big idea 5: impact of computing - ap csp flashcards ੈ✩‧₊˚

5.0(1)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

all info from barrons book!!

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

what was the world wide web’s original purpose

for easy exchange of information within the scientific community

2
New cards

what is the internet

a global connection of networks

3
New cards

what is the world wide web

a collection of information that’s accessed via the internet

4
New cards

what is digital divide

the differences in access to technology including access to computers and the internet

5
New cards

what is crowdsourcing

the practice of obtaining input or information from many people via the internet

6
New cards

can algorithms reflect bias

yes because they are created by humans; bias crops up in algorithms, intentional or not

7
New cards

what is citizen science

scientific research using public participation in scientific research

8
New cards

what is a creative commons license

a public copyright license that allows for free distribution of copyrighted work

9
New cards

what is multi-factor authentication

a method of computer access control in which the user is granted access after successfully presenting several pieces of evidence to an authentication mechanism

10
New cards

what is encryption

uses cryptographic algorithms to encrypt data; process of encoding data to prevent unauthorized access

11
New cards

what is symmetric key encryption

same key for both encryption and decryption, both sides need to keep the key a secret

12
New cards

what is public key encryption

uses 2 keys, 1 private and 1 public; anyone wiht the public key can ENCRYPT data (key is public to the public) and the second key is private, it can decrypt the data

13
New cards

what is malware

malicious software intended to damage a computing system or take partial control or take its operations

14
New cards

what are computer viruses

malicious programs that can copy themselves and gain access to a computer in an unauthorized way

15
New cards

what is phishing

cyber criminals pose as a legitimate institution to lure people into providing sensitive data

16
New cards

what is keylogging

use of a program to record every keystroke made by a computer user

17
New cards

what is a rogue access point

a wireless access point that gives unauthorized access to secure networks