1/13
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Digital Divide
Some communities have less access to computing than others
Crowdsourcing
online users combine efforts to help fund projects, generate ideas, or create goods or services
Citizen Science
The participation of volunteers from the public in a scientific research project (crowdsourcing for science)
Creative Commons
Alternative to copyright, provides free licenses to creators to use when making their work public
Open Access
free access to information and unrestricted use of electronic resources for everyone (opposite of copyright)
PII (Personally Identifiable Information)
Information that can be used to identify someone
MFA (Multifactor Authentication)
login process that requires more information than a password
Encryption
The process of scrambling data to prevent unauthorized access
Symmetric Encryption
the same key is used to both encrypt and decrypt data
Public Key Encryption
uses different keys for encrypting versus decrypting data
Cookie
A small amount of text that tracks information about a user visiting a website
Virus
computer malware (malware=bad) that can make copies of itself
Phishing
An attack where a user is tricked into revealing private information, often via a deceptive email
Rogue Access Point
A wireless access point that provides an attacker with unauthorized access to information going over the network