AP CSP Unit 6 Review (Impact of Computing)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

22 Terms

1
New cards

digital divide

The idea that some communities or populations have less access to computing than others, typically due to limitations of Internet speed or computer hardware access

2
New cards

crowdsourcing

A model in which many online users combine efforts to help fund projects, generate ideas, or create goods or services (like Wikipedia)

3
New cards

citizen science

Crowdsourcing for science! The participation of volunteers from the public in a scientific research project (like collecting rain samples or counting butterflies)

4
New cards

Creative Commons

An alternative to copyright that allows people to declare how they want their artistic creations to be shared, remixed, used in noncommercial contexts, and how the policy should propagate with remixed versions

5
New cards

open access

A policy that allows people to have access to documents (like research papers) for reading or data (like government datasets) for analysis

6
New cards

PII (Personally identifiable information)

Information about an individual that can be used to uniquely identify them (directly or indirectly)

7
New cards

multifactor authentication (MFA)

A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories (such as knowledge and possession)

8
New cards

encryption

The process of scrambling data to prevent unauthorized access

9
New cards

cookie

A small amount of text that tracks information about a user visiting a website

10
New cards

virus

A type of computer malware that can make copies of itself

11
New cards

phishing

An attack where a user is tricked into revealing private information, often via a deceptive email

12
New cards

Decode the following ciphertext using the Ceasar Cipher with a shift of 21.

ocdn dn v nzxmzo hnb!

This is a secret msg!

13
New cards

Decode with Vegenere cipher using key "secret":

vmfpsnviefhxllkj?

didyoudecodethis?

14
New cards

A new GPS app allows emergency services to respond more accurately to patients in need.

This is an example of...

a societal impact of a computing innovation

15
New cards

A company uses crowdsourcing to label images for AI training. One way the company might handle conflicting or inconsistent labels?

Aggregate data from multiple users and require a quality check for verification.

16
New cards

A disaster relief organization launches a crowdsourced mapping tool to mark flooded areas. What might the key benefit of this approach be?

Real-time updates from many users improve coverage and speed

17
New cards

A school replaces paper textbooks with online-only materials. Suppose 15% of the student body don't have reliable access to internet at home. This is an inequity and is related to the idea of ...

Digital Divide

18
New cards

Community members contribute to an online shared database of bird sightings in the area to help a local university's research project. This is an example of...

Crowdsourcing

19
New cards

What is the primary purpose of two-factor authentication (2FA) and multi-factor authentication (MFA)?

Increased security by requiring exta layers of identity verification.

20
New cards

This technology (arguably) may violate individual privacy without consent by collecting images of a person, storing the images, and using them for unauthorized purposes.

Facial recognition

21
New cards

A student receives an email from their "school IT department" asking them to reset their password by clicking a link. This might be a ____________ attempt.

phishing

22
New cards

A user wants to share a private document securely. What might they do to the document to ensure it remains private between the sender and receiver only?

encrypt it / send it through an encrypted channel (e.g., Signal, WhatsApp, etc.)