AP Computer Science Principles: The Societal and Ethical Impact of Computing

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/50

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:32 AM on 3/5/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

51 Terms

1
New cards

Computing Innovation

Includes a program as an integral part of its function, can be physical, non-physical software, or conceptual.

2
New cards

Collaboration in Computing

Massive scale collaboration enabled by the Internet, allowing people to work together asynchronously.

3
New cards

Targeted Advertising

A computing innovation that enables businesses to reach specific customers and consumers to see relevant products.

4
New cards

Algorithmic Bias

When a computing system reflects the implicit values of the humans involved in coding or data selection.

5
New cards

Digital Divide

The gap between those who have access to the Internet and modern computing resources and those who do not.

6
New cards

Training Data Bias

Bias that occurs when AI is trained on data that reflects historical prejudices.

7
New cards

Crowdsourcing

The practice of obtaining information or input into a task by enlisting the services of a large number of people.

8
New cards

Citizen Science

A type of crowdsourcing where the public contributes to scientific research.

9
New cards

Intellectual Property (IP)

Anything a person creates that is subject to legal protection against unauthorized copying.

10
New cards

Copyright

Automatically grants legal protection to creators against unauthorized copying of their original works.

11
New cards

Creative Commons (CC)

Public copyright licenses that allow free distribution of otherwise copyrighted works.

12
New cards

Open Source Software

Software with source code made freely available for modification and redistribution.

13
New cards

Privacy Invasion

The act of infringing on a person's privacy, often seen in targeted advertising practices.

14
New cards

Strong Passwords

Long, complex combinations of characters used to protect accounts and personal information.

15
New cards

Multi-Factor Authentication (MFA)

A security measure that requires more than one form of verification to access an account.

16
New cards

Cybersecurity Threats

Various types of attacks that threaten to compromise information security.

17
New cards

Virus

Malicious code that attaches to legitimate programs and spreads when run.

18
New cards

Phishing

A social engineering attack where users are tricked into revealing personal information.

19
New cards

Encryption

The process of scrambling data to ensure only authorized parties can read it.

20
New cards

Public Key Encryption

A method of encryption that uses a public key to encrypt data and a private key to decrypt it.

21
New cards

Rogue Access Point

An unauthorized wireless access point that allows illicit access to secure networks.

22
New cards

Cloud Computing

Computing services delivered over the Internet, enabling scalable resources and collaboration.

23
New cards

Data Aggregation

Combining non-PII data to re-identify users through other means.

24
New cards

Echo Chambers

A situation where belief systems are reinforced by communication and media that only supports them.

25
New cards

Machine Learning / AI

Technologies that involve algorithms making predictions or decisions based on data.

26
New cards

Social Media Impact

The profound changes in communication, relationships, and information dissemination caused by social networking.

27
New cards

GPS Technology

A navigation system that uses satellite signals to determine the location of a device.

28
New cards

Digital Literacy

Knowledge and skills needed to effectively use digital tools and resources.

29
New cards

Community Collaboration

The process by which individuals work together to achieve a common goal in an open-source environment.

30
New cards

Civic Participation

Engagement in the processes of governance through technology, especially for accessing information.

31
New cards

Algorithmic Accountability

The responsibility for the decision-making processes of algorithms and their impact on society.

32
New cards

Credit/Loans Discrimination

Unfair denial of loans or credit opportunities based on biased algorithms.

33
New cards

Vulnerable Data

Information that, if exposed or exploited, can lead to significant risks like identity theft.

34
New cards

Digital Redlining

Practices where certain demographics are unfairly denied technological access or services.

35
New cards

Filter Bubbles

The result of algorithmic filtering that isolates users in a customized experience, limiting their exposure to diverse content.

36
New cards

Phishing Prevention

Measures taken to instruct users to avoid clicking suspicious links or revealing personal information.

37
New cards

Biometric Data

Physical characteristics used for identity verification, often high-risk PII.

38
New cards

Misinformation Spread

The rapid dissemination of false or misleading information, particularly via social media.

39
New cards

Echo Chamber Effect

The reinforcement of beliefs through selective exposure to information that confirms existing views.

40
New cards

Critical Thinking in Computing

The evaluation and analysis of the implications of computing innovations and their societal impact.

41
New cards

Privacy Risks

Potential dangers posed to individuals' private information, especially in a digital context.

42
New cards

Data Privacy

The aspect of data protection that deals with the proper handling of sensitive information.

43
New cards

Security Flaws

Weaknesses or vulnerabilities in system design that can be exploited by malicious actors.

44
New cards

Algorithm Training

The process of teaching an AI model using datasets to improve its performance.

45
New cards

Anti-virus Software

Programs designed to detect and eliminate malware before it can harm devices.

46
New cards

User Input in Algorithms

The role that human behavior and choices play in shaping algorithmic outcomes.

47
New cards

Creative Commons License Types

Varieties of CC licenses that define how a work can be used and shared.

48
New cards

Social Engineering

Manipulative tactics used to deceive individuals into revealing confidential information.

49
New cards

Data Ethics

The study of ethical implications related to data usage, including privacy and bias.

50
New cards

Public Key Infrastructure (PKI)

A framework that manages digital certificates and public-key encryption.

51
New cards

Accountability in Computing

Ensuring that developers and companies assume responsibility for their algorithms and their impacts.

Explore top notes

note
The Law and Health Care
Updated 1210d ago
0.0(0)
note
Basic Stuff Study Guide
Updated 832d ago
0.0(0)
note
Chapter 15: Potential Therapies
Updated 1348d ago
0.0(0)
note
Medical Semiology - PA
Updated 349d ago
0.0(0)
note
Chapter 5: Biological Membranes
Updated 1336d ago
0.0(0)
note
Circuits
Updated 1072d ago
0.0(0)
note
German - How to use comparatives
Updated 367d ago
0.0(0)
note
The Law and Health Care
Updated 1210d ago
0.0(0)
note
Basic Stuff Study Guide
Updated 832d ago
0.0(0)
note
Chapter 15: Potential Therapies
Updated 1348d ago
0.0(0)
note
Medical Semiology - PA
Updated 349d ago
0.0(0)
note
Chapter 5: Biological Membranes
Updated 1336d ago
0.0(0)
note
Circuits
Updated 1072d ago
0.0(0)
note
German - How to use comparatives
Updated 367d ago
0.0(0)