1/151
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Spreadsheets
good for storing anything that can be represented in columns and rows.
Cell
The intersection of a column and row (referenced by the column first, then the row (A1, B5))
Cell Range
a contiguous (touching) group of cells denoted as (E11:F15)
Formula/Function
allow for instant updating of data, which is the power of a spreadsheet. (They ALWAYS start with an equals sign in a cell)
Common Functions
○ =SUM()-adds the numerical values of a cell range
○ =MAX()-returns the largest number from a cell range
○ =MIN()- returns the smallest number from a cell range
○ =COUNT()-returns the number of cells containing a number from a cell range
○ =AVERAGE()-returns the mean (average) of a cell range
○ =ABS()-returns the absolute value of a cell range
○ =PRODUCT()-multiplies the numerical values of a cell range
○ =QUOTIENT()- returns the integer portion when two numbers are divided
○ =SQRT()-returns the square root of a positive number
Logical Functions
changes the content of a cell, often depending on a condition.
Condition
a statement that returns either TRUE or FALSE.
Common Conditions
○ =IF(condition, True, False)- assigns different content to a cell depending on
whether a condition is TRUE or FALSE
○ =AND(condition, condition)- returns TRUE only if BOTH conditions are TRUE
○ =OR(condition, condition)- returns TRUE if ANY condition is TRUE
○ =COUNTIF(cellrange, condition)- counts the number of cells in a range that
meet a condition
Sorting
arranging data in an ordered sequence
Crowdsourcing
using a community of web users to help get work done.
E-commerce
the conducting of business on the web.
Examples of E-Commerce
○ Business-to-consumer (B2C): ○ Consumer-to-consumer (C2C): ○ Business-to-business (B2B):
Ergonomics
the science of designing things for easy safe use by people.
Intellectual Property
creation/product of the human mind
Copyright
grants the creator/owner of an original work exclusive rights to use or authorize use of the work.
True
True/False: Copyrights are automatically granted
True
True/False: Copyrights last of life of creator +70 years
False
True/False: animals and robots can be granted copyrights
Fair Use
allows for the use of copyrighted material without receiving permission.
Piracy
the unauthorized copy, distribution, or sale of a copyrighted work, such as a computer program or music.
■ Purpose and Character
■ Nature of the Work
■ How Much is Used
■ Commercial Impact
Four Factors of Fair Use
Cybercrime
any crime involving a computer and a network.
Identity Theft
theft of information used to identify an individual, typically used for financial gain.
Fraud
a form of deception, used for financial or personal gain
Data Breach
when secure/classified information is accessed by someone who is unauthorized
Trafficking
conducting deals/trades in an illegal commodity
Extortion
the act of obtaining something by making threats
Malware
malicious software used to infect users devices
Harassment
offensive and repetitive behavior used to intimidate or upset someone
Cyberbullying
the use of technology to threaten, abuse, or dominate others
Digital Divide
refers to the inequality of access to digital technology like computers, smartphones, and the Internet.
Digital Footprint
made up of the data collected about you.
False
True/False: minimizing your digital footprint is not important
Metadata
data stored with a digital file that is not readily seen.
Dark Pattern
a deceptive design trick meant to get you to do something online that you didn't intend to.
Common Dark Patterns
○ Trick questions (don't not opt in?)
○ Sneakinto basket (put something extra in your basket you didn't order)
○ Roachmotel (easy to get in; hard to get out)
○ Confirmshaming (to guilt you into opting in to something)
○ Privacy zuckering (tricked into publicly sharing more than intended)
○ Bait and switch (promise one thing and give you something different)
○ Disguised ads (ads that look like content)uerading as regular content.
Release of Control
Loss of authority over shared online content.
Value of Information
Personal data is often monetized by companies.
True
True/False: You can get denied for a job because of something you posted online.
Security Holes
Daily vulnerabilities allowing unauthorized access.
Antivirus Software
Tools to detect and remove malware.
Virus Signature
Code segment identifying specific malware.
Heuristic Analysis
attempts to identify behavior-based detection of unknown malware signatures
Firewall
Network barrier preventing unauthorized access.
Multi-Factor Authentication
Security requiring multiple verification methods.
Do's and Don'ts of Account Security
○ DO keep copies of your passwords somewhere SAFE ○ DO use a password manager
○ DON'T use an easily guessable password (pet's name, boyfriend's name, your birthdate, etc...)
○ DON'T expect unencrypted communication to ever be private (e.g., email)
○ DON'T use the same password on multiple sites
Internet Scams
using technology to attempt to appeal to greed and fear in order to get what one wants
Phishing
Fraudulent messages (like email or text) seeking sensitive information.
Digital Certificate
Confirms website legitimacy and security.
Certificate Authorities
Entities issuing and managing digital certificates.
Artificial Intelligence (AI)
Computers mimicking human-like cognitive functions.
Machine Learning
Training algorithms to recognize patterns.
Neural Networks
Systems simulating brain neuron functions.
Natural Language Processing
Understanding and analyzing human language.
Artificial Narrow Intelligence (ANI)
AI excelling at specific tasks.
Artificial General Intelligence (AGI)
AI performing at human-like versatility.
Artificial Super Intelligence (ASI)
AI surpassing human intelligence in all areas.
Common AI Uses
○ Face ID
○ Social Media
○ Messaging
○ Google Search
○ Digital Voice Assistants
○ Smart Home Devices
○ Commuting
○ Banking
○ Amazon Recommendations
○ Netflix and other Streaming Platforms
True
True/False: 80% of what you watch on Netflix was recommended to you by their algorithm
ChatGPT
Language model generating responses based on data.
False
True/False: ChatGPT is never wrong
AI Pros
-Automation
-Smart decision making
-medical advancement
-research and data analysis
-performing repetitive tasks