UT.WTCS.23PaTTAN Module 1 All

5.0(1)
studied byStudied by 24 people
5.0(1)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/49

flashcard set

Earn XP

Description and Tags

Praxis Prep

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

1A1 Goal

Understand computing as a way of expressing creativity, solving problems, enabling communication, and fostering innovation in a variety of fields and careers

2
New cards

1A1 Subgoals: Understand computing as a way of expressing creativity, solving problems, enabling communication, and fostering innovation in a variety of fields and careers

a. recognize that computers can be used to showcase creativity

b. recognize the benefits of using computers to solve problems

c. provide examples of how computers enable communication and collaboration

d. provide examples of how computers foster innovation

3
New cards

1A2 Goal

Know the obstacles to equal access to computing among different groups and the impact of those obstacles

4
New cards

1A2 Subgoals: Know the obstacles to equal access to computing among different groups and the impact of those obstacles

a. identify obstacles to equal access to computing among different groups (e.g., groups defined by gender, socioeconomic status, disability/accessibility needs) and the impact of those obstacles

b. identify factors that contribute to the digital divide

c. match obstacles to equal access with effective solutions

5
New cards

1A3 Goal

Understand beneficial and harmful effects of computing innovations and the trade-offs between them

6
New cards

1A3 Subgoals: Understand beneficial and harmful effects of computing innovations and the trade-offs between them

a. analyze computing innovations in terms of their social, economic, and cultural impacts, both beneficial and harmful

b. identify trade-offs between beneficial and harmful effects of computer innovations

7
New cards

1B1 Goal

Know different methods of protecting intellectual property rights and the trade-offs between them in a variety of contexts (e.g., Creative Commons, open source, copyright)

8
New cards

1B1 Subgoals: Know different methods of protecting intellectual property rights and the trade-offs between them in a variety of contexts (e.g., Creative Commons, open source, copyright)

a. using correct vocabulary, describe how different methods of protecting intellectual property rights work

b. given a context, identify appropriate methods of protecting intellectual property rights

c. identify and compare trade-offs between different methods of protecting intellectual property rights

9
New cards

Public Domain

Copyright ownership waived Permission not needed Credit attribution not needed, though appreciated

10
New cards

Open License : (Creative Commons, GNU, etc.)

Copyright ownership retained Permission granted in advance Credit attribution needed

11
New cards

All rights reserved – Copyright

Copyright ownership retained Permission not given. Need to seek. Attribution depends on the agreement made

12
New cards

Open Source licenses including Creative Commons (most uses)

most commonly used in media assets and educational material. It is also the most common license for scientific publications. It is not used for software.

13
New cards

Open Source software the most popular licenses

MIT Licenses. GNU Licenses Apache License

14
New cards

Creative Commons BY

Attribution - This symbol indicates your expectation to receive credit when your work is used by someone else. It is used in all six license combinations.

15
New cards

Creative Commons SA

Share Alike - This requires any new works based on yours to carry the same license originally designated.

16
New cards

Creative Commons ND

No Derivatives - This symbol requires your original work be passed along unchanged and in whole, no changes to it whatsoever.

17
New cards

Creative Commons NC

Non Commercial - This symbol requires no money be made by any product using your work, only non-commercial use allowed.

18
New cards

Creative Commons Attribution (CC BY)

Show credit, OK to change and/or profit from it

19
New cards

Creative Commons Attribution-Share Alike (CC BY SA)

Show credit, OK to profit from it, use same license as stated with the original work

20
New cards

Creative Commons Attribution-NoDerivs (CC BY-ND)

Show credit, no changes allowed, OK to profit

21
New cards

Creative Commons Atrribution-NonCommercial (CC BY-NC)

Show credit, no profit allowed, OK to change

22
New cards

Creative Commons Atrribution-NonCommercial-ShareAlike (CC BY-NC-SA)

Show credit, no profits allowed, use original license, OK to change

23
New cards

Creative Commons Attribution-NonCommercial-NoDerivs (CC BY-NC-ND)

Show credit, non-commercial, no derivatives, most restrictive of the CC licenses

24
New cards

All Open Source Software funded by Federal Grant must be at least

CC BY - Showing Attribution

25
New cards

1B2 Goal

Understand ethical and unethical computing practices and their social, economic, and cultural implications

26
New cards

1B2 Subgoals: Understand ethical and unethical computing practices and their social, economic, and cultural implications

a. identify ethical and unethical computing practices in context

b. describe the social, economic, and cultural implications of ethical and unethical computing practices

c. identify the conditions under which a given computing practice is ethical or legal

27
New cards

Federal Laws: DMCA

The Digital Millennium Copyright Act is a controversial United States digital rights management (DRM) law enacted October 28, 1998 by then-President Bill Clinton. The intent behind DMCA was to create an updated version of copyright laws to deal with the special challenges of regulating digital material. It is a law protecting artists from having their work illegally copied and reused or modified.

28
New cards

Federal Laws: COPPA

Children’s Online Protection Privacy Act, and imposes certain requirements on operators of websites or online services directed to children under 13 years of age, and on operators of other websites or online services that have actual knowledge that they are collecting personal information online from a child under 13 years of age.

29
New cards

Federal Laws: FERPA

Family Education Rights and Privacy Act of 1974, a federal law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education.

30
New cards

Internet Data Mining Technology: NORA

Non-Obvious Relationship Awareness, a technology that mines data resources to determine the relationships between people. Non-Obvious Relationship Awareness was created by Systems Research and Development (SRD). SRD developed this technology for the Las Vegas gaming industry to help the casinos detect relationships between customers and parties named by the Nevada Gaming Control Board as excluded persons. SRD was acquired by IBM on January 7, 2005.

31
New cards

ACM: Preamble

To act responsibly, they should reflect upon the wider impacts of their work, consistently supporting the public good.[…]The Code includes principles formulated as statements of responsibility, based on the understanding that the public good is always the primary consideration

32
New cards

ACM Section 1 outlines…

fundamental ethical principles that form the basis for the remainder of the Code.

33
New cards

ACM Section 2 addresses…

more specific considerations of professional responsibility.

34
New cards

ACM Section 3…

guides individuals who have a leadership role, whether in the workplace or in a volunteer professional capacity.

35
New cards

ACM Section 4…

the Code

36
New cards

ACM Commitment to ethical conduct is required of…

every ACM member, and principles involving compliance with the Code are given in Section 4.

37
New cards

Plagiarism as defined by writing commons

using the ideas of someone else without referencing that source; failing to capture a source's point in your own words when paraphrasing; mimicking an author's style; and neglecting to include an in-text citation for a quote, paraphrase, or summary.

38
New cards

1B3 Goal

Know privacy and security issues regarding the acquisition, use, and disclosure of information in a digital world

39
New cards

1B3 subgoals: Know privacy and security issues regarding the acquisition, use, and disclosure of information in a digital world

a. using correct vocabulary, describe privacy and security issues

b. in context, identify appropriate strategies to safeguard privacy and ensure security

c. describe trade-offs between local and cloud-based data storage

d. identify methods that digital services use to collect information about users

40
New cards

Privacy Terms: Privacy

Individual privacy is the ability of an individual to conduct activities without the concern of being observed either directly or indirectly (like examination of data collected through online activities). Information privacy is the appropriate protection of individual data.

41
New cards

Privacy Terms: Security

Online security is the protection of an individual’s data either by the individual themselves, the government or a corporation.

42
New cards

Privacy Terms: Digital Footprint

This is the data that is available online about a person. The data typically contains information about the person’s online activity such as social media accounts, their contacts and other online transactions that they conduct on the Internet. Anything you do online leaves a digital trail. This trail is also called digital footprint.

43
New cards

Privacy Terms: Metadata

This is data which supports the actual data that is manipulated. For example if a digital camera stores an image the size of the image or the format of the image is the metadata.

44
New cards

Privacy Terms: Encryption

Encryption prevents others from reading data. Over the Internet, before being transmitted data is transformed by an algorithm in such a way that it is impossible to unscramble the data without knowing a secret piece of data such as a number.

45
New cards

Privacy Terms: Cryptography

The art of sending secret messages so that they can be read only by the intended recipients. Cryptography is based strongly on algorithms.

46
New cards

Privacy Terms: Cybersecurity

Cybersecurity is also known as the information technology security. It refers to technologies, processes and practices designed to protect networks, devices, software and data that are online from attacks, damage and other unauthorized access.

47
New cards

Privacy Terms: Bitcoin

This is digital currency. It is run by a computer software which keeps the currency working. Bitcoin just like any other currency will be accepted by merchants who accept it. Everything needed by a bitcoin is stored in a distributed ledger called blockchain.

48
New cards

Privacy Terms: Privacy / Security issues in Cloud-based storage

The data stored on the Internet by a computer that can be easily shared is called cloud based storage/computing.   The privacy/security concerns include who owns the data, who can access it, and in the case of a data leak who is liable.

49
New cards

Privacy Terms: Malware

This stands for malicious software. Any kind of software that is designed to do some sort of damage to the user running it or gain access to private information is called a malware. Often a malware runs without the knowledge of the user.

50
New cards

Privacy Terms: Internet Of Things

All things connected to the internet which collect data (software updates, etc.) through the Internet and supply data back to remote devices through the Internet. Examples include cellphones, cars, security cameras, refrigerators