View
217
Download
0
Category
Preview:
Citation preview
Topic 6 – Legal, Social, Ethics Name:
Topic 6 – Legal Social and ethicsLegal issues anagrams Here are some words or phrases that have been jumbled up. The words are connected with Legal and ethical issues. Can you work out what they are? There is a clue to help you.
1 Contradict a teapot Hint: The law that protects our personal data.
Answer: __________________________________________________________________
2 Vary pic Hint: Keeping information about us private.
Answer: __________________________________________________________________
3 Parental soda Hint: Data about us.
Answer: __________________________________________________________________
4 A tad subject Hint: The person that personal data is about.
Answer: __________________________________________________________________
5 Nag hick Hint: The process of gaining illegal access to an ICT system.
Answer: __________________________________________________________________
6 Chirpy got Hint: All original works such as music are protected by this.
Answer: __________________________________________________________________
7 Rap icy Hint: Name for illegal copying.
Answer: __________________________________________________________________
8 Nuclear evils Hint: Snooping on someone.
Answer: __________________________________________________________________
9 Pencil rips Hint: There are eight of these in the Data Protection Act.
Answer: __________________________________________________________________
10 Acute car Hint: Personal data should be ……….. and up to date.Answer: __________________________________________________________________
Health issues anagrams 1 | P a g e
Topic 6 – Legal, Social, Ethics Name:
Here are some words or phrases that have been jumbled up. The words are connected with Health issues. Can you work out what they are? There is a clue to help you.
1 A retentive injury trip is Hint: RSI.
Answer: __________________________________________________________________
2 Erase tiny Hint: You get this by looking at the screen for long periods.
Answer: __________________________________________________________________
3 A cab heck Hint: Incorrect posture when sitting gives you this.
Answer: __________________________________________________________________
4 Chase head Hint: Eye strain can give you these.
Answer: __________________________________________________________________
5 Jab saluted Hint: All chairs used with computers should be this.
Answer: __________________________________________________________________
6 Cut demon Hint: A _________ holder.
Answer: __________________________________________________________________
7 Large Hint: Use blinds on windows to prevent this on the screen.
Answer: __________________________________________________________________
8 Crime goons Hint: The science of making thing used by humans easier to use.
Answer: __________________________________________________________________
9 Pouters Hint: Incorrect ______ can cause back ache.
Answer: __________________________________________________________________
10 Burr led Hint: Stress and headaches can give rise to this problem with vision.
Answer: __________________________________________________________________
Producing a newspaper article on new crimes created by ICTYou have been asked to produce a newspaper article for a local newspaper on new crimes created by the use of ICT.You will have to do quite a bit of research finding out about these crimes.2 | P a g e
Topic 6 – Legal, Social, Ethics Name:
Where do you start?Here are some information sources you can start with:Online newspapers:
http://news.bbc.co.uk/http://www.guardian.co.uk/http://www.telegraph.co.uk/http://www.timesonline.co.uk/tol/news/
Articles on the Internet: use search engines with key words to find suitable information.Marks – 10
Researching equipment that will reduce the risk of potential health hazards when working with ICTThere are many pieces of equipment that can be used to reduce the risk of potential health hazards when working with ICT.In this activity you have to research 3 of them.For each piece of equipment you need to obtain an image and write a few sentences about its purpose and what potential health hazard it avoids. Marks – 3*3 (9)
What are these for?Here are some health and safety products that can be used to help prevent certain health problems when staff use computers. Can you identify them and work out what each of them is for? Write a short sentence to explain.1
3 | P a g e
Topic 6 – Legal, Social, Ethics Name:
Answer ______________________________________________________________________2
Answer ______________________________________________________________________3
Answer ________________________________________________________
4
4 | P a g e
Topic 6 – Legal, Social, Ethics Name:
Answer ______________________________________________________________________5
Answer ______________________________________________________________________6
Answer ______________________________________________________________________7
Answer ______________________________________________________________________
Stolen RAF data files
Unencrypted data on three hard drives was stolen from an RAF base. This data 5 | P a g e
Topic 6 – Legal, Social, Ethics Name:
contained personal details about some senior officers in the RAF. In particular it contained details of those officers who presented more of a security risk than other officers because of their lifestyle. The data contained personal details such as which officers were in debt, which officers were drug users or were having extra-marital affairs.The worry for the RAF was that this stolen data could be used by others to blackmail the officers concerned. They were also worried that they could be sold to journalists, who would produce articles about the senior officers concerned.
1 (a) Explain the meaning of the term ‘unencrypted’. (2 marks)
(b) Explain how the problem might not have been so serious if the data on the hard drives had been encrypted. (2 marks)
2 (a) Give the name of the law that requires organizations to take steps to keep personal information private. (1 mark)
(b) It is a requirement of the Act to keep the data secure.Give two other requirements of the Act. (2 marks)
6 | P a g e
Topic 6 – Legal, Social, Ethics Name:
3 Describe two ways the person who stole the personal information might use it. (2 marks)
7 | P a g e
Topic 6 – Legal, Social, Ethics Name:
Multiple Choice
1 RSI is the name of an injury that may be caused by the incorrect use of keyboards. What does RSI stand for?A Repetitive strain injuryB Resultant sitting infirmityC Relatively stable interfaceD Repetitive sitting injury
ANSWER:
2
This diagram shows a device in front of the keyboard that is used to reduce the likelihood of contracting RSI. What is this device is called?A Mouse matB Wrist restC CopyholderD Mouse
ANSWER:
3 Someone who uses computers in her job complains of eye strain. Which of the following reduces the risk of eye strain?A Ensuring that chairs have adjustable backsB Keeping computer rooms well ventilatedC Using keyboards that can be tiltedD Taking regular breaks from using the computer
ANSWER:
8 | P a g e
Topic 6 – Legal, Social, Ethics Name:
4 What is the main purpose of the Data Protection Act 1998?A To give rights to dataB To make sure that everyone protects their dataC To place obligations on people who record and process personal dataD To make it illegal to copy data
ANSWER:
5 Who is the person responsible for the enforcement of the Data Protection Act 1998?A The Information CommissionerB The Data Protection ControllerC The Data SubjectD The Data User
ANSWER:
6 Which of these is a mischievous program intended to do damage to people’s data?A BugB VirusC BacteriaD Antivirus
ANSWER:
7 Software piracy involves which one of the following?A Illegally copying computer softwareB Downloading pornography off the InternetC Introducing a computer virus into a computer systemD Hacking into computer systems
ANSWER:
9 | P a g e
Topic 6 – Legal, Social, Ethics Name:
8 The Computer Misuse Act 1990 does not involve which one of these?A HackingB Deliberately planting computer virusesC Using a computer to commit fraudD Privacy
ANSWER:
9 Under the Data Protection Act 1998 a data subject is allowed to see personal data held about them. If the data held about them is wrong, the data subject can do which one of the following?A Have the right to the data being corrected or deletedB Have the right for the entire database to be destroyedC Apply for notificationD Ring for the police
ANSWER:
10 There are some exemptions from notification under the Data Protection Act 1998. Which one of the following is not a valid exemption?A Where data is being held in connection with personal, family or household
affairs or for recreational useB Where data is used for preparing the text of documentsC Where the data is being held in the interests of national securityD Where personal data is held by a government department
ANSWER:
10 | P a g e
Topic 6 – Legal, Social, Ethics Name:
Text Book Questions
Questions A Page 118
No Mark Answer1a 3B 22a 3B 2C 23a 2B 2
Questions B Page 120
No Mark Answer1 12 23 24 2
Questions C Page 124
No Mark Answer1a 3B 62a 1B 1C 2
3)
True
False
The continual use of keyboards over a long period can give rise to aches and pains in the hands, arms and wristsRSI stands for repeated stress injuryWrist rests and ergonomic keyboards can help prevent RSI
11 | P a g e
Topic 6 – Legal, Social, Ethics Name:
Back ache can be caused by slouching in your chair when using a computerGlare on the screen can cause RSI
No Mark Answer4 1
Questions D Page 126
No Mark Answer1 22a 1B 2C 2
Questions E Page 129
No Mark Answer1a 1B 12a 2B 13a 2B 24a 3B 2
Case Study Questions 1 Page 132
No Mark Answer1a 3B 22 23 24 15a 2B 2
12 | P a g e
Recommended