UNIT 7
Rules of Computer Misuse Act
-Designed to prosecute hackers who gain access to computer systems without consent -Software developers should not create programs that are capable of gaining unauthorized access to other programs or data. -Unauthorized modification of computer material
Rules of Data Protection Act
-The data must be up to date and accurate -You have the right to see what data is held about you -The data must be protected from unauthorized access
cloud computing disadvantages
1. Cloud Computing is dependent on Internet Access. 2. May not get all the features. Not all cloud services are the same. Some cloud providers tend to offer limited versions and enable the most popular features only, so you may not receive every feature or customization you want. 3. If the server fails you don't have access to your things 4. You can get hacked
cloud computing advantages
1. Environmentally friendly 2. Large memory storage 3. Access from multiple devices 4. No hardware required
Digital Technology environmental impacts
Advantages: -Using email and working electronically means less printing and also less paper used. -Using Skype or Facetime you can reduce the need for people to travel to meet each other.(less fuel used) -People can work from home (less fuel used) Disadvantages: -Technology consumes energy. Computers require electricity and mos smartphones and tablets need to be recharged after a while -Technological waste -> contains poisonous chemicals and can be an environmental hazard (can leach into water supplies of developing countries)
Examples of artificial intelligence
Driver-less cars Smart homes Language translation
What is artificial intelligence?
It can be a tool, a robot, a device that collects data to use it on a future incident. Learning from every mistake in order to improve.
Copyright, Designs and Patents Act
This law protects people's original work from being used without their permission
Computer Misuse Act
This law restricts people from accessing or modifying data without permission. Primarily designed to prevent hacking of programs or data.
Data Protection Act
UK law that governs the collection and use of personal data. This law regulates how personal information is used and protects against misuse of personal details.
Rules of Copyright, Designs and Patents Act
You cannot: - pass a copy to a friend -make a copy and then sell it -use the software on a network unless the license allows it
Cloud Computing
the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.