Edexcel GCSE Computer Science 2020

5: Issues and impact

Revision tools
You can print this page for a quick reference guide or you can use the tools below to create printable test sheets
5.1.1: understand environmental issues associated with the use of digital devices (energy consumption, manufacture, replacement cycle, disposal)
Issues and impact
KeywordDefinition
digital devicecomputer system such as a smart phone, laptop, smart TV, e-reader or tablet
disposalwhat happens to a device when it is no longer used which can affect the environment because part of it can end up in landfill, possibly releasing toxic chemicals
energy consumptionhow much power a device requires to run which can affect the environment due to the use of fossil fuels and emission of carbon dioxide or other pollutants
environmental issuesomething that could cause damage to the habitat or health of animals or humans
manufacturehow a device is made which an affect the environment due to the materials used and how they are sourced or processed
replacement cyclehow long a digital device is designed to last and whether or not it can be recycled
5.2.1: understand ethical and legal issues associated with the collection and use of personal data (privacy, ownership, consent, misuse, data protection)
Issues and impact
KeywordDefinition
Computer Misuse ActUK law which makes it illegal to access someone else's data or network without authorisation
consentpermission that is granted to allow data to be viewed, stored or processed
Cookiessmall text files which can store personal data about the person viewing a web page
data collectioncapturing data and storing it so it can be processed and used
Data Protection ActUK law which protects individuals against misuse of their personal data
data useanalysing and accessing data for personal, research or business purposes
ethical issuesquestions related to what is morally right or wrong
legal issuesquestions related to what is and isn't against the law
misusewhen data is used without permission or a purpose other than what permission was granted for
ownershipwho has the rights to view or use the data
personal datainformation stored about people that might be used to identify them
privacythe need to keep data secure so that only those authorised to access it can see or use it
5.2.2: understand ethical and legal issues associated with the use of artificial intelligence, machine learning and robotics accountability, safety, algorithmic bias, legal liability)
Issues and impact
KeywordDefinition
accountabilitywho is responsible for maintaining, replacing or fixing a computer system or algorithm
algorithmic biaswhen an algorithm gives unfair results either deliberately or accidentally due to input data that favours one particular outcome
artificial intelligencewhen a computer can make decisions or interact with the world in a similar way to a human
autonomous machinean intelligent computer controlled device which can make decisions for itself such as a driverless car, automated weapon or surgical robot
ethical issuesquestions related to what is morally right or wrong
legal issuesquestions related to what is or isn't against the law
legal liabilitywho is responsible to pay a fine or go to prison if an algorithm fails, breaks the law or hurts someone
machine learningwhen a computer can be trained by analysing lots of test input data to recognise how to solve a problem for itself
roboticswhen a computer can move or control industrial equipment to automate repetitive or dangerous tasks
safetyhow secure a computer system is and how likely people are to be harmed by its operation
self-learninga type of computer, machine or robot that can learn from its own mistakes
5.2.3: understand methods of intellectual property protection for computer systems and software (copyright, patents, trademarks, licencing)
Issues and impact
KeywordDefinition
closed sourcetype of software licence where the program code is kept a secret so only the original author or company can make changes
copyrightlegal protection for creative products such as images, text, video, sound or software so that they can't be copied without permission
intellectual propertylegal term meaning who has the right to be known as the owner of an idea, invention, algorithm or device
licencinglegal protection for software which determines how it can be it can and can't be used and / or shared
open sourcetype of software licence where the program code is freely available for others to access and edit
patentslegal protection for ideas and inventions so that companies can't copy competitors products without permission
trademarkslegal protection for names of companies or products so that they can't be imitated by anyone else without permission
5.3.1: understand the threat to digital systems posed by malware (viruses, worms, Trojans, ransomware, key loggers) and how hackers exploit technical vulnerabilities (unpatched software, out-of-date anti-malware) and use social engineering to carry out cyberattacks
Issues and impact
KeywordDefinition
anti-malwaresoftware which scans for malicious software so that it can be removed
exploitverb which means to take advantage of
keyloggersoftware which keeps a record of every time a key is pressed or mouse is clicked in order to harvest personal information
malicious hackersomeone who breaks into a computer system without permission or creates or shares malware
malwaremalicious software such as a virus, worm or trojan horse
ransomwaremalicious software that encrypts a computer and demands payment before the user can access their own files
social engineeringtricking people into providing access to a computer system or network
technical vulnerabilitya security gap in code due to poor security design
trojanmalicious software hidden inside another program that the user is tricked into downloading and running
unpatched softwareprograms where vulnerabilities have been identified but not yet updated
virusmalicious software that infect a computer system then spread out to infect other computer systems
wormmalicious software that can create copies of itself and spread by itself without needing an infected host computer
5.3.2: understand methods of protecting digital systems and data (anti-malware, encryption, acceptable use policies, backup and recovery procedures)
Issues and impact
KeywordDefinition
acceptable use policyrules that users of a computer system must agree to before they are allowed access
anti-malwaresoftware which scans for malicious software on a computer system so that it can be prevented or removed
backup and recovery procedurerules for how frequently copies of data are kept and how they can be restored when needed
encryptionmaking data impossible to understand without the correct password