You are viewing a free preview of this lesson.
Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.
This lesson consolidates your knowledge of ethical, legal, cultural, and environmental issues in computing. It provides exam-style questions, model answers, and key revision strategies to help you maximise your marks.
In AQA and OCR GCSE Computer Science exams, ethical, legal, and environmental topics typically appear as:
These topics are often combined with other areas (e.g., a question about network security might also ask about the Computer Misuse Act).
mindmap
root((Section 3.8))
Data
DPA 2018
UK GDPR
ICO
Computer Misuse
Section 1
Section 2
Section 3
Copyright
CDPA 1988
Creative Commons
Open Source
Society
Digital Divide
AI Ethics
Privacy vs Surveillance
Environment
E-waste
Data Centres
Rare Earth Metals
Question: A school stores student records electronically. Describe two principles of the Data Protection Act 2018 that the school must follow when handling this data.
Model Answer:
Principle 1 — Data minimisation: The school should only collect the personal data that is necessary for its purpose. For example, it needs students' names, addresses, and medical information for safety, but it should not collect unnecessary data such as parents' political opinions.
Principle 2 — Integrity and confidentiality (security): The school must store the data securely, using appropriate measures such as encryption, password protection, and access controls. Only authorised staff should be able to view student records, and the data should be protected from loss or damage through regular backups.
Question: A student guesses a teacher's password and accesses the school's grading system. They do not change any grades. Which section of the Computer Misuse Act has been broken? Explain your answer.
Model Answer:
The student has broken Section 1 of the Computer Misuse Act — unauthorised access to computer material. This is because the student deliberately accessed the grading system without permission by guessing the teacher's password. Even though the student did not change any data, the act of accessing the system without authorisation is itself an offence under Section 1. If the student had changed grades, this would also be a Section 3 offence (unauthorised acts with intent to impair).
Question: Discuss the environmental impact of the increasing use of digital technology. Include both positive and negative impacts.
Model Answer:
Negative impacts:
The increasing use of digital technology contributes to environmental damage in several ways. Firstly, e-waste is a growing problem — approximately 50 million tonnes of electronic waste is generated globally each year, much of which ends up in landfill where hazardous materials like lead and mercury can leach into the soil and water. Secondly, data centres consume approximately 1-2% of global electricity, much of which still comes from fossil fuels, contributing to greenhouse gas emissions. Thirdly, manufacturing electronic devices requires the extraction of rare earth metals such as cobalt and lithium, which causes deforestation, water pollution, and exploitative working conditions.
Positive impacts:
However, technology also helps the environment. Smart energy systems such as smart meters and smart thermostats optimise energy use and reduce waste. Remote working and video conferencing reduce the need for commuting and business travel, cutting transport emissions. Environmental monitoring using satellites and IoT sensors helps track deforestation, air quality, and climate change. Renewable energy systems rely on computer-controlled technology to optimise output from solar panels and wind turbines.
Conclusion: While technology creates significant environmental problems through e-waste, energy consumption, and resource extraction, it also provides tools to monitor, manage, and reduce environmental damage. The key is to develop and use technology more sustainably.
Question: A small business is choosing between using open source and proprietary software for their office needs. Discuss the advantages and disadvantages of each option.
Model Answer:
Open source advantages: The main advantage for a small business is cost — open source software like LibreOffice is free, which reduces expenses. The business can also customise the software to suit its specific needs since the source code is available. If they have technical staff, they can modify features or fix bugs themselves.
Open source disadvantages: However, open source software may have limited support — if problems arise, the business would rely on community forums rather than a dedicated helpdesk. The software may also have compatibility issues with proprietary file formats used by clients and partners.
Proprietary advantages: Proprietary software like Microsoft Office offers professional support, regular updates, and a polished user experience. It is widely used, so files are easily shared with clients without compatibility issues.
Proprietary disadvantages: The main drawback is cost — licence fees or subscription costs can be significant for a small business. The business also becomes dependent on the vendor and cannot modify the software to suit its needs.
Conclusion: For a small business with limited budget and technical expertise, open source software may be the better choice due to cost savings. However, if compatibility with clients and professional support are priorities, proprietary software may be worth the investment.
| Law | What it Covers |
|---|---|
| Data Protection Act 2018 / GDPR | How personal data is collected, stored, used, and protected |
| Computer Misuse Act 1990 | Unauthorised access, hacking, malware, and computer-related crime |
| Copyright, Designs and Patents Act 1988 | Protection of creative works including software, music, and images |
| Investigatory Powers Act 2016 | Government surveillance and interception of communications |
| Freedom of Information Act 2000 | Public access to information held by government bodies |
For 6-9 mark questions on ethical, legal, and environmental topics:
| Mistake | How to Avoid It |
|---|---|
| Giving one-sided arguments | Always present both sides of the debate |
| Being too vague | Use specific examples, legislation names, and statistics |
| Confusing laws | Know which law covers which area (DPA = data, CMA = hacking, Copyright Act = creative works) |
| Not answering the question | Read the question carefully and address what is actually being asked |
| Forgetting to conclude | Extended responses need a concluding statement |
| Confusing ethical and legal | Legal = defined by law; ethical = questions of right and wrong (can overlap but are different) |
Subscribe to continue reading
Get full access to this lesson and all 10 lessons in this course.