1.6.15
Environmental Issues
Test your knowledge with free interactive questions on Seneca — used by over 10 million students.
E-Waste
E-waste refers to discarded electronic devices.

Technology is hard to repair
- Manufacturers often make technology which is difficult to repair, and so it is sometimes cheaper to replace a product than repair it. This contributes to e-waste.

Newer models
- Many consumers will replace a working device with a newer model each year.
- This is unnecessary e-waste.
- However, there are services where old devices can be given a new lease of life.
- Some computer parts are finite. Their materials could be repurposed for new parts in new models.

Disposal of e-waste
- E-waste can include toxic chemicals.
- There are strict rules about the disposal of e-waste imposed by the Waste Electric and Electronic Equipment (WEEE).
- To bypass these rules, many organisations send e-waste to countries with fewer regulations - such as China and India.
Energy Consumption
It's no surprise that technology uses a lot of energy. But it might be more than most people think.

Data centres
- Data centres are some of the worst offenders for energy consumption.
- Not only do the servers need to be powered, but they also need a lot of energy for their cooling systems.

How much energy?
- In 2011, the US department for energy calculated that data centres in the US alone need 70 billion kWh of electricity each year.
- To put that in perspective, that's 2% of America's total power consumption.
- It's also the same as leaving over 80 million lightbulbs turned on.

Reducing energy consumption
- Energy consumption in data centres can be reduced by using hot and cold aisles. This is making sure that one server's air outtake (hot) does not blow into another server's air intake (cold).
- We can also reduce consumption by using server virtualisation.
- This reduces the number of redundant servers by running multiple virtual servers on a single piece of hardware.

Efficiency
- On the other hand, large data can predict energy usage trends and ensure there is generally less wasted energy.
- This support can be given to homeowners and businesses to monitor their energy usage more efficiently.
- New devices/technology are generally more energy efficient than old models.
- When software replaces physical copies, there is a perceived saving in energy since those physical copies no longer need to be distributed.
Positive Environmental Impact
It's not all bad! There have been some positive impacts.

Climate change
- Computer systems have allowed scientists to monitor and predict the effects of climate change.
- Use of technology can aid in our understanding of the natural world.

Efficiency
- Computer models and simulations have been used to test and improve the efficiency of:
- Engines.
- Wind turbines.

Online communication
- Online communication reduces the need for travel for meetings, which reduces the impact of pollution from cars and aeroplanes.
1Computer Systems
1.1Systems Architecture
1.2Memory & Storage
1.2.1Types of Memory1.2.2Flash Memory1.2.3Properties of Flash Memory1.2.4Running Out of Memory1.2.5Virtual Memory1.2.6Units of Capacity1.2.7Calculating Capacity Requirements1.2.8Solid State Storage1.2.9Properties of Solid State Media1.2.10Magnetic Storage1.2.11Properties of Magnetic Media1.2.12Examples of Magnetic Storage1.2.13Optical Storage1.2.14Properties of Optical Media1.2.15Examples of Optical Storage1.2.16Types of Optical Disk1.2.17Number Bases1.2.18Converting Number Bases1.2.19Hexadecimal1.2.20Using Hexadecimal1.2.21Converting Denary & Hexadecimal1.2.22Binary Addition1.2.23Binary Shifts1.2.24Representing Text1.2.25ASCII & Unicode1.2.26Representing Images1.2.27Converting Binary & Images1.2.28Representing Sound1.2.29Data Compression1.2.30Grade 9 - Storage1.2.31Exam-Style Questions - Primary Memory1.2.32Exam-Style Questions - Storage1.2.33Exam-Style Questions - Data Conversions1.2.34Diagnostic Misconceptions - RAM vs ROM1.2.35Diagnostic Misconceptions - Bits, Nibbles & Bytes1.2.36Diagnostic Misconceptions - Bits Required to Store1.2.37End of Topic Test - Computer Systems1.2.38End of Topic Test - Representation
1.3Computer Networks, Connections & Protocols
1.3.1Benefit of Networks1.3.2Types of Networks1.3.3Network Performance1.3.4Networks: How Do Packets Get Routed?1.3.5Client-Server Model1.3.6Pros & Cons of Client-Server Model1.3.7Peer-to-Peer Model1.3.8Pros & Cons of Peer-to-Peer Model1.3.9Network Hardware1.3.10Transmission Media1.3.11What is the Internet?1.3.12URLs1.3.13DNS & Web Hosting1.3.14The Cloud1.3.15Pros & Cons of the Cloud1.3.16Star & Mesh Network Topologies1.3.17WiFi1.3.18WiFi Frequency & Channels1.3.19WiFi Encryption1.3.20IP Addresses1.3.21MAC Addresses1.3.22Network Protocols1.3.23Transmission Protocols1.3.24Application Protocols1.3.25Layers1.3.26Advantages of Layering1.3.27Exam-Style Questions - Networking Models1.3.28Exam-Style Questions - Network Protocols1.3.29Diagnostic Misconceptions - LAN vs WAN
1.4Network Security
1.4.1Forms of Attack1.4.2Penetration Testing1.4.3Malware1.4.4How Malware Spreads1.4.5Social Engineering1.4.6Phishing1.4.7Cracking Passwords1.4.8Denial of Service Attacks1.4.9Data Interception1.4.10Methods of Data Interception1.4.11SQL Injection1.4.12Network Administration1.4.13Network Forensics1.4.14Protecting Against Malware1.4.15Firewalls1.4.16User Access Levels1.4.17Passwords1.4.18Encryption1.4.19End of Topic Test - Networks
1.5Systems Software
1.6Ethical, Legal, Cultural & Environmental Concern
1.6.1Open Source Software1.6.2Proprietary Software1.6.3Licensing Issues1.6.4Ethical Issues - The Digital Divide1.6.5Ethical Issues - Net Neutrality1.6.6Ethical Issues - Working Conditions1.6.7Ethical Issues - Censorship1.6.8Exam-Style Questions - Ethical Issues1.6.9Data Protection Act 19981.6.10Computer Misuse Act (1990)1.6.11Copyright Designs & Patents Act (1988)1.6.12Creative Commons Licensing1.6.13Freedom of Information Act (2000)1.6.14Cultural Issues1.6.15Environmental Issues1.6.16Online Activity Tracking & The Internet of Things1.6.17Stakeholders1.6.18Other Impacts of Digital Technology on Society1.6.19End of Topic Test - Software & Issues1.6.20Diagnostic Misconceptions - Open Source
2Computational Thinking, Algorithms & Programming
2.1Algorithms
2.1.1Computational Thinking - Abstraction2.1.2Computational Thinking - Decomposition2.1.3Algorithmic Thinking2.1.4Pseudocode2.1.5Flowchart Diagrams2.1.6Interpreting Algorithms2.1.7Correcting Algorithms2.1.8Completing Algorithms2.1.9Search Algorithms2.1.10Binary Search2.1.11Linear Search2.1.12Overview of Sort Algorithms2.1.13Bubble Sort2.1.14Merge Sort2.1.15Insertion Sort2.1.16Exam-Style Questions - Sorting Algorithms
2.2Programming Fundamentals
2.2.1Variable Declaration & Assignment2.2.2Input & Output2.2.3Program Flow - Sequence2.2.4Program Flow - Selection2.2.5Program Flow - Iteration2.2.6Arithmetic Operators2.2.7Relational Operators2.2.8Boolean Operators2.2.9Data Types2.2.10Casting2.2.11Arrays2.2.12Strings2.2.13File Handling2.2.14Structuring Data - Records2.2.15Structured Query Language2.2.16Random Number Generation2.2.17End of Topic Test - Programming2.2.18Exam-Style Questions - Translation2.2.19Diagnostic Misconceptions - Comparison Operators2.2.20Diagnostic Misconceptions - = & ==2.2.21Diagnostic Misconceptions - Types of Data2.2.22Diagnostic Misconceptions - Last Line of Code2.2.23Diagnostic Misconceptions - Array Index
2.3Producing Robust Programs
2.4Boolean Logic
Jump to other topics
1Computer Systems
1.1Systems Architecture
1.2Memory & Storage
1.2.1Types of Memory1.2.2Flash Memory1.2.3Properties of Flash Memory1.2.4Running Out of Memory1.2.5Virtual Memory1.2.6Units of Capacity1.2.7Calculating Capacity Requirements1.2.8Solid State Storage1.2.9Properties of Solid State Media1.2.10Magnetic Storage1.2.11Properties of Magnetic Media1.2.12Examples of Magnetic Storage1.2.13Optical Storage1.2.14Properties of Optical Media1.2.15Examples of Optical Storage1.2.16Types of Optical Disk1.2.17Number Bases1.2.18Converting Number Bases1.2.19Hexadecimal1.2.20Using Hexadecimal1.2.21Converting Denary & Hexadecimal1.2.22Binary Addition1.2.23Binary Shifts1.2.24Representing Text1.2.25ASCII & Unicode1.2.26Representing Images1.2.27Converting Binary & Images1.2.28Representing Sound1.2.29Data Compression1.2.30Grade 9 - Storage1.2.31Exam-Style Questions - Primary Memory1.2.32Exam-Style Questions - Storage1.2.33Exam-Style Questions - Data Conversions1.2.34Diagnostic Misconceptions - RAM vs ROM1.2.35Diagnostic Misconceptions - Bits, Nibbles & Bytes1.2.36Diagnostic Misconceptions - Bits Required to Store1.2.37End of Topic Test - Computer Systems1.2.38End of Topic Test - Representation
1.3Computer Networks, Connections & Protocols
1.3.1Benefit of Networks1.3.2Types of Networks1.3.3Network Performance1.3.4Networks: How Do Packets Get Routed?1.3.5Client-Server Model1.3.6Pros & Cons of Client-Server Model1.3.7Peer-to-Peer Model1.3.8Pros & Cons of Peer-to-Peer Model1.3.9Network Hardware1.3.10Transmission Media1.3.11What is the Internet?1.3.12URLs1.3.13DNS & Web Hosting1.3.14The Cloud1.3.15Pros & Cons of the Cloud1.3.16Star & Mesh Network Topologies1.3.17WiFi1.3.18WiFi Frequency & Channels1.3.19WiFi Encryption1.3.20IP Addresses1.3.21MAC Addresses1.3.22Network Protocols1.3.23Transmission Protocols1.3.24Application Protocols1.3.25Layers1.3.26Advantages of Layering1.3.27Exam-Style Questions - Networking Models1.3.28Exam-Style Questions - Network Protocols1.3.29Diagnostic Misconceptions - LAN vs WAN
1.4Network Security
1.4.1Forms of Attack1.4.2Penetration Testing1.4.3Malware1.4.4How Malware Spreads1.4.5Social Engineering1.4.6Phishing1.4.7Cracking Passwords1.4.8Denial of Service Attacks1.4.9Data Interception1.4.10Methods of Data Interception1.4.11SQL Injection1.4.12Network Administration1.4.13Network Forensics1.4.14Protecting Against Malware1.4.15Firewalls1.4.16User Access Levels1.4.17Passwords1.4.18Encryption1.4.19End of Topic Test - Networks
1.5Systems Software
1.6Ethical, Legal, Cultural & Environmental Concern
1.6.1Open Source Software1.6.2Proprietary Software1.6.3Licensing Issues1.6.4Ethical Issues - The Digital Divide1.6.5Ethical Issues - Net Neutrality1.6.6Ethical Issues - Working Conditions1.6.7Ethical Issues - Censorship1.6.8Exam-Style Questions - Ethical Issues1.6.9Data Protection Act 19981.6.10Computer Misuse Act (1990)1.6.11Copyright Designs & Patents Act (1988)1.6.12Creative Commons Licensing1.6.13Freedom of Information Act (2000)1.6.14Cultural Issues1.6.15Environmental Issues1.6.16Online Activity Tracking & The Internet of Things1.6.17Stakeholders1.6.18Other Impacts of Digital Technology on Society1.6.19End of Topic Test - Software & Issues1.6.20Diagnostic Misconceptions - Open Source
2Computational Thinking, Algorithms & Programming
2.1Algorithms
2.1.1Computational Thinking - Abstraction2.1.2Computational Thinking - Decomposition2.1.3Algorithmic Thinking2.1.4Pseudocode2.1.5Flowchart Diagrams2.1.6Interpreting Algorithms2.1.7Correcting Algorithms2.1.8Completing Algorithms2.1.9Search Algorithms2.1.10Binary Search2.1.11Linear Search2.1.12Overview of Sort Algorithms2.1.13Bubble Sort2.1.14Merge Sort2.1.15Insertion Sort2.1.16Exam-Style Questions - Sorting Algorithms
2.2Programming Fundamentals
2.2.1Variable Declaration & Assignment2.2.2Input & Output2.2.3Program Flow - Sequence2.2.4Program Flow - Selection2.2.5Program Flow - Iteration2.2.6Arithmetic Operators2.2.7Relational Operators2.2.8Boolean Operators2.2.9Data Types2.2.10Casting2.2.11Arrays2.2.12Strings2.2.13File Handling2.2.14Structuring Data - Records2.2.15Structured Query Language2.2.16Random Number Generation2.2.17End of Topic Test - Programming2.2.18Exam-Style Questions - Translation2.2.19Diagnostic Misconceptions - Comparison Operators2.2.20Diagnostic Misconceptions - = & ==2.2.21Diagnostic Misconceptions - Types of Data2.2.22Diagnostic Misconceptions - Last Line of Code2.2.23Diagnostic Misconceptions - Array Index
2.3Producing Robust Programs
2.4Boolean Logic
Practice questions on Environmental Issues
Can you answer these? Test yourself with free interactive practice on Seneca — used by over 10 million students.
- 1What is e-waste?Multiple choice
- 2
- 3
- 4
- 5
Unlock your full potential with Seneca Premium
Unlimited access to 10,000+ open-ended exam questions
Mini-mock exams based on your study history
Unlock 800+ premium courses & e-books