1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
computing innovation
A computing innovation includes a program as an integral part of its function.
effects of computing innovations
When used for its intended purpose, a computing innovation can have some beneficial effects on society, whether it be completing tasks efficiently or improving peoples' lives.
However, when mishandled, computing innovations can produce harmful effects on society, which can create drawbacks on society, the economy, or other cultures.
bias in computing
Bias in computer systems causes unfair tendencies for or against certain groups of individuals.
Bias can happen during the data collection process. It all depends on who gathers the data and how it is collected.
plagiarism
Plagiarism is the use of material created by someone else without their permission.
In programming, it is extremely important to reference the work of other developers when working on a collaborative project.
Creative Commons (CC)
A Creative Commons (CC) license is one of several public copyright licenses that enable the free distribution of an otherwise copyrighted work. A CC license is used when an author wants to give people the right to share, use, and build upon a work that they have created.
Open Source
An Open Source license makes all work and programs freely available. Work may be redistributed or modified.
Open Access
Open Access licenses make online research (like government documents or scientific literature) free of any restrictions on access and use.
digital divide
The "digital divide" refers to differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics.
citizen science
Citizen science is scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.
Personally Identifiable Information (PII)
Personally Identifiable Information (PII) can include any data about an individual that identifies, links, relates, or describes them.
Personal data like geolocation, cookies, and browsing history, can provide valuable knowledge about an individual.
Multi-Factor Authentication
Multi-factor Authentication is a method of computer access control in which a user is only granted access after successfully presenting several, separate pieces of evidence (something they know and something they are) to an authentication mechanism.
encryption
Encryption is the process of encoding data to prevent unauthorized access.
decryption
Decryption is the process of decoding data once it has been encrypted.
symmetric key encryption
Symmetric key encryption is an encryption process in which both the sender and receiver use one key to encrypt and decrypt data.
public key encryption
Public key encryption is an encryption process in which a public key is used to encrypt data, while a private key is used to decrypt data.
The sender does not need to know the receiver's private key to encrypt a message, but the receiver's private key is needed to decrypt the message.
digital certificates
Digital certificates are data files used to establish the identity of users and electronic assets for protection of online transactions.
computer virus
A computer virus is a malicious program that can copy itself and gain access to a computer in an unauthorized way. They often attach themselves to what seem to be legitimate programs, even though they're really not.
phishing
Phishing is a technique that attempts to trick a user into providing personal information. That information can then be used to compromise personal services, like bank accounts or emails.
Phishing attacks are usually in the form of random emails or calls that ask you to provide the sender with personal information.
keylogging
Keylogging is the use of a program that records every keystroke made by a computer user in order to gain fraudulent access to passwords and other private information.
rogue access point
A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator, or has been created to allow a hacker to conduct a man-in-the-middle attack by overriding the signal of the real access point.