AP CompSci Unit 4 Vocab

studied byStudied by 4 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 19

20 Terms

1
Digital divide
differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics.
New cards
2
Bias
designing or writing from a particular perspective or point of view (and not including or considering other perspectives or points of view).
New cards
3
Citizen science
scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices.
New cards
4
Crowdsourcing
the practice of obtaining input or information from a large number of people via the Internet.
New cards
5
Intellectual property
material created on a computer is the property of the creator or an organization.
New cards
6
Creative Commons
a public copyright license that enables the free distribution of an otherwise copyrighted work; used when the content creator wants to give others the right to share, use, and build upon the work they have created.
New cards
7
Open source
programs that are made freely available and may be redistributed and modified.
New cards
8
Open access
online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions.
New cards
9
Personally identifiable information (PII)
information about an individual that identifies, links, relates, or describes them.
New cards
10
Multifactor authentication
a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, typically in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are).
New cards
11
Encryption
the process of encoding data to prevent unauthorized access.
New cards
12
Decryption
the process of decoding data.
New cards
13
Symmetric key encryption
involves one key for both encryption and decryption.
New cards
14
Public key encryption
pairs a public key for encryption and a private key for decryption; the sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message.
New cards
15
Certificate authorities
issue digital certificates that validate the ownership of encryption keys used in secure communication and are based on a trust model.
New cards
16
Computer virus
a malicious program that can copy itself and gain access to a computer in an unauthorized way; they often attach themselves to legitimate programs and start running independently on a computer.
New cards
17
Malware
software intended to damage a computing system or to take partial control over its operation.
New cards
18
Phishing
a technique that attempts to trick a user into providing personal information; that personal information can then be used to access sensitive online resources, such as bank accounts and emails.
New cards
19
Keylogging
the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
New cards
20
Rogue access point
a wireless point that gives unauthorized access to secure networks.
New cards
robot