Chapter 7: Impact of Computing

studied byStudied by 8 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 41

42 Terms

1
Data
________ sent over public networks can be intercepted, analyzed, and modified.
New cards
2
Security
________ protects that data from cyber attacks and hacking.
New cards
3
PII
________ and other information can be used to enhance a users online experience.
New cards
4
ethical concerns
Computing innovations can raise legal and ________.
New cards
5
human bias
Computing innovations can reflect existing ________.
New cards
6
security
To increase ________, encryption is used.
New cards
7
Algorithms
________ can be used to determine starting salaries for large companies.
New cards
8
World Wide Web
was intended only for rapid and easy exchange of information within the scientific community.
New cards
9
internet
is a global connection of networks, while the World Wide Web is collection of information that is accessed via the Internet.
New cards
10
digital divide
is the difference in access to technology including access to computers and the internet.
New cards
11
Infrastructure
Some parts of the world do not have access to the internet.
New cards
12
Algorithms
________ can be intentionally or unintentionally biased.
New cards
13
Education
A person could have access to the internet but not have the education to use it.
New cards
14
Indifference
A person could have access to the internet but choose not to use it.
New cards
15
Cost
The cost of accessing the internet could make using it unaffordable.
New cards
16
computing innovation
can have both a beneficial and a harmful effect on societies, cultures, or economies. 
New cards
17
effect
may be an impact, a result, or an outcome. 
New cards
18
Beneficial and/or harmful effects
are contextual and interpretive.
New cards
19
Identification
includes both the classification of the effect as either beneficial or harmful and justification for that classification.
New cards
20
Algorithms
are helping people make decisions that can have extreme ramifications. 
New cards
21
Crowdsourcing
is the practice of obtaining input or information from many people via the internet.
New cards
22
Citizen science
is scientific research using public participation in scientific research.
New cards
23
Security
is needed to protect the confidentiality, integrity, and availability of information. 
New cards
24
Privacy
is the right to control data generated by one’s usage of computing innovations and restrict the flow of that data to third parties.
New cards
25
PII
can be analyzed and processed by businesses and shared with other companies. 
New cards
26
Cyber criminals
are creative in their methods for stealing PII data.
New cards
27
Authentication
measures protect devices and information from unauthorized access.
New cards
28
Multifactor authentication
is a method of computer access control in which a user is granted access only after successfully presenting several pieces of evidence to an authentication mechanism
New cards
29
Knowledge
something the user knows
New cards
30
Possession
something the user has
New cards
31
Inherence
something the user is
New cards
32
Encryption
is the process of encoding data to prevent unauthorized access. 
New cards
33
Decryption
is the process of decoding the data.
New cards
34
Symmetric key encryption
uses the same key for both encryption and decryption.
New cards
35
Public key encryption
(also called asymmetric encryption) uses two keys—one private and one public.
New cards
36
Malware
is malicious software intended to damage a computing system or take partial control or its operations. 
New cards
37
Computer viruses
are malicious programs that can copy themselves and gain access to a computer in an unauthorized way. 
New cards
38
Viruses
often perform some type of harmful activity on infected host computers. 
New cards
39
Phishing
is a technique that directs users to unrelated sites that trick the user into giving personal data. 
New cards
40
Keylogging
is another method involving unauthorized access to a computer.
New cards
41
Data
sent over public networks can be intercepted, analyzed, and modified. 
New cards
42
rogue access point
is a wireless access point that gives unauthorized access to secure networks.
New cards

Explore top notes

note Note
studied byStudied by 3 people
87 days ago
5.0(1)
note Note
studied byStudied by 70 people
134 days ago
4.0(1)
note Note
studied byStudied by 3 people
704 days ago
5.0(1)
note Note
studied byStudied by 7 people
884 days ago
5.0(1)
note Note
studied byStudied by 57 people
625 days ago
5.0(1)
note Note
studied byStudied by 14 people
857 days ago
5.0(3)
note Note
studied byStudied by 14 people
878 days ago
5.0(1)
note Note
studied byStudied by 8 people
887 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (20)
studied byStudied by 3 people
809 days ago
5.0(2)
flashcards Flashcard (28)
studied byStudied by 2 people
626 days ago
5.0(1)
flashcards Flashcard (345)
studied byStudied by 35 people
136 days ago
5.0(2)
flashcards Flashcard (22)
studied byStudied by 6 people
514 days ago
5.0(1)
flashcards Flashcard (130)
studied byStudied by 72 people
533 days ago
5.0(1)
flashcards Flashcard (45)
studied byStudied by 12 people
780 days ago
5.0(1)
flashcards Flashcard (128)
studied byStudied by 66 people
556 days ago
4.8(6)
flashcards Flashcard (57)
studied byStudied by 64 people
80 days ago
5.0(3)
robot