UNIT 7

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Rules of Computer Misuse Act

-Designed to prosecute hackers who gain access to computer systems without consent -Software developers should not create programs that are capable of gaining unauthorized access to other programs or data. -Unauthorized modification of computer material

Rules of Data Protection Act

-The data must be up to date and accurate -You have the right to see what data is held about you -The data must be protected from unauthorized access

cloud computing disadvantages

1. Cloud Computing is dependent on Internet Access. 2. May not get all the features. Not all cloud services are the same. Some cloud providers tend to offer limited versions and enable the most popular features only, so you may not receive every feature or customization you want. 3. If the server fails you don't have access to your things 4. You can get hacked

cloud computing advantages

1. Environmentally friendly 2. Large memory storage 3. Access from multiple devices 4. No hardware required

Digital Technology environmental impacts

Advantages: -Using email and working electronically means less printing and also less paper used. -Using Skype or Facetime you can reduce the need for people to travel to meet each other.(less fuel used) -People can work from home (less fuel used) Disadvantages: -Technology consumes energy. Computers require electricity and mos smartphones and tablets need to be recharged after a while -Technological waste -> contains poisonous chemicals and can be an environmental hazard (can leach into water supplies of developing countries)

Examples of artificial intelligence

Driver-less cars Smart homes Language translation

What is artificial intelligence?

It can be a tool, a robot, a device that collects data to use it on a future incident. Learning from every mistake in order to improve.

Copyright, Designs and Patents Act

This law protects people's original work from being used without their permission

Computer Misuse Act

This law restricts people from accessing or modifying data without permission. Primarily designed to prevent hacking of programs or data.

Data Protection Act

UK law that governs the collection and use of personal data. This law regulates how personal information is used and protects against misuse of personal details.

Rules of Copyright, Designs and Patents Act

You cannot: - pass a copy to a friend -make a copy and then sell it -use the software on a network unless the license allows it

Cloud Computing

the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.


Ensembles d'études connexes

Round 4 (Valley Forge and Saratoga)

View Set

Lifespan Development - Chapter 13

View Set

MGMT 10, MGMT 13, MGMT 11, MGMT 12

View Set

Med Surg: Chapter 44: Nursing Management: Patients With Oncologic Disorders of the Brain and Spinal Cord

View Set