1/21
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
digital divide
The idea that some communities or populations have less access to computing than others, typically due to limitations of Internet speed or computer hardware access
crowdsourcing
A model in which many online users combine efforts to help fund projects, generate ideas, or create goods or services (like Wikipedia)
citizen science
Crowdsourcing for science! The participation of volunteers from the public in a scientific research project (like collecting rain samples or counting butterflies)
Creative Commons
An alternative to copyright that allows people to declare how they want their artistic creations to be shared, remixed, used in noncommercial contexts, and how the policy should propagate with remixed versions
open access
A policy that allows people to have access to documents (like research papers) for reading or data (like government datasets) for analysis
PII (Personally identifiable information)
Information about an individual that can be used to uniquely identify them (directly or indirectly)
multifactor authentication (MFA)
A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories (such as knowledge and possession)
encryption
The process of scrambling data to prevent unauthorized access
cookie
A small amount of text that tracks information about a user visiting a website
virus
A type of computer malware that can make copies of itself
phishing
An attack where a user is tricked into revealing private information, often via a deceptive email
Decode the following ciphertext using the Ceasar Cipher with a shift of 21.
ocdn dn v nzxmzo hnb!
This is a secret msg!
Decode with Vegenere cipher using key "secret":
vmfpsnviefhxllkj?
didyoudecodethis?
A new GPS app allows emergency services to respond more accurately to patients in need.
This is an example of...
a societal impact of a computing innovation
A company uses crowdsourcing to label images for AI training. One way the company might handle conflicting or inconsistent labels?
Aggregate data from multiple users and require a quality check for verification.
A disaster relief organization launches a crowdsourced mapping tool to mark flooded areas. What might the key benefit of this approach be?
Real-time updates from many users improve coverage and speed
A school replaces paper textbooks with online-only materials. Suppose 15% of the student body don't have reliable access to internet at home. This is an inequity and is related to the idea of ...
Digital Divide
Community members contribute to an online shared database of bird sightings in the area to help a local university's research project. This is an example of...
Crowdsourcing
What is the primary purpose of two-factor authentication (2FA) and multi-factor authentication (MFA)?
Increased security by requiring exta layers of identity verification.
This technology (arguably) may violate individual privacy without consent by collecting images of a person, storing the images, and using them for unauthorized purposes.
Facial recognition
A student receives an email from their "school IT department" asking them to reset their password by clicking a link. This might be a ____________ attempt.
phishing
A user wants to share a private document securely. What might they do to the document to ensure it remains private between the sender and receiver only?
encrypt it / send it through an encrypted channel (e.g., Signal, WhatsApp, etc.)