Chapter 11: Impact of Computing (Big Idea 5)

studied byStudied by 4 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 33

34 Terms

1
World Wide Web
which was originally designed for scientists to share their research.
New cards
2
Multifactor authentication
________ is another layer that is increasingly used.
New cards
3
computational artifacts
Anything a person creates, including any ________ created with a computer, is the intellectual property of that person.
New cards
4
Strong passwords help
________ block those trying to gain unauthorized access.
New cards
5
Targeted advertising
which can be helpful for businesses and consumers when looking for a specific item.
New cards
6
human viruses
Computer viruses are like ________.
New cards
7
Social media
which has been used to stream events across the globe, sometimes helps to change history.
New cards
8
Online learning
is an education model that would not be possible without the tools of communication available via the Internet.
New cards
9
Crowdsourcing allows people to share information and ask the "crowd"
anyone who accesses the site-for feedback, to help solve problems, find employment, or for funding
New cards
10
Machine learning and data mining
help find patterns and identify insights in data, leading to new innovations.
New cards
11
Programmers and businesses
try to identify potential negative uses, but it is seldom possible to think of all the ways other people could use an innovation.
New cards
12
Cloud computing
offers new ways for people to communicate, making collaboration easier and more efficient. 
New cards
13
**Digital Divide**
includes access to information, knowledge, markets, and different cultures.
New cards
14
Bias
which is intentional or unintentional prejudice for or against certain groups of people, shows up in computing innovations too.
New cards
15
Artificial intelligence
programs are used more and more in ways such as screening applications of job candidates, determining if a person merits credit to purchase a house, and locating what areas have more crime.
New cards
16
Crowdsourcing
allows people to share information and ask the “crowd”— anyone who accesses the site—for feedback, to help solve problems, find employment, or for funding.
New cards
17
Peer-to-peer networks
exist that are used to illegally share files of all types.
New cards
18
Creative Commons
provides a way for creators of software, images, music, videos, and any computational artifact to share their creations with stipulations for sharing and permission from the author clearly indicated.
New cards
19
Digital data
is easy to find, copy, and paste, so ensuring you have written permission from the creator or owner is important.
New cards
20
**Open-Source Software**
is software that is freely shared, updated, and supported by anyone who wants to do so.
New cards
21
**Open Access**
The sharing of huge amounts of public data by organizations, such as the U.S. government, provides the opportunity for anyone to search for information or to help solve problems.
New cards
22
Analytics
identify trends for marketing purposes and help businesses determine what and where customers are searching for their products and their competitors’ products, how long an item sits in a virtual shopping cart, and when people buy.
New cards
23
Data mining
is a field of study that analyzes large datasets.
New cards
24
**Personally Identifiable Information (PII)**
Any information that identifies you
New cards
25
Digital footprints and fingerprints
are the trail of little pieces of data we leave behind as a sign of our presence as we go through our daily lives.
New cards
26
Cybersecurity
has a global impact because now anyone from anywhere can attempt to gain unauthorized entry to someone else’s computer, data, servers, or network.
New cards
27
Strong passwords
help block those trying to gain unauthorized access.
New cards
28
*Multifactor authentication*
is another layer that is increasingly used.
New cards
29
Phishing attacks
create e-mail and/or websites that look a legitimate hoping to induce a person to click on the malicious link.
New cards
30
Keylogging software
is a form of malware that captures every keystroke and transmits it to whomever planted it.
New cards
31
Cryptography
is the writing of secret codes.
New cards
32
Encryption
is converting a message to a coded format. 
New cards
33
decryption
Deciphering the encrypted message is called
New cards
34
Public key encryption
uses open standards, meaning the algorithms used are published and available to everyone and are discussed by experts and interested parties and known by all. 
New cards
robot