Chapter 7: Impact of Computing

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/41

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

42 Terms

1
New cards
Data
________ sent over public networks can be intercepted, analyzed, and modified.
2
New cards
Security
________ protects that data from cyber attacks and hacking.
3
New cards
PII
________ and other information can be used to enhance a users online experience.
4
New cards
ethical concerns
Computing innovations can raise legal and ________.
5
New cards
human bias
Computing innovations can reflect existing ________.
6
New cards
security
To increase ________, encryption is used.
7
New cards
Algorithms
________ can be used to determine starting salaries for large companies.
8
New cards
World Wide Web
was intended only for rapid and easy exchange of information within the scientific community.
9
New cards
internet
is a global connection of networks, while the World Wide Web is collection of information that is accessed via the Internet.
10
New cards
digital divide
is the difference in access to technology including access to computers and the internet.
11
New cards
Infrastructure
Some parts of the world do not have access to the internet.
12
New cards
Algorithms
________ can be intentionally or unintentionally biased.
13
New cards
Education
A person could have access to the internet but not have the education to use it.
14
New cards
Indifference
A person could have access to the internet but choose not to use it.
15
New cards
Cost
The cost of accessing the internet could make using it unaffordable.
16
New cards
computing innovation
can have both a beneficial and a harmful effect on societies, cultures, or economies. 
17
New cards
effect
may be an impact, a result, or an outcome. 
18
New cards
Beneficial and/or harmful effects
are contextual and interpretive.
19
New cards
Identification
includes both the classification of the effect as either beneficial or harmful and justification for that classification.
20
New cards
Algorithms
are helping people make decisions that can have extreme ramifications. 
21
New cards
Crowdsourcing
is the practice of obtaining input or information from many people via the internet.
22
New cards
Citizen science
is scientific research using public participation in scientific research.
23
New cards
Security
is needed to protect the confidentiality, integrity, and availability of information. 
24
New cards
Privacy
is the right to control data generated by one’s usage of computing innovations and restrict the flow of that data to third parties.
25
New cards
PII
can be analyzed and processed by businesses and shared with other companies. 
26
New cards
Cyber criminals
are creative in their methods for stealing PII data.
27
New cards
Authentication
measures protect devices and information from unauthorized access.
28
New cards
Multifactor authentication
is a method of computer access control in which a user is granted access only after successfully presenting several pieces of evidence to an authentication mechanism
29
New cards
Knowledge
something the user knows
30
New cards
Possession
something the user has
31
New cards
Inherence
something the user is
32
New cards
Encryption
is the process of encoding data to prevent unauthorized access. 
33
New cards
Decryption
is the process of decoding the data.
34
New cards
Symmetric key encryption
uses the same key for both encryption and decryption.
35
New cards
Public key encryption
(also called asymmetric encryption) uses two keys—one private and one public.
36
New cards
Malware
is malicious software intended to damage a computing system or take partial control or its operations. 
37
New cards
Computer viruses
are malicious programs that can copy themselves and gain access to a computer in an unauthorized way. 
38
New cards
Viruses
often perform some type of harmful activity on infected host computers. 
39
New cards
Phishing
is a technique that directs users to unrelated sites that trick the user into giving personal data. 
40
New cards
Keylogging
is another method involving unauthorized access to a computer.
41
New cards
Data
sent over public networks can be intercepted, analyzed, and modified. 
42
New cards
rogue access point
is a wireless access point that gives unauthorized access to secure networks.