0% found this document useful (0 votes)
3 views

Unit 6 Checkpoints

The document discusses the environmental and health impacts of computing technology, including hazardous materials used in manufacturing and the dangers of e-waste. It outlines measures to reduce energy consumption and improve data privacy, as well as the importance of digital inclusion and professionalism in computing. Additionally, it touches on emerging trends such as artificial intelligence and nanotechnology.

Uploaded by

bf8pv266rs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Unit 6 Checkpoints

The document discusses the environmental and health impacts of computing technology, including hazardous materials used in manufacturing and the dangers of e-waste. It outlines measures to reduce energy consumption and improve data privacy, as well as the importance of digital inclusion and professionalism in computing. Additionally, it touches on emerging trends such as artificial intelligence and nanotechnology.

Uploaded by

bf8pv266rs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

Unit 6

The Bigger Technology


24: Computing and The Environmental Impact of
Technology
S1. Can you think of two hazardous substances that are used in the manufacture of
computing technology?

Two hazardous substances used in the manufacture of computing technology are:

Lead: used in the manufacture of circuit board

Mercury: used in the manufacture of LCD screens

S2. Why is dumping e-waste in landfill sites harmful to the environment?

Once a computer is dumped in a landfill site, some, not all, of these toxic substances
will leak out into the ground, contaminating water supplies, infiltrating the food chain
and polluting the air.
S3. List two ways of reducing the environmental damage caused by data centres. (Activity 2)

Measures that can be used to make data centres more environmentally friendly include:

reducing dependency on energy generated from fossil fuels by making more use of renewable
energy

locating them in regions where it’s cold most of the year, so that the a mount of energy needed
to cool down them down is significantly reduced.

investing in research to develop a new, less energy-hungry alternative to silicon-based data


storage.

ration Internet usage – possibly by imposing a tax on uploading data – and/or educate users so
that they behave in a more environmentally responsible fashion. Simply switching from colour to
black and white photos when uploading to social media sites would have a significant impact.
S4. List two ways in which computing technology is helping to preserve the
environment.

Ways in which computing technology is helping to preserve the environment


are
help to fight climate change,
provide disaster warning,
protect endangered species and habitats and
reduce energy consumption
C1. Summarised the health risks associated with the manufacture and disposal of computing
technology.

The health risks associated with raw material extraction and the manufacture

Arsenic, cadmium and chromium, are hazardous and pose a serious health sick

Radioactive metals such as uranium and thorium are toxic to human health

Poorly equipped miners working in dangerous conditions run the risk of being seriously injured. They
are also at risk of suffering long-term breathing illnesses, such as silicosis, bronchitis or lung cancer.

The health risks associated with disposal

E-waste that is not recycled properly can be serious health an environmental issue

People who do so risk exposure to hazardous materials such as mercury and lead and are in danger of
inhaling toxic fumes
C2. What are three ways in which computing technology can help to reduce energy consumption?

1. Real-time analysis of the room data enables automatic adjustment of electricity usage.

2. Computer-controlled motors adjust the position of the solar panels to optimize power generation.

3. Other ways that computing technology can help to reduce energy consumption include:

use of smart meters, thermostats, and sensors – part of the ‘Internet of things’ – to monitor energy

raising ‘energy awareness’ and reducing ‘energy wastage’

vehicle technologies such as adaptive cruise control that significantly reduce a vehicle’s fuel
consumption and emissions

use of GPS tracking, wireless communication and adaptive traffic control systems to ease traffic
congestion and improve journey efficiency, which – in turn – reduces fuel consumption

use of automation and process-control systems to make manufacturing processes more energy efficient

modifying the design of hardware to make computer technology more energy efficient

writing energy-efficient sorting and searching algorithms.


25: Privacy
Activity 9
• Though online data breaches, personal and financial details stored by a
company can be stolen. In pairs, research the implications of this breach for
both the customers and the company.
• Details can be stolen such as email addresses, bank details and – in some
cases – encrypted credit card details.
• There can be a huge public backlash. Customers, not surprisingly, blame
the company for not having adequate security measures in place.
• Affected customers are put at increased risk of identity theft and should
inform their bank and credit card company, monitor account activity
closely and check their credit rating to make sure nobody applied for credit
in their name.
• The company suffers both damage to its reputation and considerable
financial loss, as customers opt to take their business elsewhere.
S1. Can you think of two ways in which an individual’s personal data could end up
stored in database owned by a third party?
The personal data is stored on servers that belong to online services, such as
Facebook and Google, not to you.

S2. What might happen if personal information falls into the wrong hand?
Weak security could result in personal information falling into the wrong hands.
This makes people vulnerable to phishing attacks, scams, identity theft and fraud.
S1. Can you think of two ways in which an individual’s personal data could end up stored in
database owned by a third party?
The personal data is stored on servers that belong to online services, such as Facebook and
Google, not to you.
S2. What might happen if personal information falls into the wrong hand?
Weak security could result in personal information falling into the wrong hands.
This makes people vulnerable to phishing attacks, scams, identity theft and fraud.
S3. List two privacy-enhancing tools and describe what they do.
1. Encryption : Prevents unauthorized people from reading your data.
2. Password manager: Stores all your website login information in an encrypted
password database.
C1. Why do some people decide that the benefits of revealing personal information about
themselves are worth the disadvantages?
One reason why so many people give away information about themselves is that it enables
or organization to understand their need better and provide them with a more
personalized service.
This might lead to the individual experiencing identity theft illegally accessing personal
information through social engineering.
C2. Can you think of a situation where the right to privacy is less important than the needs
of society?
Obvious situations in which an invasion of privacy may be justified are those associated
with keeping society safe from crime, improving road safety and protection of key
installations such as nuclear power stations.
C1. Why do some people decide that the benefits of revealing personal information about
themselves are worth the disadvantages?
One reason why so many people give away information about themselves is that it enables
or organization to understand their need better and provide them with a more personalized
service.
This might lead to the individual experiencing identity theft illegally accessing personal
information through social engineering.

C2. Can you think of a situation where the right to privacy is less important than the needs
of society?
Obvious situations in which an invasion of privacy may be justified are those associated with
keeping society safe from crime, improving road safety and protection of key installations
such as nuclear power stations.
26: Digital Inclusion
Activity 11
Can you name five actions a government can take to reduce digital exclusion?

Actions a government can take to reduce digital exclusion include:

improving high-speed broadband connectivity so that everyone has access to the Internet
irrespective of where they live

making connection and access to the Internet affordable for all

providing training courses aimed at helping people to develop digital skills

making computing a national curriculum subject which all pupils must study

providing computer/Internet access points in public locations, such as libraries, community centres,
cafes and pubs

making government services, such as car registration and licensing, TV licence renewal and tax
returns, available online and encouraging people to use them.
S1. What is meant by the terms ‘technology-empowered’ and ‘technology
excluded’?

Technology empowered: Having affordable access to computing technology


and the necessary skills to take advantage of it.
Technology excluded: Not having access to computing technology and/or the
skills to use it.
S2. List three drawbacks of being ‘technology-excluded’.
S3. List four factors that contribute to the digital divide.
• Economic growth
• Social
• Employment
• Saving money
S4. Can you think of two ways of providing access to the Internet in areas with a
poor landline infrastructure?
1. Mobile phone
2. To increase global connectivity using balloons flying 20km up into the
stratosphere.

C1. Access to the Internet is a key factor in reducing the digital divide. List two
further measures that governments can take to promote digital inclusion.
• See Activity 11
27: Professionalism
S1. What does the BCS Code of Conducts say a computer scientist should do?

BCS Code of Conducts specifies that computer scientists should always

• respect the wellbeing,

• privacy and security of the environment and people,

• never stop learning and gaining skills and professional knowledge

C1. What might Professionalism mean to a computer scientist?

Professionalism refers to the skill and competence expected of a person in a


professional setting. Computer scientists are expected to behave ethically and
demonstrate professionalism.
28: Computing and The Legal Impact of
Technology
S1. What is the purpose of a software licence?

A software license provides legally binding definitions for the distribution and use
of the software.

S2. The difference between open-source and proprietary software is

The open source code is protected. Users aren’t allowed to modify it. The open
source software must be paid for.

Users can study the proprietary source code to see how the software works and
modify it however they like. The proprietary software is free to use.
C1. How would a patent protect you as an inventor of a product?

A patent protects the idea or design of an invention, rather than just a particular
form of it. In order to get a patent, you have invented is distinct from anything else
that already exists.
29: Current and Emerging Trends
S1. What is meant by artificial intelligence (AI)?

The ability of a digital computer or computer-controlled robot to perform tasks


commonly associated with intelligent beings. Intelligent beings are those that can
adapt to changing circumstances.

S2. Why is DNA suitable for storing data?

Because DNA consists of 4 digits which are arranged in groups of 3, it can encode
information represented by the bits and bytes of computer systems.
S3. What is meant by nanotechnology?

Nanotechnology is the manipulation of matter with a size from 1 to 100


nanometres.

C1. In quantum mechanics, what is meant by superposition and entanglement?

Superposition

The ability of a quantum system to be in multiple states at the same time until it is
measured

Entanglement

Co-dependence of the quantum states of pairs or groups of particles


C2. How can quantum computers solve complex arithmetical problems far
more rapidly than classical computers?

Each qubit can be 1 and 0 at the same time and so can calculate a vast
number of possible outcomes simultaneously.

You might also like