big idea 5: impact of computing - ap csp flashcards ੈ✩‧₊˚

studied byStudied by 11 people
5.0(1)
Get a hint
Hint

what was the world wide web’s original purpose

1 / 16

flashcard set

Earn XP

Description and Tags

all info from barrons book!!

17 Terms

1

what was the world wide web’s original purpose

for easy exchange of information within the scientific community

New cards
2

what is the internet

a global connection of networks

New cards
3

what is the world wide web

a collection of information that’s accessed via the internet

New cards
4

what is digital divide

the differences in access to technology including access to computers and the internet

New cards
5

what is crowdsourcing

the practice of obtaining input or information from many people via the internet

New cards
6

can algorithms reflect bias

yes because they are created by humans; bias crops up in algorithms, intentional or not

New cards
7

what is citizen science

scientific research using public participation in scientific research

New cards
8

what is a creative commons license

a public copyright license that allows for free distribution of copyrighted work

New cards
9

what is multi-factor authentication

a method of computer access control in which the user is granted access after successfully presenting several pieces of evidence to an authentication mechanism

New cards
10

what is encryption

uses cryptographic algorithms to encrypt data; process of encoding data to prevent unauthorized access

New cards
11

what is symmetric key encryption

same key for both encryption and decryption, both sides need to keep the key a secret

New cards
12

what is public key encryption

uses 2 keys, 1 private and 1 public; anyone wiht the public key can ENCRYPT data (key is public to the public) and the second key is private, it can decrypt the data

New cards
13

what is malware

malicious software intended to damage a computing system or take partial control or take its operations

New cards
14

what are computer viruses

malicious programs that can copy themselves and gain access to a computer in an unauthorized way

New cards
15

what is phishing

cyber criminals pose as a legitimate institution to lure people into providing sensitive data

New cards
16

what is keylogging

use of a program to record every keystroke made by a computer user

New cards
17

what is a rogue access point

a wireless access point that gives unauthorized access to secure networks

New cards

Explore top notes

note Note
studied byStudied by 2220 people
... ago
4.7(3)
note Note
studied byStudied by 24 people
... ago
5.0(1)
note Note
studied byStudied by 42 people
... ago
5.0(2)
note Note
studied byStudied by 48 people
... ago
5.0(1)
note Note
studied byStudied by 452 people
... ago
5.0(3)
note Note
studied byStudied by 43 people
... ago
5.0(1)
note Note
studied byStudied by 19 people
... ago
4.5(2)
note Note
studied byStudied by 23406 people
... ago
4.5(119)

Explore top flashcards

flashcards Flashcard (41)
studied byStudied by 2 people
... ago
4.0(1)
flashcards Flashcard (26)
studied byStudied by 173 people
... ago
5.0(1)
flashcards Flashcard (48)
studied byStudied by 21 people
... ago
5.0(1)
flashcards Flashcard (41)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (47)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 3 people
... ago
5.0(1)
robot