CS200 AI and Society

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/72

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:01 AM on 12/10/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

73 Terms

1
New cards

Bit

A binary digit. The smallest unit of data that a computer can process and store.

2
New cards

Byte

8 bits

3
New cards

1st Amendment

Freedom of Religion, Speech, Press, Assembly, and Petition

4
New cards

4th Amendment

Protection against Unreasonable Search and Seizure

5
New cards

Privacy Act

U.S. law limiting federal agencies' collection, use, and disclosure of personal data.

6
New cards

Digital Footprint

Trace of online activity, like posts and searches.

7
New cards

Digital Fingerprint

Unique identifiers from devices/browsers that allow tracking.

8
New cards

NSA

National Security Agency

9
New cards

First Party Cookies

Cookies created by the website you are visiting and are used mainly to enhance your user experience by remembering preferences and login details.

10
New cards

Third Party Cookies

Used by advertisers/marketers/data aggregators to track your browsing habits across various websites for targeted advertising.

11
New cards

Net Neutrality

Principle that ISPs must treat all internet traffic equally.

12
New cards

Encryption

Method of scrambling info so only authorized users can access it.

13
New cards

Three Types of Gatekeepers

Links (ISPs), Search (search engines), Social (social media).

14
New cards

Cryptography

The art and science of using mathematical techniques to protect information so that it can be sent securely, even if others intercept it.

15
New cards

Plaintext

The original message is called the plaintext.

16
New cards

Ciphertext

the encoded message is called the ciphertext.

17
New cards

PGP

described as software that allowed ordinary computer users to encrypt their email using strong, public-key cryptography, sparking major political and legal controversy.

18
New cards

Diffie-Hellman

A method of secure key exchange that lets two people who have never met create a shared secret key over an insecure channel — the foundational idea that led to modern public-key cryptography.

19
New cards

HTTP

The standard protocol used to transfer web pages in plaintext without encryption.

20
New cards

HTTPS

HTTP layered on top of SSL/TLS to provide encryption and security for web communication.

21
New cards

Symmetric Encryption

A form of encryption where the same key is used to encrypt and decrypt the message. The book contrasts it with public-key systems.

22
New cards

Asymmetric Encryption

Encryption that uses two keys — a public key for encrypting and a private key for decrypting — allowing secure communication without sharing a secret key first.

23
New cards

Key

A secret value (number) used in an encryption algorithm to transform plaintext into ciphertext and back.

24
New cards

Private Key

The secret half of a key pair that must be kept hidden and is used to decrypt messages encrypted with the matching public key.

25
New cards

Public Key

A key that can be shared with anyone and used by others to encrypt messages that only the corresponding private key can decrypt.

26
New cards

SSL

A cryptographic protocol used to secure communications over the web; the foundation of HTTPS.

27
New cards

Cipher

A mathematical transformation or algorithm used to convert plaintext to ciphertext and back. (Described throughout the crypto chapter.)

28
New cards

Digital Signature

A cryptographic technique using public-key systems to verify that a message truly came from its sender and was not altered.

29
New cards

Certificate

A digitally signed statement that binds a public key to the identity of its owner.

30
New cards

Certificate Authority

A trusted organization that issues digital certificates verifying identities on the internet.

31
New cards

Copyright

ownership of the expression of an idea.

32
New cards

Patent

A government-granted exclusive right to an invention, contrasted with copyright in the book.

33
New cards

Trademark

A legally protected word, phrase, or symbol that identifies a source of goods or services.

34
New cards

Copyright Infringement

Using copyrighted work without permission in a way not allowed by law (e.g., copying or distributing without rights). Discussed repeatedly in the file-sharing chapter.

35
New cards

DRM

Technological restrictions used by copyright holders to control access, copying, and use of digital content.

36
New cards

Creative Commons

A set of licenses that authors can use to allow sharing or reuse of their creative works under specific conditions.

37
New cards

Piracy

Unauthorized copying and distribution of copyrighted digital material, especially over the internet (file sharing, P2P, etc.).

38
New cards

Digital Piracy

Unauthorized copying and distribution of copyrighted digital material, especially over the internet (file sharing, P2P, etc.).

39
New cards

Online Piracy

Unauthorized copying and distribution of copyrighted digital material, especially over the internet (file sharing, P2P, etc.).

40
New cards

Peer to Peer

A networking model where computers share files directly with each other rather than through a central server.

41
New cards

BitTorrent

A P2P protocol that breaks files into pieces and distributes downloading across many peers simultaneously for efficiency.

42
New cards

Centralized vs Decentralized File Sharing

Centralized: one main server indexes or distributes files (e.g., early Napster).•

Decentralized: no single server controls sharing; users connect directly (e.g., BitTorrent).

43
New cards

Fair Use

A legal doctrine that allows limited use of copyrighted works without permission under certain conditions.

44
New cards

The 4 factors of fair use

The purpose and character of the use

The nature of the copyrighted work

The amount and substantiality used

The effect on the market

45
New cards

Digital Millenium Copyright Act

A law that prohibits circumventing DRM and creates "safe harbor" protections for online service providers.

46
New cards

VPN

tool that creates a secure, encrypted connection between your device and the internet, helping protect your privacy and hide your online activity.

47
New cards

Napster

File-sharing services/platforms involved in major copyright lawsuits for enabling users to share copyrighted music, movies, and software without permission.

48
New cards

LimeWire

File-sharing services/platforms involved in major copyright lawsuits for enabling users to share copyrighted music, movies, and software without permission.

49
New cards

Grokster

File-sharing services/platforms involved in major copyright lawsuits for enabling users to share copyrighted music, movies, and software without permission.

50
New cards

RapidShare

File-sharing services/platforms involved in major copyright lawsuits for enabling users to share copyrighted music, movies, and software without permission.

51
New cards

Megaupload

File-sharing services/platforms involved in major copyright lawsuits for enabling users to share copyrighted music, movies, and software without permission.

52
New cards

Artificial Intelligence

The field of creating computer systems that perform tasks normally requiring human intelligence — learning, reasoning, recognizing patterns, making decisions.

53
New cards

Machine Learning

A subset of AI where systems improve their performance by learning from data rather than following explicit instructions.

54
New cards

Deep Learning

A type of machine learning using multi-layered neural networks to automatically extract features and make predictions.

55
New cards

Algorithmic Decision System

Systems that make or support decisions using algorithmic or statistical models, often affecting credit, policing, employment, and more.

56
New cards

Differences and Similarities between AI, ML, DL, and ADS

AI - broad goal of intelligent behavior.

ML - techniques where systems learn from data (subset of AI).

DL - ML using deep neural networks (subset of ML).

ADS - systems that apply these methods to real-world decision-making.

57
New cards

Rationality

A rational agent is one that takes actions expected to achieve the best outcome according to its goals and information.

58
New cards

Rational Agent

A rational agent is one that takes actions expected to achieve the best outcome according to its goals and information.

59
New cards

Turing Test

The Turing test... asks whether a machine can fool a human into thinking it is human.

60
New cards

Features

Measurable properties or inputs used by machine-learning systems to make predictions or decisions.

61
New cards

Examples of Systems that use AI, ML, DL, and ADS

Facial recognition, spam filtering, credit scoring, predictive policing, recommendation systems, speech recognition, and autonomous vehicles.

62
New cards

Black Box AI

AI systems whose internal logic is hidden or too complex to interpret, making their decisions difficult to explain.

63
New cards

Freedom of Speech

The constitutional protection limiting government restrictions on expression.

64
New cards

Incitement

Speech intended and likely to provoke imminent lawless action

65
New cards

Hate Speech

Hostile or prejudiced expression about protected groups; noted in the book as not a legally recognized exception to First Amendment protection.

66
New cards

Defamation

False statements that harm someone's reputation; treated separately from protected speech.

67
New cards

Obscenity

Unprotected speech defined using the Miller test, including sexual material lacking serious value.

68
New cards

Offensive

Sexually explicit but not obscene content, which the government may restrict in certain contexts (broadcast, children).

69
New cards

Indecent

Sexually explicit but not obscene content, which the government may restrict in certain contexts (broadcast, children).

70
New cards

The Miller Test

Appeals to prurient interests

Depicts sexual conduct offensively

Lacks serious literary, artistic, political, or scientific value

71
New cards

Community Standards

Local norms used to judge whether material is obscene under the Miller test.

72
New cards

Communications Decency Act

A law attempting to restrict indecent online material, parts of which were struck down as unconstitutional.

73
New cards

Censorship

Government action suppressing speech or restricting access to information; discussed throughout the chapter.