KEMBAR78
Social Implications | PDF | Password | Privacy
0% found this document useful (0 votes)
46 views23 pages

Social Implications

Uploaded by

kgoshikhumalo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views23 pages

Social Implications

Uploaded by

kgoshikhumalo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

Social Implications

SOCIAL IMPLICATIONS

* In a computer environment, for example in a computer lab at school or in the public library, it is
necessary to have an acceptable user policy (AUS)
Give TWO criteria that must be included in the AUP

-AUP improves discipline in a computer lab.


-AUP stipulates the rules and responsibilities of the users making use of the lab.
-Rules entering the centre/rules for logging in/Rules on how to keep the centre tidy / Rules for making
use of external storage devices.

* Telecommuting opportunities are great for single parents and people with physical disabilities.
Describe what telecommuting is.

Telecommuting is when people work form their homes and make use of computer technology to
communicate with clients and run their business smoothly

How would employees abuse telecommuting?

-People will not be entirely focused on the task that needs to be completed.
-Productivity levels can drop because the focuses are based on other matters.
-Misused of company resources for personal use.
-Incorrect claiming of hours/resources, etc.

* Malware consists of a number of different forms of software such as spyware. Briefly explain how a
keylogger works AND how you would protect yourself when making an online transaction.

A keylogger records keystrokes to obtain password or personal information and being send to a third
party without your knowledge.
Making use of the onscreen keyboard and number pad.

* In today’s way of living, people are faced with information overload.


Give TWO practical ways in which one can use technology to reduce the problem of information
overload.

Learn to read faster and accurate, and to be able to identify keyboards concepts in what your read/
Learn to analyse and compare resources / Approach information in an orderly and discipline manner /
Use RSS feeds / Filter e-mails / Learn to use search tools effectively

* You believe that the responsible and educated use of technology promotes personal freedom and a

1
Social Implications

healthy environment for economic growth.


Give ONE example of a common Internet scam.

-E-mail lottery scam (e.g. you are a lucky winter ….)


-Phishing scams asking for Internet banking logon particulars.
-Advance fee fraud (the victim is asked to transfer money upfront)
-A 419 scam, etc.

* State ONE typical way in which your computer may be misused by cybercriminals if they use your
computer as part of their botnet.

-Spamming
-Distributed Denial-of-Service Attacks
-Brute-force dictionary attacks on servers
-Unauthorised banner display
-Click jacking, etc.

* State ONE way in which RSI can be prevented

-Use ergonomic input devices


-Type using a natural wrist position
-Sit up straight
-Take regular breaks, etc.

* Describe TWO potential negative effects that the use of social networks can have on people.

-You may start thinking acquaintances on social networking sites are you real friends.
-Dangers of cyber-stalking/cyber-bullying
-Danger of online predators/paedophiles
-Someone you do not know may monitor your online presence and to benefit from it to your
disadvantages
-Social networks are very addictive, etc.

* Passwords are important for protecting users when accessing websites.


State TWO strategies or techniques you can use to create or manage strong passwords.

2
Social Implications

-Keep your password length as long as possible


-Make sure passwords do not contain recognisable words
-Never use the same password for more than one domain/services
-Your password should contain a mix of uppercase and lowercase letters, numbers and special
characters.
-Encrypt your passwords
-Make use of password management systems/software, e.g. KeePass, LastPass, etc.

* Name One legally acceptable use of a file-sharing application, such as BitTorrent.

May be used for legal downloads, e.g. open-source software


May be used to distribute documents or other files on which no copyright is applicable, etc.

* Give your opinion regarding the following statement by giving TWO reasons for examples to support
your answer:
“The Internet offers its users some privacy”

Answers relating to a lack of privacy:


Cookies
Facial recognition
Logging of IP addresses
Location-based services
Targeted advertising
Data surveillance, etc.
AND/OR
Answers relating to protecting one’s privacy:
The use of proxy servers
Cleaning browsing history
Encryption
The use of a VPN
Browser options such as ‘Incognito’ mode and Do Not Track (DNT), etc.

3
Social Implications

* What is the general term given to any attempt to manipulate or trick a user into giving away
confidential information such as passwords?

Social engineering

* ICT makes telecommuting or teleworking possible.


Describe what telecommuting is.

Doing/Conducting work over the Internet/network without having to physically go to an office

* Give TWO possible reasons why you think telecommuting is not as popular in South Africa as in other
countries.

-Infrastructure such as telephone lines ,cellular towers, etc. is not available in some parts of the country
-Employees do not have the necessary knowledge experience
-Internet connectivity is still relatively expensive
Internet connectivity is not stab le/bandwidth not adequate in all parts of the country
May be costly for the employer to invest in the necessary infrastructure, etc.

* What is the meaning of the term hacking?

Gaining unauthorised access to/Identifying security holes in an ICT system/network

* Information overload is becoming an increasing problem in society.


State TWO practical ways in which one can use technology to reduce the problem of information
overload in one’s life.

-Using technology for efficient filing, daily planner, favourites, etc.


-Refining/Filtering/Reducing information e.g. filtering e-mails, establishing trusted sources of
information, RSS feeds, not subscribing to too many sites, etc.
-Effective searching skills e.g. advanced search functions of browsers

* Give a definition for grid computing

The technology that combines the processing power of multiple networked computers to achieve a
specific task

* State TWO operating settings that can be changed to improve battery life by saving power on a
portable computer.

4
Social Implications

-Turn off display/hard disk automatically after a period of time


-Put the computer to sleep automatically after a period of time
-Turn on Wireless Adapter Maximum Power Saving
-Turn down the brightness of the screen
-Battery/Power schemes/settings
-Switch off any unused communication mediums/features such as Bluetooth, GPS or Wi-Fi
Disable any start-up programs
[Note to marker: Do not accept a power-saving technique that does not involve modifying operating
system, settings, e.g. switching off the laptop when not in use, etc.]

* State TWO different actions that would make someone guilty of piracy in an ICT context

-Using unlicensed software/Performing illegal downloads of copyrighted material


-Violating licensing agreement of software/Installing software on more machines than you have
licences for
-Bandwidth piracy
-Not paying when using services that require an online subscription
-Copying and selling media such as movies on DVD/software, etc.

* Give advice to someone who cannot afford a fully licensed copy of the Window 8.1 operating system
by giving TWO possible legal solutions to this problem.

-Use/Install Linux/FOSS/Free Open source operating system


-Find out about academic/student/workplace discount or version
-Get a less expensive version of Windows
-Inquire about a downgraded licence/option, etc.
[Note to marker: Do not accept responses outside of the ICT context, e.g. get a decent job. Do not
accept any illegal options such as pirating etc. Accept trial version]

* Suggest TWO ways to make it easier for people with poor eyesight to use a website.

-Make use of the ‘alt’ HTML tag for images (or any other features that make the website more easily
interpreted by text-to-speech software)
-Text-to-speech software/ “Narrator”
-Make use of sound files, e.g. for navigation/feedback

5
Social Implications

-Enlarge fonts/Use of theme fonts/magnifier


-Use suitable colour contrasts/schemes, etc.
[Note to marker: Do not accept Braille keyboard]

* Briefly explain what information overload is AND how it affect productivity specifically

There is too much data/information to process sensibly/make sense of


The user does not know how to respond to the large volume of information/data
The user cannot cope with the amount of information/data
AND
Time is wasted trying to make sense of the data
The user is less productive
Easily distracted

* Technology is neither all good, nor is it all bad.


Give one benefit and one disadvantage on the use of technology in the field of education.
Distinguish clearly between the benefit and the disadvantage in the answer.

Benefit: ICT improves access to information and resources.


This is a very broad statement. Accept valid examples in these and other areas-
-Currency (up-to-date information/resources, for both teachers and learners)
-Collaboration (removal of geographic boundaries, sharing resources and best practices, cross-cultural
exchanges, etc.,)
-Cost-effectiveness (limit the use of paper, etc.)
-Potentially higher quality instruction (use of video lessons/tutorials)
-Remedial and high-end teaching (ICT is good for interventions, drill work, self-paced study, etc.)
-Administration (reporting, record keeping, planning, budgeting, etc.)
Disadvantages:
-Expectation/requirement of higher educational qualifications for entry into the job market
-Implications of the ‘digital divide’: those on the ‘wrong’ side of the divide are now at an even bigger
disadvantage.
-Cost factors – initial costs, maintenance, security
-Teachers need to upgrade skills/’resistance to change’ factor
-Home languages (and locale-specific conditions generally) may not always be catered for in (imported)
application packages.

6
Social Implications

* Theft of hardware is often the least harmful type of theft involving computers.
Briefly describe TWO other types of theft that can be committed by using computer technology

(except hardware theft)


-Bandwidth/ cap-watch videos/ movies online, big downloads, etc.
-Identity theft – use of computers to impersonate others, phishing, etc.
-Money – by means of card-skimming, phishing, hoaxes, etc.
[Often as a consequence of identity theft, but accept for 2nd mark if adequately differentiated from it]
-Processing time and power – use of office computers for private purposes, etc.
-Data / intellectual property – financial information, trade secrets, plagiarism, etc.
-Piracy – use of computers for illegal downloads, duplication of CDs and DVDs, etc.

* Green computing is a term used to describe computer usage that is sensitive to the environment.
Briefly explain how the use of digital communications has the potential to contribute to green
computing.

-Less printing – cut down on paper, ink


-Less travelling (i.e. more telecommuting) – cut down on vehicle emissions, etc.
-Lower ( physical) storage and other infrastructure requirements that can have a negative impact on
environment, etc.

Give one way in which we can limit the amount of electricity we use when working with computers.

Switch off (monitors, devices, chargers, etc.) when not in use


Use power-saving features (‘sleep’ and ‘hibernation’ modes, etc.)
[Accept specific examples for e.g. smartphones
Dim screen brightness
Keep screen timeout short
Disable Bluetooth, Wi-Fi, GPS, 3G/4G (when not in use)
Don’t leave apps running in the background – close unnecessary ones
Don’t use vibrate
Turn of non-essential notifications
Turn off ‘push’ e-mail – i.e. change setting to ‘fetch’ e-mail instead
Don’t leave phone in sunlight/warm environments (battery runs out sooner)]

7
Social Implications

Briefly explain why you should not throw an old (but still working) printer in the rubbish, AND give
one suggestion what to do with this printer that would be environmentally more acceptable.

Printers contain harmful chemicals/materials that can cause environmental damage.


Recycle the printer properly/donate to someone who could use it.

* Give one output device that people who suffer from poor eyesight or blindness could use to help
them use a computer more easily.

Magnification device
Braille printer
Speaker/headphones (for e.g. text-to-speech)
Braille ‘display’
[Do not accept any type of keyboard or other INPUT device)

* Some sites allow you to log in with Facebook instead of registering directly on the site.
Briefly explain the benefit of this for Facebook.

It allow Facebook to get more information about its users for marketing purposes
[Purpose of marketing/financial gain/reward must be present for the mark]

* A popular service that runs on the Internet is Instant Messaging (IM)


Explain why IM communication is less likely to be used for criminal activities, such as cyber-bullying
and identity theft, than more general online chat facilities.

There has to be an ‘acceptance’ by the user of another as an IM contact/Cannot stay anonymous

Describe one other disadvantage associated with all real-time messaging systems, other than the risk
of criminal activities such as those listed in Question above.

-Can be used to spread malware (accept suitable example)


-Constant distraction
-Can lead to anti-social behaviour (stop talking with people on face-to-face basis)

* Give ONE example of a popular IM application

WhatsApp / Skype / Twitter / BBM / SnapChat / WeChat / Gtalk or hangouts / KiK / Viber / Windows
Live Messenger / Facebook messenger / Yahoo! Messenger etc.

8
Social Implications

* One often sees advertisements for anti-virus software (e.g. Norton, Kaspersky, AVG), but one hardly
ever finds an advertisement for firewall software.
Describe the difference in functioning between anti-virus software and firewall software that would
account for this difference in advertising or marketing

Anti-virus software detects viruses based on the virus/signature/definitions it has at its disposal, so it
needs to be updated to combat new virus strains.
A firewall work on a set of rules that can set to allow/prevent programs access to and from the Internet
and therefore does not need updating.

* Accessing a number of people’s computers remotely to use their processing time and power can be
regarded either as a positive exercise or as a criminal activity.
Discuss the above statement, by giving ONE beneficial or constructive example of this type of usage,
and ONE example of using it for criminal purposes.
Also give the correct technical terms used to describe or categorise each of these activities in general.

Grid computing
Any ONE suitable example such as solving complex mathematical problems etc.
Botnet/Zombies
Any ONE suitable example such as denial of service attacks etc.

* Many companies ban or restrict the use of flash drives.


Motivate why they sometimes do this by referring to a practical reason they might have, besides the
risk of spreading malware such as viruses.

Any answer relating to removal of data/information


Bringing unauthorised software (incl. games, videos, etc.) to load and use without permission on
company computers, thereby wasting company time / loss or productivity.

* Green computing is becoming an increasingly important issue in ICT


State ONE way in which one can responsibly dispose of an old laptop battery.

-Send the battery for recycling/-waste collection


-Take it back to the manufacturer/reseller
-Trade in for a new one

State TWO ways in which computer technology can be used to protect the environment.

-Paperless office helps reverse deforestation


-Tracking endangered species

9
Social Implications

-Power management, more efficient use of scarce resources.


-Monitoring issues such as climate change change/pollution/carbon emission, etc.

Give ONE example of the use of computer technology that has a negative effect on the environment,
other than the disposal of batteries.

Any ONE:
-E-waste pollution such as dumping old computer equipment
-Energy wastage such as not shutting down workstations when not in use/not using energy efficient
equipment
Wasting paper, etc.
[Note to marker: Accept any suitable response related to the above]

* Give the term for the practice when somebody, for example, opens a Facebook account using
another person’s details.

Identity theft/Fraud/Impersonation

* Phishing is a world-wide problem.


State TWO ways to identifying a possible phishing attack.

-The e-mail address is suspicious, e.g. such as absa@gmail.com or support@paypal.cfoo not from your
bank
-The e-mail writer wants you to follow a link, but does not address you by your name/surname.
-Inconsistencies e.g. spelling, grammar, incorrect language used, formatting, images instead of text
-Requested to give out/verify confidential information
-Hover the cursor over the hyperlink to see if it points to the expected website, etc.

Suggest TWO possible ways in which to prevent or combat phishing on receipt of such an e-mail.

-Close/Delete the e-mail


-Do not follow any links in an e-mail as a general rule/Do not give out personal information
-Report the e-mail as phishing
-Blacklist/Block the particular e-mail address
-Call/Contact company to verify, etc.

* Give ONE example of how downloading copyrighted material without permission could affect the
owners or creators of the material.

10
Social Implications

Loss of revenue/income
Job losses/Collapse in the relevant industry
Poor quality products might damage the owner’s reputation

* Keylogger software forms part of a larger group of dangerous, unwanted software called spyware.
Briefly explain what keylogger software does on a computer.

It records keystrokes (to monitor what you are typing, obtain passwords, etc.)

Give ONE way in which you can prevent your computer from becoming infected with spyware.

-Do not click on links in pop-up windows, suspect websites, etc.


-Use software to protect against pop-ups (e.g. web browser settings, anti-virus programs)
-Do not open attachments/run programs/install software unless you are sure of what they are

* Give TWO tips on how to prevent eye strain when using a computer for long periods of time

-Take regular breaks (stand up, look away from the screen, etc.)
-Ensure correct ambient lighting in the location (enough light, not directly on screen, no reflections, etc.)
-Ensure correct brightness/contrast settings of screen, use zoom/magnification features of applications
-Use alternate input/output methods (e.g. voice recognition software(for input), text to speech software
(for output)
-If you have prescription spectacles for computer work, use them.

* In order to minimise our ‘carbon footprint’ and conserve the environment, we should try to print as
little as possible.
Give ONE way in which we can use less ink or toner, apart from making fewer printouts.

(except making fewer printouts):


-Use a lower resolution to print/draft mode/’economode’
-Remove bold/shading/colour/borders/gridlines etc. before printing in draft mode

Give TWO tools of methods we can use to ensure that word processing documents are error-free
before they are printed (and therefore do not need to be reprinted)

-Use built-in software tools (e.g. Spelling & Grammar checker)


-Proofread
-Collaborate with others (using track changes, comments, highlighting, etc.

11
Social Implications

* Give TWO input devices that can be used to help visually disabled or blind persons enter data into a
computer.

-braille keyboard
-large-key keyboard
-microphone [do not accept ‘voice recognition software’, since this is not a device]

* Give ONE way in which organisations and businesses can seek to overcome the Digital Divide

-Provide/organise (low cost) tuition


-Donate equipment to poorer communities
-Provide hardware/software at reduced prices
-Lobby government to provide infrastructure/resources
-Sponsor initiatives to upgrade relevant services, communication links, etc.

* Name TWO potential physical health problems cause by frequent use of ITC’s

-RSI/CTS
-Obesity
-Blood circulation problems
-Poor eye-sight
-Backache, etc.

* Study the screenshot below and answer the questions that follow.

Which TWO elements in this e-mail may have been the reason why the service provider identified
the e-mail as spam?

-Domain name
-E-mail address known for spam / Others users have tagged it as spam

12
Social Implications

-Typical combination of words from known examples of spam triggered it in the header or content, e.g.
‘has been credited’

Why can this e –mail also be regarded as phishing?

There is a hyperlink potentially requesting personal information.

Suggest THREE ways in which you should deal with e-mails of this nature

-Delete/Ignore the e-mail


-Report (as phishing)
-Do not follow any hyperlinks
-Do not reply to the e-mail
-Call the company/SARS/Institution to verify
-Do not provide any information asked for in the e-mail, etc.

* State TWO advantages of telecommuting.

-Workers can work from any place, e.g. home


-Spend less time traveling
-Potentially less cost to the company e.g. Company does not have to rent an office/work space,
traveling costs, etc.
-Environmental benefits, e.g. less traffic on the road/less emissions from cars.
-Flexible working hours, etc.

* Information and Communications Technology is often criticised as being very expensive for
companies.
Mention TWO ways in which ICT can increase the running costs of a company, besides the initial
purchases of hardware and software.

-Cost related to the need to hire extra staff/outsource functions


-Costs related to maintenance -Costs related to insuring IT equipment
-Costs related to upgrades -Costs related to training
-Costs related to consumables
-Costs related to data communications/cap etc.
-Costs related to ancillary building requirements, e.g. aircon and security

13
Social Implications

Outline TWO practical ways in which ICT could save a company money.

-Save on the cost of paper because of electronic versions


-Save on communication costs by using VolP technologies/Skype
-Save on advertising costs using the Internet
-Save on labour with need to employ fewer employees
-Can work 24/7/365, which lead to improved production
-Save on banking charges and other financial transactions
-Save on rental space with no needs for large premises etc.

* These days, many people suffer from ‘information overload’


Give TWO strategies that can help prevent information overload.

-Learn to read quickly and to identify key points


-Learn to analyse & compare sources of info
-Take a disciplined/structured approach to dealing with info
Accept specific example e.g.
Create a fixed routine / allocate specific time to dealing with info
Remove distractions (e.g. IM, tweets, browsing Web)
Filter e-mail /create ‘categories’, etc.
Use RSS feeds, Use search tools property (advanced searches, good keywords, etc.)

* The main speaker at an ICT careers evening at the school used the word ‘telecommuting’ several
times.
Briefly explain the meaning of the term telecommuting, as it applies to today’s job market.

‘Commuting’ (traveling) to work simply by connecting to the Internet or network, without having to
travel to and from an office

Give ONE benefit of telecommuting

-Save travelling costs


-Save travelling time
-Increase in worker productivity
-Easier for people who need to be mobile (e.g. sales reps) to keep in touch
-Reduces traffic congestion and pollution

14
Social Implications

* Give a brief definition of the term social engineering, in the context of computer crime

Any attempt to manipulate or trick someone into revealing information like passwords or account
numbers, which can then be used to impersonate them (for fraudulent purposes)
[Also accept a suitable example/scenario, e.g. description of phishing, providing that the essential
concept of manipulation/tricking into disclosure of sensitive information, and impersonation, are both
present]

* Mention TWO ways in which one can minimise the possibility of being affected by computer related
health risks.

-Take regular breaks


-Use ergonomically designed equipment
-Sit comfortable with the correct posture
-Work in a well-lit and well ventilated room, etc.

* Suggest One eco-friendly way of disposing of old computer

-Call on a recycling company to take care of it


-Dump in dedicated bins in supermarkets

* Name ONE way in which we should NOT disposing of an old computer

Do not throw it in the rubbish bin/dump

* List TWO possible items that can be included in the AUP for you school network

-No one is allowed to look at other people’s work


-No use of Internet during working hours
-No infecting of computers with viruses
-Etc.

* Explain what is meant by


Spoofing

It is the forgery of an e-mail header so that the e-mail appears to be from a different origin (or person)

Crowd funding

Process where a single idea or business practice is funded by multiple small donations from volunteer
contributors, usually before the business venture is started. The contributors will then receive the

15
Social Implications

product when it is finally put into production.

* Name the principle or give the acronym that describes how human error or invalid data effects the
quality and accuracy of output.

GIGO

* Many websites insist that you use a strong password.


State TWO properties or characteristics of a strong password.

Use a mixture of letters, numbers, characters


Use a mixture of uppercase and lowercase characters
The ‘longer’ the password the better/Have a minimum of e.g. 8 characters
Not an easily identifiable item such as a cell phone number
Do not use personal information such as a birth date, name or surname

* Name a feature of instant messaging applications or social networks that can help reduce online
harassment or bullying.

Blocking/Blacklisting/’Unfriend’ option

* State ONE potential negative or consequence of using pirated software.

May have malware (Viruses/Trojans, etc.)


Can be charged for fraud/’go to jail’
Reduced functionality/Bugs
Affects the revenue for developers, etc.

* State TWO indications that might suggest that an e-mail is a phishing e-mail.

The e-mail address appears suspicious, e.g. strange domain name


Request to follow the link to supply additional information
A tone of urgency to comply with the request
Link inspection reveals a ‘strange’ web-address
The e-mail has spelling errors – unlikely to have come from a reputable institution
E-mail is from an unknown source, etc.

16
Social Implications

* You need to send a small program (.exe) file as an e-mail attachment but the e-mail program reports
that it cannot accept .exe files.
What is the most likely reason why e-mail programs are set up to reject or block program or
executable (.exe) files?

Potentially contains malware

Suggest a way to trick the e-mail program into accepting this file as an attachment.

Change file extension (to a non-executable)


Put the .exe file into an archive/encrypt the file/zip file
Paste as an object in another file
Adjust e-mail server/client setting to accept ‘exe’ files, etc.

What is the name given to the set of guidelines used when composing an e-mail such as ‘Do not send
very large attachments’?

Netiquette

* Keyboards and mice are standard input devices, but using them also has some disadvantages
and carries risks.
Explain how a keylogger can pose a security risk when installed on a computer.

A keylogger records keystrokes (possibly also mouse movements, and takes screenshots of display
on screen) [ = the software ‘action’ ] in an attempt to find usernames / passwords (and then send
this to third parties to commit identity theft) [ = the specific criminal intent ]

Normal keyboards and mice can be difficult to use for people who struggle to use their fingers.
Suggest an alternative input device or method for such people.

Ergonomic keyboard (large keys, or split in the middle)


Virtual on-screen keyboard (used in conjunction with pointing device)
Trackball
Joystick
Eye-controlled mouse movement devices
Voice recognition software
SNP (Sip-and-Puff) devices, etc.

* Explain what the term biometric refers to and why it is a more secure form of identification than the
use of passwords.

17
Social Implications

Biometric = technology used to measure / scan biologically unique characteristics of people (e.g.
fingerprints)

Difficult to bypass (because tied to a single person)


Cannot be written down or shared (as passwords can)
Always ‘strong’ (does not suffer from short or obvious passwords, etc.)

* We should all try to reduce our carbon footprint and contribute to green computing.
Give ONE print option that can be used to save paper, besides printing on both sides of the paper.

Print two (or more) pages per single sheet of paper.


Select which pages to print (i.e. not always necessary to print all pages in range).
Change paper orientation / size / margins.
[ Do not accept e.g. electronic circulation of documents (‘paperless office’) / not printing e-mail etc.,
as these are not printing options ]

Give TWO ways in which a computer user can contribute to green computing, besides reducing paper
usage.

(besides reducing paper usage)


Switch off computers / devices not being used.
Use power schemes to place hardware not in use in a lower power state, etc.
[ Not necessarily same as previous point ]
Dispose of hardware in an eco-friendly way (recycle properly / upgrade / repair /
donate / sell).
Use energy efficient equipment (accept specific examples).
Don’t throw away ink or toner cartridges, rather recycle / refill / return to manufacturer.
Use eco mode / economode / draft mode to save ink / toner when printing.

* Give TWO features that are available in a database program like Access that can help minimise
(reduce) the number of data entry mistakes.

Input mask, Combo Box / List Box


Default value, Primary Key (to ensure no duplicates or blanks)
Validation rule (and text), Index field property [set 'Yes (No Duplicates)' to prevent duplicates]

* Briefly explain how a website or service like Kickstarter.com works to financially benefit
entrepreneurs or start-up companies.

They provide money for start-up projects getting multiple small donations from the public (usually

18
Social Implications

via the Internet)

19
Social Implications

* The geotagging function of modern cameras is useful for holidaymakers and tourist.
Explain what this statement means by explaining what geotagging is.

Geotagging refers to including the position/GPS coordinates of where the photo was taken in the
metadata/with the file.

* State TWO general printing options that are provided in most programs, which can be used to
promote green computing.

Print multiple pages per sheet


Print only specific pages
Print preview to catch errors before final print
Print in grayscale
Print to file
Print ’back-to-back’/both sides of the pages
Print in draft/’econo’-mode

* Computers can be controlled remotely by criminals.


What is the general name of a group of computers that have been taken over and are being
controlled remotely by criminals?

Botnet(Bots)/Zombie army(Zombies)

Give One example of a criminal or malicious task these groups of computers may perform.

Phishing, Spamming, Pharming, Spreading malware e.g. Virus, Spyware, Ransomware, DDos
(Distributed denial of service) attacks, Illegal BitCoin mining.

* Give TWO potential disadvantages of e-learning when compared to the traditional classroom
approach, besides any cost factors.

Lack of access to technology/working hardware/Digital Divide


Lack of technology skills to unlock/maximise potential of e-learning
Potential lack of guidance/input/feedback/monitoring from teacher
Dependent on electricity/battery life
Feeling of being isolated/Lack of human contact/Contributes to lack of socialisation skills
Health-related concerns (“Long hours of sitting”)

20
Social Implications

* The more computers are used, the more they are used for crime.
Name ONE type of online harassment that can be experienced by learners.

Cyberstalking / cyberbullying

Briefly describe how a criminal uses phishing to commit computer crime.

Criminal tries to trick you, usually via e-mail, into visiting a fake website (look-alike of one
belonging to a legitimate organisation), and disclosing personal information such as PIN numbers
and passwords
Criminal then uses this information to impersonate you at the legitimate organisation, thereby
committing fraud

What specific type of malware is focussed on capturing confidential information such as your
login names and passwords?

Keylogger

* Explain why, if you are forwarding an e-mail to many people, it is better to add their addresses in
the Bcc field.

So that the message will not be seen as spam


So that you do not disclose people’s e-mail addresses to many other people

21
Social Implications

* Briefly explain how computer technology can have a beneficial effect on cultures and languages.

People can record / communicate / share / promote positive aspects of their own (and other)
cultures and languages

* Why is it so important to set your privacy settings when using a social networking site such as
Facebook?

To limit, or specify, who can view your information (including photos and posts)
To set who can post to your wall
To set who can contact you / send you friend requests
To set who can look you up (using your e-mail address and phone number)

* Explain why a mobile computing device does not require a UPS.

A UPS is designed for desktop computer systems, to protect a computer against power
abnormalities (power outages / surges / spikes), and not for mobile devices which receive a supply
of electricity from the battery

* Give ONE indication that might suggest that an e-mail might be a hoax.

Offer of unexpected, free or ‘too good to be true’ services / goods / rewards


You are requested to contact someone, or to follow a link
The sender is unknown to you / suspicious e-mail address
Personal tone from someone who is a stranger – attempt to ‘play on your feelings’
E-mail is not addressed to you personally, but to e.g. ‘undisclosed recipients’
Spelling and/or grammatical errors, etc.

* Why would keylogger software not have any harmful effects if it is installed on a computer that
is never networked or connected to the Internet?

The confidential information that was collected cannot be sent back to the creator of the malware.

* Green computing is every user’s concern.


What is meant by the term green computing?

Using computers in a way that is not harmful to the environment.

Give TWO reasons why unwanted or disused ICT devices should NOT be thrown into a rubbish

22
Social Implications

bin.

It contains poisonous materials


It requires more and more land to be allocated to rubbish heaps
It can cause health issues for humans and animals
It can pollute water and soil

* State TWO potential ways in which telecommuting can be of benefit to an employer ( a business
owner)

Do not need large premises


Employees can work flexi-time (24/7) if need bee
Less need for expensive equipment/features to improve working conditions (like coffee machine)
Reduces carbon footprint for the company

* Explain what phishing is AND why updating your antivirus program will not prevent you from
becoming a victim of phishing.

Phishing is any attempt to trick a user into giving out sensitive information
Humans make the attempt by sending out e-mails/There is no set program/code for the anti-virus
program to recognise

* State TWO ethical considerations to keep in mind when connecting to someone else’s Internet
connection.

Do not use a lot of data/Do not download too much/Ask how much data may you use
Do not visit sites which could potentially endanger the security of the computer
Not visiting sites inappropriate content sites
Not downloading inappropriate content
Ask each time before you use the connection

23

You might also like