social issues in computing ethicshealthinternet and research privacysocial issues 50 40 30 20 10

51
Social Issues in Computing Ethics Health Interne t and Researc h Privacy Social Issues 50 50 50 50 50 40 40 40 40 40 30 30 30 30 30 20 20 20 20 20 10 10 10 10 10

Upload: marianna-york

Post on 01-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

Social Issues in Computing

Ethics Health Internet and Research

Privacy Social Issues

50 50 50 50 50

40 40 40 40 40

30 30 30 30 30

20 20 20 20 20

10 10 10 10 10

Page 2: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

50 PointsA

Click on the link and view the comic. www.ju6y.com/Cyberbullying_and_Punishment.jpg

What is the “moral” of the comic.

Go back

Page 3: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

50 PointsA

The correct “moral” from this tale is that the victimized girl should immediately tell a trusted adult about her problem.

Go back

Page 4: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

40 Points A

Click on the link and view the comic. www.ju6y.com/Cyberbullying_and_Punishment.jpg

What is exaggerated in this comic?

Go back

Page 5: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

40 Points A

The police would not actually be called and the person who wrote the mean emails would not actually go to jail.

Go back

Page 6: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

30 PointsA

If someone violates a copyright (for instance by downloading a pirated movie), what potentially could happen to them?

Go back

Page 7: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

30 PointsA

The person is guilty of a copyright infringement potentially receive a fine.Go back

Page 8: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

20 Points A

Making unfounded rumours about someone else is called ________.

Go back

Page 9: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

20 Points A

defamationGo back

Page 10: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

10 Points A

Why is an “anonymous posting” on the Internet a problem?

Go back

Page 11: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

10 Points A

People sometimes do not want to be accountable to others about what they say or do online. They sometime take advantage or hurt others because they do not use their real name.

Go back

Page 12: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

50 PointsB

Is our computer lab (room 220) ergonomically correct?Go back

Page 13: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

50 PointsB

Not for prolonged computer use.

Go back

Page 14: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

40 Points B

Are you sitting straight right now? Can this affect your health?

Go back

Page 15: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

40 Points B

If the answer is yes – then good for you! Your health is maintained when you have good blood flow and when you do not strain yourself over a long period of time. If you and your team all have good posture then you get the 40 points.

Go back

Page 16: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

30 PointsB

Go back

Page 17: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

30 PointsB

C – Your monitor should be 2 – 3 inches above eye level when you are seated.

Go back

Page 18: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

20 Points B

You can get a permanent wrist injury from improper ergonomics.True or False?Go back

Page 19: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

20 Points B

True. It is called carpal tunnel syndrome, and some people have to have surgery to fix it.

Go back

Page 20: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

10 Points B

You can get a stomach ache from improper ergonomics. True or False

Go back

Page 21: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

10 Points B

False.You can easily get back problems from slouching for long periods, but not stomach ache.

Go back

Page 22: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

50 PointsC

How do you know the http://www.pomegranatephone.com/ is fake?.

Go back

Page 23: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

50 PointsC

When you go to the “cookies” link it shows the website of the makers of the website. Also, it is too good to be true.

Go back

Page 24: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

40 PointsC

There are only two main Internet providers in Canada. (True or False)

Go back

Page 25: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

40 PointsC

True. All the smaller providers piggyback on these users.

Go back

Page 26: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

30 PointsC

Download speed Mbps stands for _________. Ms Burnham’s wireless network speed is approximately 175 Mbps.

Go back

Page 27: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

30 PointsC

Mega bits per second.

Go back

Page 28: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

20 PointsC Why is this funny?

Go back

Page 29: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

20 Points

Because no Internet existed during the time of Abraham Lincoln.

Go back

Page 30: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

10 PointsC

According to our Wiki, which browser is the least popular with informed users?

Go back

Page 31: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

10 PointsC

Internet Explorer

Go back

Page 32: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

50 PointsD

DdoS attacks use computer viruses. True or False?

Go back

Page 33: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

50 PointsD

FALSE. DDoS attacks do NOT use viruses. Instead, they overwhelm the server with information requests.

Go back

Page 34: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

40 Points D

A biometric scan could involve your eye or finger. True or False?

Go back

Page 35: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

40 Points D

True. Biometric scans are used for security systems. Digital fingerprinting and retinal scans can be used.

Go back

Page 36: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

30 Points D

Have one good password, at least 7 characters, using punctuation, numbers and capitals. True or False?

Go back

Page 37: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

30 Points D

False. Although it is good to use punctuation, numbers, upper and lowercase, in a fairly long password, you should vary your password from site to site.

Go back

Page 38: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

20 Points D

Social Networking is too dangerous to use.

Go back

Page 39: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

20 Points D

False. All social networking sites need to be managed, but the knowledgeable user can be safe online. Go back

Page 40: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

10 PointsD

Once you have set your privacy settings on facebook, you never have to think about it again. True/False

Go back

Page 41: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

10 PointsD

False – Facebook has often updated their pages and sometimes this changes your default privacy settings.

Go back

Page 42: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

50 PointsE

Consider this statement:“Increased computer use has increased paper use.” True or False

Go back

Page 43: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

50 PointsE

True

http://www.businesscomputingworld.co.uk/paper-consumption-and-waste-continues-to-increase/

http://www.dailymail.co.uk/sciencetech/article-2125107/Global-consumption-paper-increased-half-1980.html

Go back

Page 44: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

40 PointsE

Can your computer monitor be a health hazzard? Yes/No.

Go back

Page 45: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

40 PointsE

Yes. Computer monitors, are a serious concern because of the high quantity and toxicity of such products. In addition to lead, electronic waste can contain toxic substances including brominated flame retardants, cadmium, lithium, mercury, phosphorous coating and PVC plastics that create toxins when burned.

Go back

Page 46: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

30 PointsE

Technology can be used to “speak” for a person who cannot speak for themselves. Give a famous example.

Go back

Page 47: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

30 PointsE

Stephen Hawking, a famous physicist, uses and voice synthesizer and a computer to simulate speech.

Go back

Page 48: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

20 PointsE

Addiction to using the computer is a myth. True or False

Go back

Page 49: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

20 PointsE

False. According to our wiki, people can be as addicted to using a computer as they can be addicted to any other activity or substance. In some severe cases, professional help is recommended.

Go back

Page 50: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

10 PointsE

Treat people as you would have them treat _____.

Go back

Page 51: Social Issues in Computing EthicsHealthInternet and Research PrivacySocial Issues 50 40 30 20 10

10 PointsE

YOU! The golden rule applies when using computers too!

Go back