Impact of Computing Innovations and Their Effects

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/90

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

91 Terms

1
New cards

Computing Innovation

Includes a program as a core function.

2
New cards

Program

Collection of statements performing specific tasks.

3
New cards

Software

Another term for a computer program.

4
New cards

Physical Computing Innovation

Tangible innovations like self-driving cars.

<p>Tangible innovations like self-driving cars.</p>
5
New cards

Nonphysical Computing Innovation

Intangible innovations like software or concepts.

6
New cards

Purpose of Computing Innovations

To solve problems or express creativity.

7
New cards

Unanticipated Effects

Consequences not foreseen by innovators.

8
New cards

Harmful Effects

Negative impacts like shortened attention spans.

9
New cards

Beneficial Effects

Positive impacts like increased creativity.

10
New cards

World Wide Web

Originally for scientific information exchange.

11
New cards

Targeted Advertising

Used for business but risks privacy misuse.

12
New cards

Machine Learning

Enables innovation but can perpetuate discrimination.

13
New cards

Data Mining

Extracting patterns from large data sets.

14
New cards

Digital Divide

Gap in access to technology and information.

15
New cards

Socioeconomic Factors

Influence access to computing technology.

16
New cards

Geographic Factors

Location affects technology access and usage.

17
New cards

Demographic Factors

Population characteristics influencing technology access.

18
New cards

Equity Issues

Concerns about fair access to technology.

19
New cards

Computing Bias

Reflects human biases in algorithms and data.

20
New cards

Facial Recognition Bias

Underrepresentation of women and minorities in data.

21
New cards

Algorithm Bias

Biases embedded in software development processes.

22
New cards

Crowdsourcing

Using public data to identify and solve problems.

23
New cards

Crowdsourcing

Sourcing model using a large group online.

24
New cards

Idea Competitions

Contests for generating innovative ideas.

25
New cards

Innovation Contests

Competitions to develop new products or solutions.

26
New cards

Microtasks

Small tasks performed by many individuals simultaneously.

27
New cards

Amazon Mechanical Turk

Marketplace for outsourcing tasks to distributed workers.

<p>Marketplace for outsourcing tasks to distributed workers.</p>
28
New cards

Citizen Science

Public participation in scientific research projects.

29
New cards

Folding@home

Distributed computing project for protein folding research.

30
New cards

Galaxy Zoo

Platform for classifying galaxies using public contributions.

31
New cards

ImageNet

Database using crowdsourced image labeling for algorithms.

32
New cards

CAPTCHA

Test to differentiate humans from bots online.

33
New cards

reCAPTCHA

CAPTCHA variant aiding book digitization efforts.

34
New cards

Intellectual Property

Legal rights to creations of the mind.

35
New cards

Plagiarism

Using someone else's work without proper citation.

36
New cards

Creative Commons

License allowing free distribution of copyrighted works.

37
New cards

Open Access

Free online access to research outputs.

38
New cards

Open Source

Software available for modification and redistribution.

39
New cards

Legal Concerns

Issues arising from digital information ownership.

40
New cards

Ethical Concerns

Moral implications of technology use and access.

41
New cards

Privacy

Concerns regarding personal data security and usage.

42
New cards

Digital Media Piracy

Illegal downloading or streaming of copyrighted content.

43
New cards

Algorithmic Bias

Prejudice in algorithms affecting decision-making.

44
New cards

Computational Systems

Systems designed for processing and analyzing data.

45
New cards

Social Issues

Challenges arising from technology's impact on society.

46
New cards

Privacy

Rights to control personal information usage.

47
New cards

Security

Protection of personal information from unauthorized access.

48
New cards

PII

Personally identifiable information that identifies an individual.

49
New cards

Cookies

Data files tracking user browsing habits.

50
New cards

Targeted Advertising

Ads tailored to individual user preferences.

51
New cards

Social Engineering

Tricking individuals to reveal confidential information.

52
New cards

Phishing Attacks

Fraudulent emails impersonating legitimate entities.

53
New cards

Rogue Access Point

Unauthorized wireless access point to secure networks.

54
New cards

Keylogging

Recording keystrokes to access confidential information.

55
New cards

Geo-location

Tracking user's physical location data.

56
New cards

Browsing History

Record of websites visited by a user.

57
New cards

Information Aggregation

Combining data from various sources to profile individuals.

58
New cards

Email Forwarding

Sharing emails that may expose private information.

59
New cards

Retweeting

Sharing tweets that can reach unintended audiences.

60
New cards

Search Engine History

Record of user searches for targeted suggestions.

61
New cards

Data Interception

Unauthorized access to data during transmission.

62
New cards

Identity Theft

Using PII to impersonate someone else.

63
New cards

Biometric Data

Unique physical characteristics used for identification.

64
New cards

Public Networks

Open networks susceptible to data interception.

65
New cards

Email Indicators

Signs of phishing, like misspellings or strange links.

66
New cards

Information Exploitation

Using personal data for malicious purposes.

67
New cards

Harmful Impact

Negative consequences of sharing information online.

68
New cards

Search Suggestion

Recommendations based on search history.

69
New cards

Security

Ensuring authorized access to systems and data.

70
New cards

Authentication

Process to verify user identity and access rights.

71
New cards

Multifactor Authentication

Access control requiring multiple evidence types.

<p>Access control requiring multiple evidence types.</p>
72
New cards

Knowledge-based Authentication

Access using secret knowledge like passwords.

73
New cards

Possession-based Authentication

Access using a physical token like a key.

74
New cards

Inherence-based Authentication

Access using biometric traits like fingerprints.

<p>Access using biometric traits like fingerprints.</p>
75
New cards

Strong Passwords

Complex passwords that resist guessing and brute force.

76
New cards

Brute Force Attack

Attempting all possible password combinations to gain access.

77
New cards

Lockout Mechanism

Prevents access after a set number of failed attempts.

78
New cards

Biometric Authenticators

Devices that use physical traits for user verification.

79
New cards

Deterministic Methods

Consistent output from a given input for access.

80
New cards

Probabilistic Methods

Variable output from the same input for access.

81
New cards

White Hat Hackers

Ethical hackers assessing security for vulnerabilities.

82
New cards

Black Hat Hackers

Malicious hackers exploiting systems for personal gain.

83
New cards

Malware

Malicious software designed to harm or exploit systems.

84
New cards

Trojan Horse

Malware disguised as harmless software or files.

85
New cards

Spyware

Malware that steals confidential information without consent.

86
New cards

Keylogger

Records keystrokes to capture sensitive information.

87
New cards

Ransomware

Malware that encrypts data and demands payment for access.

88
New cards

Virus

Malware that attaches to files and disrupts systems.

89
New cards

Hacktivists

Hackers promoting political or social causes through hacking.

90
New cards

Cybercriminals

Individuals committing crimes via computer networks.

91
New cards

Access Control

Regulating who can view or use resources in a computing environment.