The Bigger Picture: Computer Use & Digital Inclusion
21 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT directly mentioned as an area of focus within 'The Bigger Picture' unit?

  • Privacy
  • Professionalism
  • Quantum computing (correct)
  • Environmental impact of technology

Governments are working to ensure that the rule of law is imposed on all aspects of computer use.

True (A)

Name one website mentioned in the text that is a good starting point for staying up to date with computer science news.

BBC's Click website

The unit emphasizes that the benefits of computer systems should be shared by ______.

<p>all people</p> Signup and view all the answers

Match the following areas with their concerns

<p>Environmental Impact of Technology = Harmful effects of manufacturing, use and disposal of computing devices Privacy = Ethical concerns regarding computer systems Legal Impact of Technology = Intellectual property, copyrights, patents and licensing Digital Inclusion = Ensuring that computers benefits are shared by all people</p> Signup and view all the answers

Which of the following is the MOST accurate definition of digital inclusion?

<p>Ensuring everyone has affordable access to computing technology and the skills to utilize it effectively. (A)</p> Signup and view all the answers

The digital divide refers to the equal distribution of technology and digital literacy across all segments of society.

<p>False (B)</p> Signup and view all the answers

What is one way organizations try to offer a more personalized service?

<p>Collecting and analyzing user data</p> Signup and view all the answers

The term _______ refers to the gap between those who are technology-empowered and those who are technology-excluded.

<p>digital divide</p> Signup and view all the answers

Match the following terms with their descriptions:

<p>Digital Inclusion = Efforts to ensure everyone has affordable access to computing technology and the necessary skills. Digital Divide = The gap between those who are technology-empowered and those who are technology-excluded. Affordable = Being priced at a level that is within the financial reach of most people. Surveillance technology = Technology used to monitor individuals or populations, raising privacy concerns.</p> Signup and view all the answers

Why might some people choose to reveal personal information online despite the potential disadvantages?

<p>The perceived benefits, such as personalized services or social connection, outweigh the concerns. (C)</p> Signup and view all the answers

Which action exemplifies a measure taken to promote digital inclusion?

<p>Implementing digital literacy programs and providing low-cost computers in underserved communities. (C)</p> Signup and view all the answers

Big data analysis solely benefits individuals by providing them with personalized services without affecting their privacy.

<p>False (B)</p> Signup and view all the answers

Which of the following best describes the ethical dilemma related to keeping an old computer?

<p>The missed opportunity for someone in need to benefit from it, balancing personal convenience with social good. (A)</p> Signup and view all the answers

An action that is legal is always ethical.

<p>False (B)</p> Signup and view all the answers

What is one potential threat to individual privacy posed by facial recognition technology?

<p>Mass surveillance</p> Signup and view all the answers

______ is the right to be left alone and free from unwanted scrutiny and intrusion.

<p>Privacy</p> Signup and view all the answers

Which of the following is a type of information that would be considered personal data?

<p>A person's medical records. (B)</p> Signup and view all the answers

Automatic number plate recognition (ANPR) systems raise privacy concerns primarily because they:

<p>Can track vehicle movements and create a record of locations visited. (D)</p> Signup and view all the answers

Match the following terms with their corresponding definitions:

<p>Ethics = A set of moral principles governing behavior Privacy = The right to be left alone and free from intrusion Personal Data = Information unique to an individual</p> Signup and view all the answers

What is a key concern related to the extensive collection and analysis of personally identifiable information?

<p>It can lead to a massive invasion of privacy. (D)</p> Signup and view all the answers

Flashcards

Surveillance technology

Technology that monitors activities for security, raising privacy concerns.

Digital inclusion

Ensuring everyone has affordable access to computing tech & skills.

Digital divide

The gap between those with and without access/skills in technology.

Affordable

Within financial reach for most people to purchase.

Signup and view all the flashcards

Technology-empowered

Having the opportunity and knowledge to use technology.

Signup and view all the flashcards

Technology-excluded

Lacking the opportunity and knowledge to use technology.

Signup and view all the flashcards

Computing Technology Benefits

Access to news, information, products, and services anytime, anywhere.

Signup and view all the flashcards

Promoting Digital Inclusion

Policies and laws designed to spread technology benefits to all.

Signup and view all the flashcards

Environmental Impact of Technology

The study of the environmental effects caused by the manufacture, use, and disposal of computing devices.

Signup and view all the flashcards

Computers Combatting Environmental Impact

Using computers to monitor environmental conditions, analyze data, and develop sustainable solutions.

Signup and view all the flashcards

Staying Up-to-Date

Remaining informed about new technologies and issues in computer science.

Signup and view all the flashcards

Green Computing

Using computers to help protect the planet (e.g., climate monitoring).

Signup and view all the flashcards

Privacy Concerns

Ethical and legal concerns regarding computer systems, data handling, and user rights.

Signup and view all the flashcards

Privacy

The right to be free from unwanted intrusion and observation.

Signup and view all the flashcards

Ethics

A set of moral principles guiding behavior; what is considered right and wrong.

Signup and view all the flashcards

Personal Data

Information unique to an individual.

Signup and view all the flashcards

Invasion of Privacy

When your right to be alone and unobserved is taken away without your permission.

Signup and view all the flashcards

Privacy threats of computing

Computer technology raises concerns about its impact on individual privacy.

Signup and view all the flashcards

Ethical Consumption

Deciding if swapping your old smartphone is worth the environmental impact.

Signup and view all the flashcards

High cost of open society

Too much personal information is gathered, stored and analyzed.

Signup and view all the flashcards

Study Notes

Computing Impact on the Environment

  • Computing impacts the environment through manufacture, use, and disposal; however, computers can also combat destructive effects.

Negative impacts

  • Manufacturing, using, and disposing of devices are all impactful
  • Non-renewable resources are depleted
  • E-waste piles are created
  • Energy consumption increases
  • Human health is put at risk

Raw Material Extraction

  • Computer products use non-renewable resources like sand (for glass), oil (for plastics), and various metals (for wiring).
  • Some metals, including silver, gold, copper, and palladium, are precious and scarce.
  • Others, like arsenic, cadmium, and chromium, are hazardous.
  • Radioactive metals like uranium and thorium can contaminate the environment and are toxic.
  • Uncontrolled mining damages local environments and endangers miners, causing injuries and illnesses.

Production

  • Manufacturing components and assembling products requires a lot of energy from non-renewable fossil fuels.
  • Semiconductor manufacturing uses large amounts of water, leading to shortages and pollution in some areas, to produce 40,000 semiconductors a month can use 20 million liters of water a day
  • A UN study estimates that manufacturing a 24 kg computer and monitor requires 240 kg of fossil fuels, 1500 liters of water and 24kg of chemicals.
  • Exposure to hazardous materials from manufacturing can cause physical and neurological damage.
  • Many countries have regulations such as the EU's Restriction of Hazardous Substances (RoHS) Directive to limit the use of hazardous substances.
  • China's RoHS2 (2019) introduces a voluntary certification system for hazardous substances.

Usage

  • Energy consumption from devices seems small individually, but collectively, billions of devices consume significant energy.
  • Energy efficiency depends on usage, with high-end applications using more power.
  • Cloud computing and data centers are major energy users, surpassing the aviation industry in energy consumption.
  • Smaller, inefficient data centers are the worst offenders.
  • Energy efficiency and renewable energy use can reduce data centers carbon footprint.

Disposal

  • Disposing unused tech poses environment threat as e-waste grows.
  • E-waste is expected to exceed 52 million tons globally by 2021, with only 20% being recycled.
  • Improper recycling overseas in developing countries leads to health and environmental issues due to dangerous materials leaching into the environment.
  • Landfill mining near e-waste sites can be dangerous and requires special training and clothing.
  • For every 1 million mobile phones, 24 kg of gold, 250 kg of silver and 9 tons of copper can be recovered from recycling which has led to dangerous landfill mining

Rules and Regulations

  • Governments impose recycling targets to reuse materials.
  • Public awareness drives manufacturers to improve conditions and requirements for suppliers.
  • Green computing promotes efficient resource use.
  • Using sleep mode can reduce consumption by over 50%.

Helping the environment via computers

  • Computing can aid climate change, warn of disasters, protect species, and reduce energy use.
  • NASA analyses satellite data and measures sea temperatures.
  • Wireless sensor networks gather glacier data. Researchers at Oxford use home computer time to study global warming's role in flooding.
  • Tsunami early warning systems use sensor networks and communication to evacuate coastal areas.
  • Conservation efforts use GPS and satellite data of elephants. Miniature transponders on bees study disease/pesticide effects.
  • Mobile phones listen for illegal logging.
  • Energy-efficient buildings use sensors to monitor conditions and adjust electricity. Solar farms use sensors and computer-controlled motors to optimise electricity usage.

Privacy

  • Privacy involves the right to be left alone and free from intrusion.
  • Ethical decisions relate to what's morally right/wrong.
  • Invasion of privacy occurs when your right to be alone is taken away without your permission.
  • Computing technology can threaten individual privacy.

Personal Data

  • Posting updates and signing up for online services adds to a store of personal data that is held
  • Personal data includes location, appearance, friends, likes/dislikes, bank details and visited places.
  • Collected by online services not owned by the person the information is about
  • Organizations such as schools store attendance records, exam results, borrowed books, and activities undertaken.
  • People have little control over data collection, raising concerns about who has access to this data, and how accurate and secure is it.
  • Weak security can lead to identity theft and fraud.
  • Inaccurate information, may have its affected be felt for a life time. Data protection legislation dictates that data must be processed fairly, used only for specific/lawful purposes, be adequate and relevant, accurate and up to date, kept no longer than needed, and kept secure.
  • One reason for giving out our data is for personalization of online services.

Big Data

  • Analysing vast amounts of personal data can benefit the society, such as providing insights on adverse side effects, optimize energy use in cities, and provide insights of spreading disease.
  • Data collection can lead to the individual experiencing identity theft or an intruder illegally accessing personal information through social engineering.

Surveillance Technology

  • Consists of CCTV, drones, number plate recognition, bugging and tracking devices that are used to monitor
  • Whistle-blowers, bring awareness to issues with surveilence where people are acting illegally and unethically
  • Concerns about what this data might be abused towards

Online data breaches

  • Online data breaches can result the loss of personal and financial data.
  • One example is ransomware, a type of malicious software that blocks systems which calls for a sum of money to be paid
  • 'Biggest ransomware outbreak in history' was WannaCry, which took place in 2017 in over 150 countries

Location-Based Services:

  • Location-based services allow the sharing real-time information online.
  • The use of these services may share what you are doing to other people and can be dangerous and considered an invasion of privacy
  • Privacy enhancing tools can give some effectiveness in giving protection against the invasion of privacy.

Digital Inclusion

  • Digital inclusion ensures affordable access to technology and the skills to use it.
  • Digital divide is the gap between technology- empowered and technology-excluded.

Reasons for why Technology Exclusion is not a good idea

  • The internet is becoming a default for accessing information, public services and entertainment
  • Having poor digital literacy makes it hard for opportunities for employment
  • Internet is becoming is outlet for expression
  • It allows businesses to be competitive Internet also enables access to ways of saving money
  • Gives people the opportunity to keep in touch with friends and relatives

Digital Inclusion : Initiatives

  • Subsidy programs for low-income programs
  • Online gateways
  • Rural intermet centers
  • Technology can fill gaps even with non existent landline structures

Professionalism

  • Should behave ethically and demonstrate professionalism
  • Should always respect the wellbeing, privacy and security
  • Computer scientist need to make sure what their work cannot put other peoples life at stake

Intellectual Property (IP)

  • Unique creation of the human mind with commercial value. There are laws to protect Intellectual Properties
  • Copyright protects expression, source codes is protected
  • Patent protect the idea or design with is what is distinct than anything

Licensing

  • For every piece of software, even if the piece is free has a license
  • Paid software will has a unique license key that certifies that the software cannot be legally copied

Open-Source vs Proprietary Software

  • Open - source software is freely available on the Internet with permission to edit but never charge a fee
  • Open-source software has one major draw as to be free to use and easy to demonstrate concepts
  • Proprietary software is the opposite of open source and its code is always protected and users are not allowed to modify it

Computer Misuse Acts

  • Makes it illegal for anyone to gain access to another computer system without permission.
  • Computing technology constantly evolves to handle many more commands every second
  • Computer components dramatically fell in cost as their capabilities improve

Artificial Intelligence (AI)

  • Digital computer or computers controlled system that performs tasks commonly associated with intelligent beings through adaptation to changing systems
  • The ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings using intelligence system that helps the adapt to current situations
  • AI will eventually help with knowledge, reasoning ,solving perception ability to manipulate and move and planning Machine Learning
  • Ability for computers to learn without being explicitly programmed

Artificial intelligence in health

  • Digtal Consultations Apps to make the doctor
  • Analyzing Test Results, find scans quicker
  • Health Montoring Wearabl Heath Trackers that monitor heart In day to day life we have the use of Amazon ,Virtual Assistance siri with cars to monitor your movement and banking to monitar you

DNA Computing

  • Material that stores the genetic material of all organisms in their chromosomes
  • Its has advantages to silicon based
  • DNA biochips can be more cleanly
  • A kilogram can have the capacity of all the built electrual computers

Nanotechnology

  • Manipulation of matter
  • Nanotechnology is making a key role in the tennis world.
  • self-ean ing gas coating babrios that will have better protection and scratch resistant and coating

Quantum computing

  • Computers do not create better than the original ones that created
  • They are very different and base it on completely different reality superposition. The ability of a quantum system to be in multiple states at the same time
  • The computer system is fragile that can create slightness and noises that can create a lot of errors in many calculations
  • Quantum Can imagine solutions in traffic controlling by controlling traffic and driving cars along different routes stops consumption

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Questions covering key concepts from 'The Bigger Picture' unit, including government regulation, digital inclusion, personalized services, and the digital divide. It focuses on responsible and equitable technology use.

More Like This

Emerging Digital Societies Overview
5 questions
Digital Inclusion and Accessibility
5 questions
Use Quizgecko on...
Browser
Browser