AP Computer Science Principles: Big Idea 5

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

computing innovation

A computing innovation includes a program as an integral part of its function.

2
New cards

effects of computing innovations

When used for its intended purpose, a computing innovation can have some beneficial effects on society, whether it be completing tasks efficiently or improving peoples' lives.

However, when mishandled, computing innovations can produce harmful effects on society, which can create drawbacks on society, the economy, or other cultures.

3
New cards

bias in computing

Bias in computer systems causes unfair tendencies for or against certain groups of individuals.

Bias can happen during the data collection process. It all depends on who gathers the data and how it is collected.

4
New cards

plagiarism

Plagiarism is the use of material created by someone else without their permission.

In programming, it is extremely important to reference the work of other developers when working on a collaborative project.

5
New cards

Creative Commons (CC)

A Creative Commons (CC) license is one of several public copyright licenses that enable the free distribution of an otherwise copyrighted work. A CC license is used when an author wants to give people the right to share, use, and build upon a work that they have created.

6
New cards

Open Source

An Open Source license makes all work and programs freely available. Work may be redistributed or modified.

7
New cards

Open Access

Open Access licenses make online research (like government documents or scientific literature) free of any restrictions on access and use.

8
New cards

digital divide

The "digital divide" refers to differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics.

9
New cards

citizen science

Citizen science is scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.

10
New cards

Personally Identifiable Information (PII)

Personally Identifiable Information (PII) can include any data about an individual that identifies, links, relates, or describes them.

Personal data like geolocation, cookies, and browsing history, can provide valuable knowledge about an individual.

11
New cards

Multi-Factor Authentication

Multi-factor Authentication is a method of computer access control in which a user is only granted access after successfully presenting several, separate pieces of evidence (something they know and something they are) to an authentication mechanism.

12
New cards

encryption

Encryption is the process of encoding data to prevent unauthorized access.

13
New cards

decryption

Decryption is the process of decoding data once it has been encrypted.

14
New cards

symmetric key encryption

Symmetric key encryption is an encryption process in which both the sender and receiver use one key to encrypt and decrypt data.

15
New cards

public key encryption

Public key encryption is an encryption process in which a public key is used to encrypt data, while a private key is used to decrypt data.

The sender does not need to know the receiver's private key to encrypt a message, but the receiver's private key is needed to decrypt the message.

16
New cards

digital certificates

Digital certificates are data files used to establish the identity of users and electronic assets for protection of online transactions.

17
New cards

computer virus

A computer virus is a malicious program that can copy itself and gain access to a computer in an unauthorized way. They often attach themselves to what seem to be legitimate programs, even though they're really not.

18
New cards

phishing

Phishing is a technique that attempts to trick a user into providing personal information. That information can then be used to compromise personal services, like bank accounts or emails.

Phishing attacks are usually in the form of random emails or calls that ask you to provide the sender with personal information.

19
New cards

keylogging

Keylogging is the use of a program that records every keystroke made by a computer user in order to gain fraudulent access to passwords and other private information.

20
New cards

rogue access point

A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator, or has been created to allow a hacker to conduct a man-in-the-middle attack by overriding the signal of the real access point.