big idea 5: impact of computing - ap csp flashcards ੈ✩‧₊˚

studied byStudied by 6 people
5.0(1)
get a hint
hint

what was the world wide web’s original purpose

1 / 16

Tags and Description

all info from barrons book!!

17 Terms

1

what was the world wide web’s original purpose

for easy exchange of information within the scientific community

New cards
2

what is the internet

a global connection of networks

New cards
3

what is the world wide web

a collection of information that’s accessed via the internet

New cards
4

what is digital divide

the differences in access to technology including access to computers and the internet

New cards
5

what is crowdsourcing

the practice of obtaining input or information from many people via the internet

New cards
6

can algorithms reflect bias

yes because they are created by humans; bias crops up in algorithms, intentional or not

New cards
7

what is citizen science

scientific research using public participation in scientific research

New cards
8

what is a creative commons license

a public copyright license that allows for free distribution of copyrighted work

New cards
9

what is multi-factor authentication

a method of computer access control in which the user is granted access after successfully presenting several pieces of evidence to an authentication mechanism

New cards
10

what is encryption

uses cryptographic algorithms to encrypt data; process of encoding data to prevent unauthorized access

New cards
11

what is symmetric key encryption

same key for both encryption and decryption, both sides need to keep the key a secret

New cards
12

what is public key encryption

uses 2 keys, 1 private and 1 public; anyone wiht the public key can ENCRYPT data (key is public to the public) and the second key is private, it can decrypt the data

New cards
13

what is malware

malicious software intended to damage a computing system or take partial control or take its operations

New cards
14

what are computer viruses

malicious programs that can copy themselves and gain access to a computer in an unauthorized way

New cards
15

what is phishing

cyber criminals pose as a legitimate institution to lure people into providing sensitive data

New cards
16

what is keylogging

use of a program to record every keystroke made by a computer user

New cards
17

what is a rogue access point

a wireless access point that gives unauthorized access to secure networks

New cards

Explore top notes

note Note
studied byStudied by 37 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 30 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 25 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 29 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 47 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard89 terms
studied byStudied by 16 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard54 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard65 terms
studied byStudied by 88 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard32 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard36 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard64 terms
studied byStudied by 21 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard80 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard20 terms
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)