Units 1 & 2 Vocabulary/Key Terminology
Digital Divide
Unequal access, locally and globally, to computing devices and the Internet, based on socioeconomic, geographic, and demographic characteristics such as income levels, education (low literacy), race, gender, location (urban-rural), age, skills, awareness, political, cultural, and psychological attitudes (lack of motivation).
Intellectual Property
Material created on a computer by an individual or organization.
Plagiarism
The practice of taking someone else's work or ideas and passing them off as one's own.
Creative Commons
A kind of copyright that makes it easier for people to copy, share, and build on your creative work, as long as they give you credit for it.
Open Source
Programs that are made freely available and may be redistributed and modified
Open Access
A policy that allows people to have access to documents (like research papers) for reading or data (like government datasets) for analysis.
Crowdsourcing
Inviting broad communities of people - customers, employees, independent scientists and researchers, and even the public at large - into the new product innovation process
Crowdfunding
Raising money for a project or venture by obtaining many small amounts of money from many people
Citizen Science
Lots of people to help with a scientific project, like asking everyone around the world to count the butterflies they see one day
Cookies
Small computer programs left behind on your computer when you visit a website
Personally Identifiable Information (PII)
Information about an individual that identifies, links, relates, or describes them
Virus
A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Keylogging
The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
Phishing
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
Malware
Software that is intended to damage or disable computers and computer systems.
Ransomware
Software that encrypts programs and data until a ransom is paid to remove it.
Data Compression
A process for reducing the number of bits needed to represent a piece of information
Lossy Compression
Data compression techniques in which some amount of data is lost. This technique attempts to eliminate redundant information
Lossless Compression
A data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data.
Metadata
data that describes other data
Data Filtering
choosing a smaller subset of a data set to use for analysis, for example by eliminating / keeping only certain rows in a table
Binary
The binary system is base 2, using only bits 0 and 1.
Byte
8 bits
Bit
binary digit, a 0 or a 1
RGB Triplet
A set of numbers representing intensities of red, green, and blue