1/8
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Computing Innovation
Includes a progran as an integral part of its function. Can be physical (self driving car), non-physical (picture editing) or non-physical computing concepts (e-commerce).
Personally Identifiable Information (PII)
Information about an individual that identifies, links, relates, or describes them.
Keylogging
The use of a program to record every keystroke made by a computer
Decryption
A process that reverses encryption, taking a secret message and reproducing the original plain text.
Encryption
A process of encoding messages to keep them secret, so only “authorized parties” can read it.
Public Key Encryption
Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message but the receiver’s private key is required to decrypt the message
Symmetric key encryption
Involves one key for encryption and decryption
Computer Virus Scanning Software
Protects a computing system against infection.
Multi-factor Authentication
A system that requires at least 2 steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.