CSP - Big Idea 5: Impact of Computing

0.0(0)
Studied by 2 people
0%Big Idea 5 Mastery
0%Exam Mastery
Build your Mastery score
multiple choiceMultiple Choice
call kaiCall Kai
Supplemental Materials
Card Sorting

1/33

Last updated 3:24 PM on 4/22/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

34 Terms

1
New cards
World Wide Web
which was originally designed for scientists to share their research.
2
New cards
Targeted advertising
which can be helpful for businesses and consumers when looking for a specific item.
3
New cards
Social media
which has been used to stream events across the globe, sometimes helps to change history.
4
New cards
Machine learning and data mining
help find patterns and identify insights in data, leading to new innovations.
5
New cards
Online learning
is an education model that would not be possible without the tools of communication available via the Internet.
6
New cards
Programmers and businesses
try to identify potential negative uses, but it is seldom possible to think of all the ways other people could use an innovation.
7
New cards
Cloud computing
offers new ways for people to communicate, making collaboration easier and more efficient.
8
New cards
Technology
has had a major impact on the world, enabling innovation through the sharing of resources and computational artifacts.
9
New cards
Bias
which is intentional or unintentional prejudice for or against certain groups of people, shows up in computing innovations too.
10
New cards
Humans
write the algorithms, and our biases can make their way into the algorithms and the data used by innovations without us realizing it.
11
New cards
Artificial intelligence programs
are used more and more in ways such as screening applications of job candidates, determining if a person merits credit to purchase a house, and locating what areas have more crime.
12
New cards
Crowdsourcing
allows people to share information and ask the “crowd”— anyone who accesses the site—for feedback, to help solve problems, find employment, or for funding.
13
New cards
Peer-to-peer networks
exist that are used to illegally share files of all types.
14
New cards
Creative Commons
provides a way for creators of software, images, music, videos, and any computational artifact to share their creations with stipulations for sharing and permission from the author clearly indicated.
15
New cards
Digital data
is easy to find, copy, and paste, so ensuring you have written permission from the creator or owner is important.
16
New cards
Open source software
is software that is freely shared, updated, and supported by anyone who wants to do so.
17
New cards
Social media sites
as well as search engines publish what the most frequent searches and posts are about.
18
New cards
Analytics
identify trends for marketing purposes and help businesses determine what and where customers are searching for their products and their competitors’ products, how long an item sits in a virtual shopping cart, and when people buy.
19
New cards
Data mining
is a field of study that analyzes large datasets.
20
New cards
Machine learning
is a subset of data mining.
21
New cards
Digital footprints and fingerprints
are the trail of little pieces of data we leave behind as a sign of our presence as we go through our daily lives.
22
New cards
Cybersecurity
has a global impact because now anyone from anywhere can attempt to gain unauthorized entry to someone else’s computer, data, servers, or network.
23
New cards
Strong passwords
help block those trying to gain unauthorized access.
24
New cards
Multifactor authentication
is another layer that is increasingly used.
25
New cards
Cybersecurity
protects our electronic devices and networks from attacks and unauthorized use.
26
New cards
Data
may be damaged or the device may be used to further spread the malware.
27
New cards
Phishing
attacks create e-mail and/or websites that look a legitimate hoping to induce a person to click on the malicious link.
28
New cards
Computer viruses
are like human viruses.
29
New cards
Keylogging software
is a form of malware that captures every keystroke and transmits it to whomever planted it.
30
New cards
Cryptography
is the writing of secret codes.
31
New cards
Encryption
is converting a message to a coded format.
32
New cards
Deciphering
the encrypted message is called decryption.
33
New cards
Security
also relates to encrypting data before it is transmitted to ensure it remains secure if it is intercepted during transmission.
34
New cards
Public key encryption
uses open standards, meaning the algorithms used are published and available to everyone and are discussed by experts and interested parties and known by all.

Explore top notes

Explore top flashcards

flashcards
Travel and leisure
112
Updated 325d ago
0.0(0)
flashcards
Module 11
65
Updated 727d ago
0.0(0)
flashcards
Lit - 4th Mid
24
Updated 1074d ago
0.0(0)
flashcards
Unit 3 vocab
20
Updated 1208d ago
0.0(0)
flashcards
Chemistry - Ions and molecules
57
Updated 400d ago
0.0(0)
flashcards
Prefix/Suffix
52
Updated 215d ago
0.0(0)
flashcards
Important Root Words
98
Updated 1117d ago
0.0(0)
flashcards
Travel and leisure
112
Updated 325d ago
0.0(0)
flashcards
Module 11
65
Updated 727d ago
0.0(0)
flashcards
Lit - 4th Mid
24
Updated 1074d ago
0.0(0)
flashcards
Unit 3 vocab
20
Updated 1208d ago
0.0(0)
flashcards
Chemistry - Ions and molecules
57
Updated 400d ago
0.0(0)
flashcards
Prefix/Suffix
52
Updated 215d ago
0.0(0)
flashcards
Important Root Words
98
Updated 1117d ago
0.0(0)