1/17
This set of flashcards covers key terms and concepts related to the impact of computing, including beneficial and harmful effects, digital divide, computing bias, legal and ethical concerns, data privacy, encryption, and security issues.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Computing Innovations
Technological advancements that can have both beneficial and harmful societal impacts.
Digital Divide
The gap between individuals who have access to computing and those who do not, influenced by socioeconomic factors, geography, and demographics.
Computing Bias
The presence of existing human biases reflected in computing innovations, often due to biases in algorithms or data.
Crowdsourcing
The practice of obtaining input or information from a large group of people, typically via the Internet, to solve problems collaboratively.
Copyright
Legal protection automatically granted to original works, which allows creators to control how their material is used.
Creative Commons
A licensing system that allows creators to specify how others can use their work.
Open Source
Software whose source code is made available for anyone to modify; encourages external contributions.
Open Access
Free access to research, academic articles, or educational materials, with restrictions on modification.
Personally Identifiable Information (PII)
Data that can identify a specific individual, including name, social security number, and biometric data.
Multifactor Authentication
A security process that requires two or more verification methods to gain access.
Encryption
The process of encoding information to prevent unauthorized access.
Decryption
The process of decoding encrypted data back into its original form.
Symmetric Key Encryption
An encryption method that uses a single key for both encryption and decryption.
Public Key Encryption
An encryption method that uses a pair of keys: a public key for encryption and a private key for decryption.
Certificate Authorities
Organizations that issue digital certificates to validate ownership of encryption keys.
Phishing
A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
Keylogging
The act of recording keystrokes to capture personal information.
Rogue Access Point
A malicious wireless access point that provides unauthorized access to secure networks.