AP Computer Science Principles Big Idea 5

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

flashcard set

Earn XP

Description and Tags

AP Computer Science Principles Big Idea 5 Vocabulary Flashcards

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

Personal Identifiable Information (PII)

Information about an individual that identifies, links, relates, or describes them (e.g., Social Security number, phone number, medical information, biometric data).

2
New cards

Digital Divide

Differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics.

3
New cards

Computing Bias

Computing innovations can reflect existing human biases because of biases written into the algorithms or biases in the data used by the innovation.

4
New cards

Crowdsourcing

The practice of obtaining input or information from a large number of people via the Internet.

5
New cards

Citizen Science

Scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.

6
New cards

Intellectual Property

Material created on a computer is the______ of the creator or an organization.

7
New cards

Plagiarism

The use of material created by someone else without permission and presented as one’s own.

8
New cards

Creative Commons

A public copyright license that enables the free distribution of an otherwise copyrighted work, used when the content creator wants to give others the right to share, use, and build upon the work they have created.

9
New cards

Open Source

Programs that are made freely available and may be redistributed and modified

10
New cards

Open Access

Online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions

11
New cards

Strong Password

Something that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user.

12
New cards

Multifactor Authentication

A method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism.

13
New cards

Encryption

The process of encoding data to prevent unauthorized access; decryption is the process of decoding the data.

14
New cards

Computer Virus

A malicious program that can copy itself and gain access to a computer in an unauthorized way.

15
New cards

Malware

Software intended to damage a computing system or to take partial control over its operation.

16
New cards

Phishing

A technique that attempts to trick a user into providing personal information.

17
New cards

Rogue Access Point

A wireless access point that gives unauthorized access to secure networks.