Chapter 7: Impact of Computing

studied byStudied by 8 people
0.0(0)
Get a hint
Hint

Data

1 / 41

42 Terms

1

Data

________ sent over public networks can be intercepted, analyzed, and modified.

New cards
2

Security

________ protects that data from cyber attacks and hacking.

New cards
3

PII

________ and other information can be used to enhance a users online experience.

New cards
4

ethical concerns

Computing innovations can raise legal and ________.

New cards
5

human bias

Computing innovations can reflect existing ________.

New cards
6

security

To increase ________, encryption is used.

New cards
7

Algorithms

________ can be used to determine starting salaries for large companies.

New cards
8

World Wide Web

was intended only for rapid and easy exchange of information within the scientific community.

New cards
9

internet

is a global connection of networks, while the World Wide Web is collection of information that is accessed via the Internet.

New cards
10

digital divide

is the difference in access to technology including access to computers and the internet.

New cards
11

Infrastructure

Some parts of the world do not have access to the internet.

New cards
12

Algorithms

________ can be intentionally or unintentionally biased.

New cards
13

Education

A person could have access to the internet but not have the education to use it.

New cards
14

Indifference

A person could have access to the internet but choose not to use it.

New cards
15

Cost

The cost of accessing the internet could make using it unaffordable.

New cards
16

computing innovation

can have both a beneficial and a harmful effect on societies, cultures, or economies.

New cards
17

effect

may be an impact, a result, or an outcome.

New cards
18

Beneficial and/or harmful effects

are contextual and interpretive.

New cards
19

Identification

includes both the classification of the effect as either beneficial or harmful and justification for that classification.

New cards
20

Algorithms

are helping people make decisions that can have extreme ramifications.

New cards
21

Crowdsourcing

is the practice of obtaining input or information from many people via the internet.

New cards
22

Citizen science

is scientific research using public participation in scientific research.

New cards
23

Security

is needed to protect the confidentiality, integrity, and availability of information.

New cards
24

Privacy

is the right to control data generated by one’s usage of computing innovations and restrict the flow of that data to third parties.

New cards
25

PII

can be analyzed and processed by businesses and shared with other companies.

New cards
26

Cyber criminals

are creative in their methods for stealing PII data.

New cards
27

Authentication

measures protect devices and information from unauthorized access.

New cards
28

Multifactor authentication

is a method of computer access control in which a user is granted access only after successfully presenting several pieces of evidence to an authentication mechanism

New cards
29

Knowledge

something the user knows

New cards
30

Possession

something the user has

New cards
31

Inherence

something the user is

New cards
32

Encryption

is the process of encoding data to prevent unauthorized access.

New cards
33

Decryption

is the process of decoding the data.

New cards
34

Symmetric key encryption

uses the same key for both encryption and decryption.

New cards
35

Public key encryption

(also called asymmetric encryption) uses two keys—one private and one public.

New cards
36

Malware

is malicious software intended to damage a computing system or take partial control or its operations.

New cards
37

Computer viruses

are malicious programs that can copy themselves and gain access to a computer in an unauthorized way.

New cards
38

Viruses

often perform some type of harmful activity on infected host computers.

New cards
39

Phishing

is a technique that directs users to unrelated sites that trick the user into giving personal data.

New cards
40

Keylogging

is another method involving unauthorized access to a computer.

New cards
41

Data

sent over public networks can be intercepted, analyzed, and modified.

New cards
42

rogue access point

is a wireless access point that gives unauthorized access to secure networks.

New cards

Explore top notes

note Note
studied byStudied by 2220 people
... ago
4.7(3)
note Note
studied byStudied by 24 people
... ago
5.0(1)
note Note
studied byStudied by 42 people
... ago
5.0(2)
note Note
studied byStudied by 48 people
... ago
5.0(1)
note Note
studied byStudied by 452 people
... ago
5.0(3)
note Note
studied byStudied by 43 people
... ago
5.0(1)
note Note
studied byStudied by 19 people
... ago
4.5(2)
note Note
studied byStudied by 23406 people
... ago
4.5(119)

Explore top flashcards

flashcards Flashcard (41)
studied byStudied by 2 people
... ago
4.0(1)
flashcards Flashcard (26)
studied byStudied by 173 people
... ago
5.0(1)
flashcards Flashcard (48)
studied byStudied by 21 people
... ago
5.0(1)
flashcards Flashcard (41)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (47)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 3 people
... ago
5.0(1)
robot