1/29
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
ethics
moral rules and guidelines about what is right and wrong, good and bad
unintended consequence
unanticipated outcomes of a purposeful action
bias
unfair prejudice against a group of people
Web Content Accessibility Guidelines
a set of web accessibility best practices and federal laws that companies must comply with (WCAG)
algorithmic bias
errors in an algorithm that create outcomes that favor one group over another, whether intentional or unintentional
facial recognition technology
a computing-device system that scans a person’s face, measures key features, and uses the measurements to identify an individual
speech recognition software
a computing-device system that recognized human speech patterns, to either convert it to text or to carry out a command
active interception
when a hacker both monitors and changes a user’s data
hacker
a criminal who uses technical knowledge within a computing system
keylogging
using either software or hardware to record a user’s keystrokes in order to gain access to personal information
passive interception
when a hacker monitors a user’s data without changing it
virtual private network
a type of software that encrypts your internet transmission and disguises your online identity
copyright
the exclusive right of the owner of intellectual property to copy, sell, produce, or distribute the material
Creative Commons
a kind of copyright license that allows otherwise copyrighted work to be publicly distributed and used
intellectual property
a person’s or organization’s inventions, ideas, and creations (IP)
open access
research that is freely accessible online. It often has no license restrictions or copyrights
open source
freely available programs that can be redistributed and modified
patent
the legal protection that prevents anyone, except the inventor, from using, making, or selling an invention for a period of time
plagiarism
when material created by someone else is used without their permission or when someone passes off another author’s work as their own
trade secret
the legal protection of companies’ formulas, processes, designs, and any information that have economic value or give them a competitive edge
trademark
any sign, symbol, or phrase that identifies a product or service
plagiarism
using someone’s ideas without giving credit
digital divide
the difference in access to computing devices and the internet due to economic, social, geographical, or other circumstances
digital skill
the ability to use computing devices and their applications
homework gap
the inability of some students to complete homework due to the lack of internet access at home
net neutrality
all internet content is treated equally and not blocked or slowed down based on content, source, platform, or type of equipment
telecentre
a public place that offers access to computers, the internet, and information technologies
tiered internet access
internet access that is cheaper or faster for certain websites
active listening
when a listener repeats back what was heard
consensus building
the process of increasing mutual understanding