradually learning from data.
- This technology is used in optimizing machine performance using statistical methods on data, finding solutions to problems and creating predictions.
- ML is used to perform complex tasks relating to human intelligence in many communications systems.
Machine Learning Types
- Supervised Learning(SL): Using labeled input & output data, training a model to map new data to expected output values.
- Unsupervised Learning(UL): Identifying structures in unlabeled data based on commonalities and differences.
- Reinforcement learning(RL): An interdisciplinary area concerned with how an intelligent agent acts within a dynamic environment, aiming to maximize its cumulative rewards.
Major Social Media Platforms
- A list & associated user statistics for the top 10 social media platforms is available for the year 2024.
Data Model
- Data models: A representation of a database organisation describing entities and their interrelations within a given database.
- Entity: A group of similar data elements relevant to an organization.
- Attribute: The characteristics of an entity (e.g., a customer might have an address, phone number etc).
Database Security
- Implementing and maintaining database security involves protecting data from unauthorized access, use, disclosure, modification, or destruction.
- This is typically achieved through user/access levels, data encryption, and logical protections.
- Importance of database preservation: Data security is a vital aspect for data integrity.
Levels of Security
- Network Level: Security is at the network software layer in a communication or distributed database system.
- OS Level: Security associated with the operating system software used to manage a database.
- Database System Level: Security implemented within the database system itself for determining which parts of a database are accessible to which particular user.
- Program Level: Security can be implemented through software (programs) used to manipulate the data.
- Record Level: Security level where access or modification restrictions apply to a particular record in a database, enabling granular controls over data access
- Field Level: Security level applicable to individual fields within a database requiring that only certain values be permitted, e.g., salary.
Database Management System (DBMS)
- DBMSs are programs used for managing databases.
- They offer many tools and benefits in data analysis and decision making.
- Features include: data abstraction, privacy, integrity, data sharing and analysis, plus user functionality.
Importance of Data Encryption
- Encryption is important for protecting data integrity, regardless of how it is stored or transmitted.
- Data security is paramount. Even in "secure systems", unauthorized access is possible and there is a risk of compromised data.
- It helps to secure data when transmitted.
- Encryption provides an enhanced layer of protection.
Backup and Recovery
- Backup is critical for disaster recovery and continuity.
- Data must be periodically backed up to ensure data availability and to mitigate risks associated with failures and errors.
- The need for backup increases if there is a possibility of failures occurring simultaneously, e.g., earthquake, fire or hurricane etc.
- Two main types of backups are: immediate and archival backups.
- Immediate backups are readily available to mitigate risks if instantaneous data damage occurs.
- Archival backups are stored at a segregated site, to safely archive and maintain historical data records.
Transaction Recovery
- To execute a single database operation, many DBMS tasks need to be performed in the specified order to ensure consistency.
- A sequence of tasks performed in a particular order is called a transaction.
- The DBMS may commit an operation or "rollback" an operation if errors occur.
Database Administration
- DBAs have various responsibilities, such as database design/implementation, security, performance monitoring, backup/recovery, troubleshooting, user support, capacity planning, data management and software maintenance.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the fundamentals of social media platforms and cyber ethics as part of the Information and Communication Technologies curriculum. Explore various types of social media services, their functions, and the ethical considerations surrounding their use. Enhance your understanding of how technology intersects with society through this interactive assessment.