Chapter 5: Impact of Computing 

0.0(0)
studied byStudied by 9 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

World Wide Web

which was originally designed for scientists to share their research.

2
New cards

Targeted advertising

which can be helpful for businesses and consumers when looking for a specific item.

3
New cards

Social media

which has been used to stream events across the globe, sometimes helps to change history.

4
New cards

Machine learning and data mining

help find patterns and identify insights in data, leading to new innovations.

5
New cards

Online learning

is an education model that would not be possible without the tools of communication available via the Internet.

6
New cards

Programmers and businesses

try to identify potential negative uses, but it is seldom possible to think of all the ways other people could use an innovation.

7
New cards

Cloud computing

offers new ways for people to communicate, making collaboration easier and more efficient.

8
New cards

Technology

has had a major impact on the world, enabling innovation through the sharing of resources and computational artifacts.

9
New cards

Bias

which is intentional or unintentional prejudice for or against certain groups of people, shows up in computing innovations too.

10
New cards

Humans

write the algorithms, and our biases can make their way into the algorithms and the data used by innovations without us realizing it.

11
New cards

Artificial intelligence programs

are used more and more in ways such as screening applications of job candidates, determining if a person merits credit to purchase a house, and locating what areas have more crime.

12
New cards

Crowdsourcing

allows people to share information and ask the “crowd”— anyone who accesses the site—for feedback, to help solve problems, find employment, or for funding.

13
New cards

Peer-to-peer networks

exist that are used to illegally share files of all types.

14
New cards

Creative Commons

provides a way for creators of software, images, music, videos, and any computational artifact to share their creations with stipulations for sharing and permission from the author clearly indicated.

15
New cards

Digital data

is easy to find, copy, and paste, so ensuring you have written permission from the creator or owner is important.

16
New cards

Open source software

is software that is freely shared, updated, and supported by anyone who wants to do so.

17
New cards

Social media sites

as well as search engines publish what the most frequent searches and posts are about.

18
New cards

Analytics

identify trends for marketing purposes and help businesses determine what and where customers are searching for their products and their competitors’ products, how long an item sits in a virtual shopping cart, and when people buy.

19
New cards

Data mining

is a field of study that analyzes large datasets.

20
New cards

Machine learning

is a subset of data mining.

21
New cards

Digital footprints and fingerprints

are the trail of little pieces of data we leave behind as a sign of our presence as we go through our daily lives.

22
New cards

Cybersecurity

has a global impact because now anyone from anywhere can attempt to gain unauthorized entry to someone else’s computer, data, servers, or network.

23
New cards

Strong passwords

help block those trying to gain unauthorized access.

24
New cards

Multifactor authentication

is another layer that is increasingly used.

25
New cards

Cybersecurity

protects our electronic devices and networks from attacks and unauthorized use.

26
New cards

Data

may be damaged or the device may be used to further spread the malware.

27
New cards

Phishing

attacks create e-mail and/or websites that look a legitimate hoping to induce a person to click on the malicious link.

28
New cards

Computer viruses

are like human viruses.

29
New cards

Keylogging software

is a form of malware that captures every keystroke and transmits it to whomever planted it.

30
New cards

Cryptography

is the writing of secret codes.

31
New cards

Encryption

is converting a message to a coded format.

32
New cards

Deciphering

the encrypted message is called decryption.

33
New cards

Security

also relates to encrypting data before it is transmitted to ensure it remains secure if it is intercepted during transmission.

34
New cards

Public key encryption

uses open standards, meaning the algorithms used are published and available to everyone and are discussed by experts and interested parties and known by all.