1/50
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Computing Innovation
Includes a program as an integral part of its function, can be physical, non-physical software, or conceptual.
Collaboration in Computing
Massive scale collaboration enabled by the Internet, allowing people to work together asynchronously.
Targeted Advertising
A computing innovation that enables businesses to reach specific customers and consumers to see relevant products.
Algorithmic Bias
When a computing system reflects the implicit values of the humans involved in coding or data selection.
Digital Divide
The gap between those who have access to the Internet and modern computing resources and those who do not.
Training Data Bias
Bias that occurs when AI is trained on data that reflects historical prejudices.
Crowdsourcing
The practice of obtaining information or input into a task by enlisting the services of a large number of people.
Citizen Science
A type of crowdsourcing where the public contributes to scientific research.
Intellectual Property (IP)
Anything a person creates that is subject to legal protection against unauthorized copying.
Copyright
Automatically grants legal protection to creators against unauthorized copying of their original works.
Creative Commons (CC)
Public copyright licenses that allow free distribution of otherwise copyrighted works.
Open Source Software
Software with source code made freely available for modification and redistribution.
Privacy Invasion
The act of infringing on a person's privacy, often seen in targeted advertising practices.
Strong Passwords
Long, complex combinations of characters used to protect accounts and personal information.
Multi-Factor Authentication (MFA)
A security measure that requires more than one form of verification to access an account.
Cybersecurity Threats
Various types of attacks that threaten to compromise information security.
Virus
Malicious code that attaches to legitimate programs and spreads when run.
Phishing
A social engineering attack where users are tricked into revealing personal information.
Encryption
The process of scrambling data to ensure only authorized parties can read it.
Public Key Encryption
A method of encryption that uses a public key to encrypt data and a private key to decrypt it.
Rogue Access Point
An unauthorized wireless access point that allows illicit access to secure networks.
Cloud Computing
Computing services delivered over the Internet, enabling scalable resources and collaboration.
Data Aggregation
Combining non-PII data to re-identify users through other means.
Echo Chambers
A situation where belief systems are reinforced by communication and media that only supports them.
Machine Learning / AI
Technologies that involve algorithms making predictions or decisions based on data.
Social Media Impact
The profound changes in communication, relationships, and information dissemination caused by social networking.
GPS Technology
A navigation system that uses satellite signals to determine the location of a device.
Digital Literacy
Knowledge and skills needed to effectively use digital tools and resources.
Community Collaboration
The process by which individuals work together to achieve a common goal in an open-source environment.
Civic Participation
Engagement in the processes of governance through technology, especially for accessing information.
Algorithmic Accountability
The responsibility for the decision-making processes of algorithms and their impact on society.
Credit/Loans Discrimination
Unfair denial of loans or credit opportunities based on biased algorithms.
Vulnerable Data
Information that, if exposed or exploited, can lead to significant risks like identity theft.
Digital Redlining
Practices where certain demographics are unfairly denied technological access or services.
Filter Bubbles
The result of algorithmic filtering that isolates users in a customized experience, limiting their exposure to diverse content.
Phishing Prevention
Measures taken to instruct users to avoid clicking suspicious links or revealing personal information.
Biometric Data
Physical characteristics used for identity verification, often high-risk PII.
Misinformation Spread
The rapid dissemination of false or misleading information, particularly via social media.
Echo Chamber Effect
The reinforcement of beliefs through selective exposure to information that confirms existing views.
Critical Thinking in Computing
The evaluation and analysis of the implications of computing innovations and their societal impact.
Privacy Risks
Potential dangers posed to individuals' private information, especially in a digital context.
Data Privacy
The aspect of data protection that deals with the proper handling of sensitive information.
Security Flaws
Weaknesses or vulnerabilities in system design that can be exploited by malicious actors.
Algorithm Training
The process of teaching an AI model using datasets to improve its performance.
Anti-virus Software
Programs designed to detect and eliminate malware before it can harm devices.
User Input in Algorithms
The role that human behavior and choices play in shaping algorithmic outcomes.
Creative Commons License Types
Varieties of CC licenses that define how a work can be used and shared.
Social Engineering
Manipulative tactics used to deceive individuals into revealing confidential information.
Data Ethics
The study of ethical implications related to data usage, including privacy and bias.
Public Key Infrastructure (PKI)
A framework that manages digital certificates and public-key encryption.
Accountability in Computing
Ensuring that developers and companies assume responsibility for their algorithms and their impacts.