Social Implications
Social Implications
SOCIAL IMPLICATIONS
* In a computer environment, for example in a computer lab at school or in the public library, it is
necessary to have an acceptable user policy (AUS)
Give TWO criteria that must be included in the AUP
* Telecommuting opportunities are great for single parents and people with physical disabilities.
Describe what telecommuting is.
Telecommuting is when people work form their homes and make use of computer technology to
communicate with clients and run their business smoothly
-People will not be entirely focused on the task that needs to be completed.
-Productivity levels can drop because the focuses are based on other matters.
-Misused of company resources for personal use.
-Incorrect claiming of hours/resources, etc.
* Malware consists of a number of different forms of software such as spyware. Briefly explain how a
keylogger works AND how you would protect yourself when making an online transaction.
A keylogger records keystrokes to obtain password or personal information and being send to a third
party without your knowledge.
Making use of the onscreen keyboard and number pad.
Learn to read faster and accurate, and to be able to identify keyboards concepts in what your read/
Learn to analyse and compare resources / Approach information in an orderly and discipline manner /
Use RSS feeds / Filter e-mails / Learn to use search tools effectively
* You believe that the responsible and educated use of technology promotes personal freedom and a
1
Social Implications
* State ONE typical way in which your computer may be misused by cybercriminals if they use your
computer as part of their botnet.
-Spamming
-Distributed Denial-of-Service Attacks
-Brute-force dictionary attacks on servers
-Unauthorised banner display
-Click jacking, etc.
* Describe TWO potential negative effects that the use of social networks can have on people.
-You may start thinking acquaintances on social networking sites are you real friends.
-Dangers of cyber-stalking/cyber-bullying
-Danger of online predators/paedophiles
-Someone you do not know may monitor your online presence and to benefit from it to your
disadvantages
-Social networks are very addictive, etc.
2
Social Implications
* Give your opinion regarding the following statement by giving TWO reasons for examples to support
your answer:
“The Internet offers its users some privacy”
3
Social Implications
* What is the general term given to any attempt to manipulate or trick a user into giving away
confidential information such as passwords?
Social engineering
* Give TWO possible reasons why you think telecommuting is not as popular in South Africa as in other
countries.
-Infrastructure such as telephone lines ,cellular towers, etc. is not available in some parts of the country
-Employees do not have the necessary knowledge experience
-Internet connectivity is still relatively expensive
Internet connectivity is not stab le/bandwidth not adequate in all parts of the country
May be costly for the employer to invest in the necessary infrastructure, etc.
The technology that combines the processing power of multiple networked computers to achieve a
specific task
* State TWO operating settings that can be changed to improve battery life by saving power on a
portable computer.
4
Social Implications
* State TWO different actions that would make someone guilty of piracy in an ICT context
* Give advice to someone who cannot afford a fully licensed copy of the Window 8.1 operating system
by giving TWO possible legal solutions to this problem.
* Suggest TWO ways to make it easier for people with poor eyesight to use a website.
-Make use of the ‘alt’ HTML tag for images (or any other features that make the website more easily
interpreted by text-to-speech software)
-Text-to-speech software/ “Narrator”
-Make use of sound files, e.g. for navigation/feedback
5
Social Implications
* Briefly explain what information overload is AND how it affect productivity specifically
6
Social Implications
* Theft of hardware is often the least harmful type of theft involving computers.
Briefly describe TWO other types of theft that can be committed by using computer technology
* Green computing is a term used to describe computer usage that is sensitive to the environment.
Briefly explain how the use of digital communications has the potential to contribute to green
computing.
Give one way in which we can limit the amount of electricity we use when working with computers.
7
Social Implications
Briefly explain why you should not throw an old (but still working) printer in the rubbish, AND give
one suggestion what to do with this printer that would be environmentally more acceptable.
* Give one output device that people who suffer from poor eyesight or blindness could use to help
them use a computer more easily.
Magnification device
Braille printer
Speaker/headphones (for e.g. text-to-speech)
Braille ‘display’
[Do not accept any type of keyboard or other INPUT device)
* Some sites allow you to log in with Facebook instead of registering directly on the site.
Briefly explain the benefit of this for Facebook.
It allow Facebook to get more information about its users for marketing purposes
[Purpose of marketing/financial gain/reward must be present for the mark]
Describe one other disadvantage associated with all real-time messaging systems, other than the risk
of criminal activities such as those listed in Question above.
WhatsApp / Skype / Twitter / BBM / SnapChat / WeChat / Gtalk or hangouts / KiK / Viber / Windows
Live Messenger / Facebook messenger / Yahoo! Messenger etc.
8
Social Implications
* One often sees advertisements for anti-virus software (e.g. Norton, Kaspersky, AVG), but one hardly
ever finds an advertisement for firewall software.
Describe the difference in functioning between anti-virus software and firewall software that would
account for this difference in advertising or marketing
Anti-virus software detects viruses based on the virus/signature/definitions it has at its disposal, so it
needs to be updated to combat new virus strains.
A firewall work on a set of rules that can set to allow/prevent programs access to and from the Internet
and therefore does not need updating.
* Accessing a number of people’s computers remotely to use their processing time and power can be
regarded either as a positive exercise or as a criminal activity.
Discuss the above statement, by giving ONE beneficial or constructive example of this type of usage,
and ONE example of using it for criminal purposes.
Also give the correct technical terms used to describe or categorise each of these activities in general.
Grid computing
Any ONE suitable example such as solving complex mathematical problems etc.
Botnet/Zombies
Any ONE suitable example such as denial of service attacks etc.
State TWO ways in which computer technology can be used to protect the environment.
9
Social Implications
Give ONE example of the use of computer technology that has a negative effect on the environment,
other than the disposal of batteries.
Any ONE:
-E-waste pollution such as dumping old computer equipment
-Energy wastage such as not shutting down workstations when not in use/not using energy efficient
equipment
Wasting paper, etc.
[Note to marker: Accept any suitable response related to the above]
* Give the term for the practice when somebody, for example, opens a Facebook account using
another person’s details.
Identity theft/Fraud/Impersonation
-The e-mail address is suspicious, e.g. such as absa@gmail.com or support@paypal.cfoo not from your
bank
-The e-mail writer wants you to follow a link, but does not address you by your name/surname.
-Inconsistencies e.g. spelling, grammar, incorrect language used, formatting, images instead of text
-Requested to give out/verify confidential information
-Hover the cursor over the hyperlink to see if it points to the expected website, etc.
Suggest TWO possible ways in which to prevent or combat phishing on receipt of such an e-mail.
* Give ONE example of how downloading copyrighted material without permission could affect the
owners or creators of the material.
10
Social Implications
Loss of revenue/income
Job losses/Collapse in the relevant industry
Poor quality products might damage the owner’s reputation
* Keylogger software forms part of a larger group of dangerous, unwanted software called spyware.
Briefly explain what keylogger software does on a computer.
It records keystrokes (to monitor what you are typing, obtain passwords, etc.)
Give ONE way in which you can prevent your computer from becoming infected with spyware.
* Give TWO tips on how to prevent eye strain when using a computer for long periods of time
-Take regular breaks (stand up, look away from the screen, etc.)
-Ensure correct ambient lighting in the location (enough light, not directly on screen, no reflections, etc.)
-Ensure correct brightness/contrast settings of screen, use zoom/magnification features of applications
-Use alternate input/output methods (e.g. voice recognition software(for input), text to speech software
(for output)
-If you have prescription spectacles for computer work, use them.
* In order to minimise our ‘carbon footprint’ and conserve the environment, we should try to print as
little as possible.
Give ONE way in which we can use less ink or toner, apart from making fewer printouts.
Give TWO tools of methods we can use to ensure that word processing documents are error-free
before they are printed (and therefore do not need to be reprinted)
11
Social Implications
* Give TWO input devices that can be used to help visually disabled or blind persons enter data into a
computer.
-braille keyboard
-large-key keyboard
-microphone [do not accept ‘voice recognition software’, since this is not a device]
* Give ONE way in which organisations and businesses can seek to overcome the Digital Divide
* Name TWO potential physical health problems cause by frequent use of ITC’s
-RSI/CTS
-Obesity
-Blood circulation problems
-Poor eye-sight
-Backache, etc.
* Study the screenshot below and answer the questions that follow.
Which TWO elements in this e-mail may have been the reason why the service provider identified
the e-mail as spam?
-Domain name
-E-mail address known for spam / Others users have tagged it as spam
12
Social Implications
-Typical combination of words from known examples of spam triggered it in the header or content, e.g.
‘has been credited’
Suggest THREE ways in which you should deal with e-mails of this nature
* Information and Communications Technology is often criticised as being very expensive for
companies.
Mention TWO ways in which ICT can increase the running costs of a company, besides the initial
purchases of hardware and software.
13
Social Implications
Outline TWO practical ways in which ICT could save a company money.
* The main speaker at an ICT careers evening at the school used the word ‘telecommuting’ several
times.
Briefly explain the meaning of the term telecommuting, as it applies to today’s job market.
‘Commuting’ (traveling) to work simply by connecting to the Internet or network, without having to
travel to and from an office
14
Social Implications
* Give a brief definition of the term social engineering, in the context of computer crime
Any attempt to manipulate or trick someone into revealing information like passwords or account
numbers, which can then be used to impersonate them (for fraudulent purposes)
[Also accept a suitable example/scenario, e.g. description of phishing, providing that the essential
concept of manipulation/tricking into disclosure of sensitive information, and impersonation, are both
present]
* Mention TWO ways in which one can minimise the possibility of being affected by computer related
health risks.
* List TWO possible items that can be included in the AUP for you school network
It is the forgery of an e-mail header so that the e-mail appears to be from a different origin (or person)
Crowd funding
Process where a single idea or business practice is funded by multiple small donations from volunteer
contributors, usually before the business venture is started. The contributors will then receive the
15
Social Implications
* Name the principle or give the acronym that describes how human error or invalid data effects the
quality and accuracy of output.
GIGO
* Name a feature of instant messaging applications or social networks that can help reduce online
harassment or bullying.
Blocking/Blacklisting/’Unfriend’ option
* State TWO indications that might suggest that an e-mail is a phishing e-mail.
16
Social Implications
* You need to send a small program (.exe) file as an e-mail attachment but the e-mail program reports
that it cannot accept .exe files.
What is the most likely reason why e-mail programs are set up to reject or block program or
executable (.exe) files?
Suggest a way to trick the e-mail program into accepting this file as an attachment.
What is the name given to the set of guidelines used when composing an e-mail such as ‘Do not send
very large attachments’?
Netiquette
* Keyboards and mice are standard input devices, but using them also has some disadvantages
and carries risks.
Explain how a keylogger can pose a security risk when installed on a computer.
A keylogger records keystrokes (possibly also mouse movements, and takes screenshots of display
on screen) [ = the software ‘action’ ] in an attempt to find usernames / passwords (and then send
this to third parties to commit identity theft) [ = the specific criminal intent ]
Normal keyboards and mice can be difficult to use for people who struggle to use their fingers.
Suggest an alternative input device or method for such people.
* Explain what the term biometric refers to and why it is a more secure form of identification than the
use of passwords.
17
Social Implications
Biometric = technology used to measure / scan biologically unique characteristics of people (e.g.
fingerprints)
* We should all try to reduce our carbon footprint and contribute to green computing.
Give ONE print option that can be used to save paper, besides printing on both sides of the paper.
Give TWO ways in which a computer user can contribute to green computing, besides reducing paper
usage.
* Give TWO features that are available in a database program like Access that can help minimise
(reduce) the number of data entry mistakes.
* Briefly explain how a website or service like Kickstarter.com works to financially benefit
entrepreneurs or start-up companies.
They provide money for start-up projects getting multiple small donations from the public (usually
18
Social Implications
19
Social Implications
* The geotagging function of modern cameras is useful for holidaymakers and tourist.
Explain what this statement means by explaining what geotagging is.
Geotagging refers to including the position/GPS coordinates of where the photo was taken in the
metadata/with the file.
* State TWO general printing options that are provided in most programs, which can be used to
promote green computing.
Botnet(Bots)/Zombie army(Zombies)
Give One example of a criminal or malicious task these groups of computers may perform.
Phishing, Spamming, Pharming, Spreading malware e.g. Virus, Spyware, Ransomware, DDos
(Distributed denial of service) attacks, Illegal BitCoin mining.
* Give TWO potential disadvantages of e-learning when compared to the traditional classroom
approach, besides any cost factors.
20
Social Implications
* The more computers are used, the more they are used for crime.
Name ONE type of online harassment that can be experienced by learners.
Cyberstalking / cyberbullying
Criminal tries to trick you, usually via e-mail, into visiting a fake website (look-alike of one
belonging to a legitimate organisation), and disclosing personal information such as PIN numbers
and passwords
Criminal then uses this information to impersonate you at the legitimate organisation, thereby
committing fraud
What specific type of malware is focussed on capturing confidential information such as your
login names and passwords?
Keylogger
* Explain why, if you are forwarding an e-mail to many people, it is better to add their addresses in
the Bcc field.
21
Social Implications
* Briefly explain how computer technology can have a beneficial effect on cultures and languages.
People can record / communicate / share / promote positive aspects of their own (and other)
cultures and languages
* Why is it so important to set your privacy settings when using a social networking site such as
Facebook?
To limit, or specify, who can view your information (including photos and posts)
To set who can post to your wall
To set who can contact you / send you friend requests
To set who can look you up (using your e-mail address and phone number)
A UPS is designed for desktop computer systems, to protect a computer against power
abnormalities (power outages / surges / spikes), and not for mobile devices which receive a supply
of electricity from the battery
* Give ONE indication that might suggest that an e-mail might be a hoax.
* Why would keylogger software not have any harmful effects if it is installed on a computer that
is never networked or connected to the Internet?
The confidential information that was collected cannot be sent back to the creator of the malware.
Give TWO reasons why unwanted or disused ICT devices should NOT be thrown into a rubbish
22
Social Implications
bin.
* State TWO potential ways in which telecommuting can be of benefit to an employer ( a business
owner)
* Explain what phishing is AND why updating your antivirus program will not prevent you from
becoming a victim of phishing.
Phishing is any attempt to trick a user into giving out sensitive information
Humans make the attempt by sending out e-mails/There is no set program/code for the anti-virus
program to recognise
* State TWO ethical considerations to keep in mind when connecting to someone else’s Internet
connection.
Do not use a lot of data/Do not download too much/Ask how much data may you use
Do not visit sites which could potentially endanger the security of the computer
Not visiting sites inappropriate content sites
Not downloading inappropriate content
Ask each time before you use the connection
23