Looks like no one added any tags here yet for you.
The following passage will be used to answer questions #1 - #5:
Markus is finding that it takes too long to track down all of the groceries he needs to buy from a given store. GroceryGrabbr to the rescue! The app allows Markus to input his shopping list and search for his local grocery store in GroceryGrabbr's database. If his grocery store is there, Markus is all set to go! The database stores grocery items, cost, and item location information for each grocery store. When Markus walks into the store, a notification pops up on his smartphone letting him know that GroceryGrabbr is ready to get to work. Each of Markus' grocery items is displayed one at a time, along with the aisle number and shelf location. After Markus grabs his items off the shelf, he hits a button on the app to navigate to the next item. The list of items is arranged so that Markus follows the most efficient path through the grocery store. When Markus finishes shopping, the total amount of money his groceries cost is displayed, which allows him to double check the total cost with the cashier. GroceryGrabbr pays grocery stores a small amount of money for each user who successfully uses the app and checks out of the store with over one hundred dollars worth of groceries.
Which of the following data must be obtained from the user's smartphone in order for GroceryGrabbr to suggest the order for picking up groceries?
The grocery list the user input.
Which of the following data is not obtained using data collection from the smartphone, but is necessary for GroceryGrabbr to create the total cost of groceries on the list?
The cost of groceries.
Which of the following is considered a potential effect of the GroceryGrabbr app rather than a function of the GroceryGrabbr app?
Using the app may result in the user being able to spend less time shopping for groceries and more time with their family and friends.
Which of the following grocery stores is least likely to receive payment from GroceryGrabbr?
A small, local store.
Which of the following is the most likely data privacy concern for GroceryGrabbr users?
A user's location is always being tracked.
The following passage will be used to answer questions #6 - #10:
Snappy is a crowdsourcing app designed with the purpose of making the world a happier place. The app collects photos users submit of "Happy Moments". Photos are tagged with the location where they were taken. Users have access to a map where they can zoom in to photos submitted at specific locations. A leaderboard displays the locations with the most "Happiness Moments" and the users who are the "snappiest" in each city due to the volume and rating of "Happiness Moments" they have submitted. Users can rate other "Happiness Moments" using a limited set of emojis and can also leave comments which are moderated using machine learning in an effort to only allow positive comments, by checking each comment for common negative words learned through a training set.
Which of the following data is necessary for Snappy to display "Happy Moments" for a particular city?
Photos tagged by location that are submitted by any user.
Which of the following data is least likely to be included in the rankings of users on the leaderboard?
The number of comments a "Happiness Moment" received.
Which of the following may be an unintended effect of the use of Snappy?
Large towns might look "happier" than small towns.
Which of the following is least likely to be a benefit of Snappy?
Users may not rank other user's "Happiness Moments" because they want to stay on the top of the leaderboard.
Which of the following is the most likely data privacy concern for Snappy users?
Photos uploaded to the app and tagged with location may contain identifiable information like people's faces or street names.
Computing Innovation
Includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
Personally Identifiable Information (PII)
Information about an individual that identifies, links, relates, or describes them.
Phishing
A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
Keylogging
The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
Malware
Software intended to damage a computing system or to take partial control over its operation.
Rogue Access Point
A wireless access point that give unauthorized access to secure networks.
Encryption
A process of encoding messages to keep them secret, so only "authorized" parties can read it.
Decryption
A process that reverses encryption, taking a secret message and reproducing the original plain text.
Symmetric Key Encryption
Involves one key for both encryption and decryption.
Public Key Encryption
Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message.