AP Comp Sci Unit 5: Impact of Computing

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/57

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

58 Terms

1
New cards

What makes global sharing of apps and programs easy?

The Internet and ease of collaboration.

2
New cards

What can software applications cause unexpectedly?

Unforeseen impacts and consequences.

3
New cards

Why was the World Wide Web originally created?

For scientists to share research.

4
New cards

What is the purpose of targeted advertising?

Helps businesses and consumers find specific items.

5
New cards

How has social media influenced history?

By streaming global events and enabling change.

6
New cards

What do machine learning and data mining help with?

Finding patterns and gaining insights.

7
New cards

What makes online learning possible?

Communication tools via the Internet.

8
New cards

Why can't all software misuse be predicted?

Developers can't foresee every possible use.

9
New cards

What does cloud computing improve?

Communication and collaboration.

10
New cards

What does storing data 'in the cloud' mean?

Stored on remote computer servers.

11
New cards

What does technology help build globally?

A global society.

12
New cards

What are some effects of the digital divide?

Access to info, markets, cultures, and knowledge.

13
New cards

What is bias in computing?

Prejudice in algorithms, intentional or not.

14
New cards

Who writes biased algorithms?

Humans.

15
New cards

Where is AI used that can show bias?

Job screening, credit checks, crime detection.

16
New cards

What does crowdsourcing allow?

Problem-solving and feedback from the public.

17
New cards

What do citizen scientists contribute to?

Data analysis and unused computer time.

18
New cards

How does crowdsourcing help organizations?

It scales processing at low/no cost.

19
New cards

What is intellectual property?

Anything a person creates.

20
New cards

What should you do when using others' content?

Cite the original creator.

21
New cards

What can peer-to-peer networks be used for?

Illegal file sharing.

22
New cards

What devices raise legal/ethical concerns?

Data-collecting devices like cameras or mics.

23
New cards

What does Creative Commons allow?

Sharing with clear permissions.

24
New cards

Why is permission important in digital use?

Data is easy to copy and share.

25
New cards

What is open-source software?

Free, shared, and community-supported software.

26
New cards

What does open-source access enable?

Broader participation in tasks and innovation.

27
New cards

Who shares large public datasets?

Organizations like the U.S. government.

28
New cards

What fields benefit from open databases?

Science, sports, business, entertainment.

29
New cards

What do social media and search engines track?

Popular searches and posts.

30
New cards

How do search engines help businesses?

By identifying user trends and behaviors.

31
New cards

What does data mining study?

Large datasets.

32
New cards

What is machine learning a subset of?

Data mining.

33
New cards

What does machine learning do?

Analyzes data and predicts behavior.

34
New cards

What is PII?

Info that identifies you.

35
New cards

What are examples of PII?

Address, age, social security number.

36
New cards

How is your PII used online?

To personalize content or ads.

37
New cards

What are digital footprints?

Trails of data left online.

38
New cards

Why do people give up personal info?

For access or rewards.

39
New cards

What happens to user data?

It may be stored or sold.

40
New cards

What do incognito modes do?

Hide browsing and download history.

41
New cards

What makes daily life easier online?

Easy access to varied info and services.

42
New cards

Why does cybersecurity matter globally?

Anyone can attack networks from anywhere.

43
New cards

What is data security?

Preventing unauthorized access or changes.

44
New cards

How do strong passwords help?

Block unauthorized access.

45
New cards

What is multifactor authentication?

Extra step for securing login access.

46
New cards

What does cybersecurity protect?

Devices and networks from attacks.

47
New cards

What is phishing?

Fake emails/websites to trick users.

48
New cards

What are computer viruses?

Malicious code that infects files.

49
New cards

What is keylogging software?

Malware that records every keystroke.

50
New cards

What is cryptography?

Writing secret codes.

51
New cards

What is encryption?

Turning messages into code.

52
New cards

What is decryption?

Decoding an encrypted message.

53
New cards

Why encrypt data before sending?

To keep it safe if intercepted.

54
New cards

What does public key encryption use?

Open standards and shared algorithms.

55
New cards

What keeps data secret in public key encryption?

The decryption key.

56
New cards

What is the Internet built on?

A trust model.

57
New cards

What do Certificate Authorities do?

Verify sites via digital certificates.

58
New cards

Why are digital certificates important?

They confirm encryption keys belong to a site.