APSCP Unit 10 Exam Questions And Correct Answers
100% Verified
Cybersecurity
The state of being protected against the criminal or unauthorized use of electronic data,
or measures taken to achieve this.
Personally Identifiable Information (PII)
Information about an individual which identifies, links, relates or describes them.
Why is PII necessary?
Technology enables the collection, use, and exploitation of information about, by and for
individuals, groups, and institutions. Geolocation, cookies, and browsing history can all
be used to create knowledge about an individual. Most digital technology needs some
kind of PII to work (for example street navigation needs to know your location or PII
stored online to simplify making online purchases).
Cons of PII
PII can be used to steal a person's identity or stalk a person online. Information that can
be found on social media can be combined to put together a profile on you.
Exchange from user and application
When you use most apps, most websites, and most social networks they are collecting
information about you in exchange for providing you a service, being able to connect
with your friends and share photos.
Sometimes the service itself, such as GPS, needs to track you in order to be a useful
app.
, Other times, the information gathered is valuable to the company in order to make
money.
Pros and Cons of Targeted Ads
Targeted advertising based on your browser history can be useful; you may be
introduced to things you want to buy or information you want to know about.
This may also have its side effects; it can be used to track down a single user or group of
users in order to obtain data on them for malicious reasons. At this point, this innovation
is not being used as originally intended.
Benefits and Negatives in giving private data
Our private data powers much of computing innovations in ways we love. It makes
products that are convenient, interesting, personal, useful and often "free" because we
"pay" with our data.
Not every consequence of a computing innovation is foreseen ahead of time.
This data may also be used by corporations, governments or thieves in ways that we
have not intended or that jeopardize our privacy.
Legal and Ethical Considerations of Emerging Technology
Computing innovations that harm people
Computing innovations that play a role in social and political issues
Examples:
software that enables digital media downloads and streaming
algorithms that are biased
devices that gather and analyse data based on continual monitoring of activities
100% Verified
Cybersecurity
The state of being protected against the criminal or unauthorized use of electronic data,
or measures taken to achieve this.
Personally Identifiable Information (PII)
Information about an individual which identifies, links, relates or describes them.
Why is PII necessary?
Technology enables the collection, use, and exploitation of information about, by and for
individuals, groups, and institutions. Geolocation, cookies, and browsing history can all
be used to create knowledge about an individual. Most digital technology needs some
kind of PII to work (for example street navigation needs to know your location or PII
stored online to simplify making online purchases).
Cons of PII
PII can be used to steal a person's identity or stalk a person online. Information that can
be found on social media can be combined to put together a profile on you.
Exchange from user and application
When you use most apps, most websites, and most social networks they are collecting
information about you in exchange for providing you a service, being able to connect
with your friends and share photos.
Sometimes the service itself, such as GPS, needs to track you in order to be a useful
app.
, Other times, the information gathered is valuable to the company in order to make
money.
Pros and Cons of Targeted Ads
Targeted advertising based on your browser history can be useful; you may be
introduced to things you want to buy or information you want to know about.
This may also have its side effects; it can be used to track down a single user or group of
users in order to obtain data on them for malicious reasons. At this point, this innovation
is not being used as originally intended.
Benefits and Negatives in giving private data
Our private data powers much of computing innovations in ways we love. It makes
products that are convenient, interesting, personal, useful and often "free" because we
"pay" with our data.
Not every consequence of a computing innovation is foreseen ahead of time.
This data may also be used by corporations, governments or thieves in ways that we
have not intended or that jeopardize our privacy.
Legal and Ethical Considerations of Emerging Technology
Computing innovations that harm people
Computing innovations that play a role in social and political issues
Examples:
software that enables digital media downloads and streaming
algorithms that are biased
devices that gather and analyse data based on continual monitoring of activities