Unit 6 Checkpoints
Unit 6 Checkpoints
Once a computer is dumped in a landfill site, some, not all, of these toxic substances
will leak out into the ground, contaminating water supplies, infiltrating the food chain
and polluting the air.
S3. List two ways of reducing the environmental damage caused by data centres. (Activity 2)
Measures that can be used to make data centres more environmentally friendly include:
reducing dependency on energy generated from fossil fuels by making more use of renewable
energy
locating them in regions where it’s cold most of the year, so that the a mount of energy needed
to cool down them down is significantly reduced.
ration Internet usage – possibly by imposing a tax on uploading data – and/or educate users so
that they behave in a more environmentally responsible fashion. Simply switching from colour to
black and white photos when uploading to social media sites would have a significant impact.
S4. List two ways in which computing technology is helping to preserve the
environment.
The health risks associated with raw material extraction and the manufacture
Arsenic, cadmium and chromium, are hazardous and pose a serious health sick
Radioactive metals such as uranium and thorium are toxic to human health
Poorly equipped miners working in dangerous conditions run the risk of being seriously injured. They
are also at risk of suffering long-term breathing illnesses, such as silicosis, bronchitis or lung cancer.
E-waste that is not recycled properly can be serious health an environmental issue
People who do so risk exposure to hazardous materials such as mercury and lead and are in danger of
inhaling toxic fumes
C2. What are three ways in which computing technology can help to reduce energy consumption?
1. Real-time analysis of the room data enables automatic adjustment of electricity usage.
2. Computer-controlled motors adjust the position of the solar panels to optimize power generation.
3. Other ways that computing technology can help to reduce energy consumption include:
use of smart meters, thermostats, and sensors – part of the ‘Internet of things’ – to monitor energy
vehicle technologies such as adaptive cruise control that significantly reduce a vehicle’s fuel
consumption and emissions
use of GPS tracking, wireless communication and adaptive traffic control systems to ease traffic
congestion and improve journey efficiency, which – in turn – reduces fuel consumption
use of automation and process-control systems to make manufacturing processes more energy efficient
modifying the design of hardware to make computer technology more energy efficient
S2. What might happen if personal information falls into the wrong hand?
Weak security could result in personal information falling into the wrong hands.
This makes people vulnerable to phishing attacks, scams, identity theft and fraud.
S1. Can you think of two ways in which an individual’s personal data could end up stored in
database owned by a third party?
The personal data is stored on servers that belong to online services, such as Facebook and
Google, not to you.
S2. What might happen if personal information falls into the wrong hand?
Weak security could result in personal information falling into the wrong hands.
This makes people vulnerable to phishing attacks, scams, identity theft and fraud.
S3. List two privacy-enhancing tools and describe what they do.
1. Encryption : Prevents unauthorized people from reading your data.
2. Password manager: Stores all your website login information in an encrypted
password database.
C1. Why do some people decide that the benefits of revealing personal information about
themselves are worth the disadvantages?
One reason why so many people give away information about themselves is that it enables
or organization to understand their need better and provide them with a more
personalized service.
This might lead to the individual experiencing identity theft illegally accessing personal
information through social engineering.
C2. Can you think of a situation where the right to privacy is less important than the needs
of society?
Obvious situations in which an invasion of privacy may be justified are those associated
with keeping society safe from crime, improving road safety and protection of key
installations such as nuclear power stations.
C1. Why do some people decide that the benefits of revealing personal information about
themselves are worth the disadvantages?
One reason why so many people give away information about themselves is that it enables
or organization to understand their need better and provide them with a more personalized
service.
This might lead to the individual experiencing identity theft illegally accessing personal
information through social engineering.
C2. Can you think of a situation where the right to privacy is less important than the needs
of society?
Obvious situations in which an invasion of privacy may be justified are those associated with
keeping society safe from crime, improving road safety and protection of key installations
such as nuclear power stations.
26: Digital Inclusion
Activity 11
Can you name five actions a government can take to reduce digital exclusion?
improving high-speed broadband connectivity so that everyone has access to the Internet
irrespective of where they live
making computing a national curriculum subject which all pupils must study
providing computer/Internet access points in public locations, such as libraries, community centres,
cafes and pubs
making government services, such as car registration and licensing, TV licence renewal and tax
returns, available online and encouraging people to use them.
S1. What is meant by the terms ‘technology-empowered’ and ‘technology
excluded’?
C1. Access to the Internet is a key factor in reducing the digital divide. List two
further measures that governments can take to promote digital inclusion.
• See Activity 11
27: Professionalism
S1. What does the BCS Code of Conducts say a computer scientist should do?
A software license provides legally binding definitions for the distribution and use
of the software.
The open source code is protected. Users aren’t allowed to modify it. The open
source software must be paid for.
Users can study the proprietary source code to see how the software works and
modify it however they like. The proprietary software is free to use.
C1. How would a patent protect you as an inventor of a product?
A patent protects the idea or design of an invention, rather than just a particular
form of it. In order to get a patent, you have invented is distinct from anything else
that already exists.
29: Current and Emerging Trends
S1. What is meant by artificial intelligence (AI)?
Because DNA consists of 4 digits which are arranged in groups of 3, it can encode
information represented by the bits and bytes of computer systems.
S3. What is meant by nanotechnology?
Superposition
The ability of a quantum system to be in multiple states at the same time until it is
measured
Entanglement
Each qubit can be 1 and 0 at the same time and so can calculate a vast
number of possible outcomes simultaneously.