Comp apps chapter 11 and 12

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/71

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:08 AM on 5/11/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

72 Terms

1
New cards

True or False: Technology may have beneficial effects and harmful effects

True

2
New cards

Crowdsourcing

The practice of obtaining information, ideas, services, or contributions from a large group of people online rather than from a single person or organization.

3
New cards

Crowdfunding

A way of raising money for a project, business, or cause by collecting small contributions from a large number of people online.

4
New cards

Example of Crowdfunding

Gofundme

5
New cards

Electronic Finance

The system for moving money digitally (Venmo, Paypal, Zelle)

6
New cards

Digital Currency

Money that only exists online (Bitcoin, Ethereum, Dogecoin)

7
New cards

Blockchain

A system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system.

8
New cards

Collaboration

Working with others remotely using technology (Google Meet, Zoom)

9
New cards

Filter Bubbles

What happens when an app or website keeps showing you content that matches what it already thinks you like, while hiding or showing you less of other viewpoints.

10
New cards

Example of Filter Bubbles:

If you watch a lot of political videos on YouTube, the algorithm keeps recommending more extreme versions of those same views, gradually narrowing what you see.

11
New cards

Encryption

Turning words into gibberish "x7#kP9!zQ"

12
New cards

Two-Factor authentication

A security method that requires users to provide two distinct forms of identification before accessing an account or system

13
New cards

Phishing

A type of cyberattack where criminals impersonate reputable organizations or individuals through email, text, or social media to deceive users into revealing sensitive data

14
New cards

Intellectual Property (IP)

Ownership of something you created with your mind (idea, song, book, invention, or piece of software)

15
New cards

Software License Agreement

A legal contract between the software creator and the user that defines the rules for how the software can be used.

16
New cards

Software License Agreement rules:

  • How many devices you can install it on

  • Whether you can share or copy it

  • Whether you can use it for business purposes

  • Whether you can modify it

17
New cards

Proprietary Software

Private source code. You can use it but can't see how it's built.

18
New cards

Open Source Software

Software is publicly available. Anyone can see, study, and modify the code.

19
New cards

Copyright

A legal right that automatically belongs to someone the moment they create an original work, giving them exclusive control over how that work is used.

20
New cards

Copyrights protects the owner’s right to do the following:

  • Make a copy of their work

  • Create a derivative work

  • Distribute or publish the work

  • Publicly perform/display the work

21
New cards

Free Personal Use

You are free to read, view, or listen to online content and share the URL, but cannot repost or claim it as your own.

22
New cards

Fair Use

Limited use of copyrighted material without permission, allowed for educational purposes or review/criticism. (quoting a paragraph from book for school essay)

23
New cards

Public Domain

Content with no copyright protection — free for anyone to use in any form, treated as if you own it.

24
New cards

Types of Copyright on the Web:

  1. Free Personal Use

  2. Fair Use

  3. Public Domain - No Rights Reserved

25
New cards

Creative Commons License

A license that lets creators give people the right to share, use, and build upon their work under specific conditions.

26
New cards

Attribution (Creative Commons)

You can copy, remix, and build on the work as long as you give the original creator credit.

27
New cards

Noncommercial (Creative Commons)

You can copy and remix the work as long as you don't sell it or make money from it.

28
New cards

No Derivative Work (Creative Commons)

You can copy and share the work but must use it verbatim — no remixing or modifying allowed.

29
New cards

Share Alike (Creative Commons)

You can create derivative works but must release them under the same license as the original.

30
New cards

The Fourth Amendment

Protects Americans from unreasonable searches (basically the government can't just go through your stuff without a good reason)

31
New cards

True or False: European privacy laws are much stricter than American privacy laws.

True

32
New cards

True or False: Two-factor authentication is the process of encrypting data using two different encryption algorithms.

False (about verifying your identity in two different ways)

33
New cards

SELECT ALL THAT APPLY. Which of the following is a stage in the software development cycle?

a. Judging

b. Planning

c. Advertising

d. Deployment

B and D

34
New cards

Which of the following best describes sequential processing?

a. Utilizing a single processor to execute multiple tasks simultaneously.

b. Distributing computational tasks among multiple processors to be executed at the same

time.

c. The execution of tasks one after another to optimize resource allocation.

d. Increasing clock speed to enhance computational performance.

C

35
New cards

Which of the following best describes symmetric key encryption?

a. Each user has their own public key and a private key to encrypt and decrypt messages.

b. Both the sender and receiver of a message use only their own private keys to encrypt or

decrypt a message.

c. The sender and receiver of a message have the same private key.

d. The sender uses the same key to encrypt the message as the receiver uses to decrypt

the message.

D

36
New cards

What does DDoS stand for?

Distributed Denial of Service

37
New cards

Generally speaking, without being a copyright holder you cannot:

a. use the software.

b. sell the software or give it away.

c. alter the software.

d. try the software before you buy it.

B

38
New cards

Which of the following best describes Fair Use?

a. Using materials that are not protected by copyright, trademark, or patent laws.

b. When copyrighted work is copied or distributed without permission from the copyright

owner.

c. A free license that allows your work to be available for public use.

d. The limited use of copyrighted material for educational or scholarly purposes.

D

39
New cards

Europe’s "Right to be Forgotten”

The idea that people should be able to request that old, irrelevant information about them be removed from search engines like Google (it doesn't censor content, it just changes what shows up in Google searches._

40
New cards

California's "Eraser Law

Specifically protects minors by sealing their juvenile internet records, giving young people a fresh start

41
New cards

Difference between Privacy and Security

Privacy = your right to control your information

Security = the tools that protect that right

42
New cards

5 main possibilities of use of information:

1. No Uses — they delete it once they're done with you. Most privacy-friendly option.

2. Approval/Opt-in — they can only use it for extra purposes if you specifically say yes. You have to actively agree. Most protective for the user.

3. Objection/Opt-out — they use it by default, but will stop if you specifically say no. You have to actively go out of your way to stop them. This is how most companies operate.

4. No Limits — they can do whatever they want with your data. Most dangerous for the user.

5. Internal Use — they keep it on file for future dealings with you specifically, like saving your credit card or address for next time you order.

43
New cards

Privacy

The right of people to choose freely under what circumstances and to what extent they will reveal themselves, their attitude, and their behavior to others.

44
New cards

HIPAA

Protects your medical records and health information

45
New cards

PCI

Protects your credit card and payment information

46
New cards

What does OECD stand for?

Organization for Economic Cooperation and Development

47
New cards

OECD's 8 Privacy Principles

1. Limited Collection — only collect data you actually need, and get the person's consent first

2. Quality — the data must be accurate, relevant, and kept up to date

3. Purpose — you can only use the data for the specific reason you said you were collecting it for

4. Use Limitation — don't share or disclose the data outside of that stated purpose

5. Security — protect the data with reasonable security measures so it doesn't get stolen or leaked

6. Openness — be transparent about your data policies, don't hide what you're doing

7. Participation — people have the right to know what data has been collected about them

8. Accountability — whoever is in charge of the data is responsible for following all these rules

48
New cards

Online tracking

Website automatically sending details about your visit to other content providers (to show you ads and other products)

49
New cards

Cell phone tracking

Phone location tracking

50
New cards

Your phone's location can be tracked in two ways:

  1. GPS/Location Services: the obvious one you can turn on/off in your settings

  2. Cell towers: determines the general location of the cell phones, even if “location services” (GPS) is off

  • Phone companies log cell phone calls and details

    • Numbers, duration, etc.

51
New cards

Cookies

Small files a website saves on your computer to remember information about you

52
New cards

3rd party cookies

When a website has ads on it:

  • The ad company (a third party) can place their own cookie on your computer

  • That ad company then tracks you across every website that uses their ads

53
New cards

Identity theft

The crime of posing as someone else for fraudulent purposes

54
New cards

VPN (Virtual Private Network)

Allows for secure connection to a remote computer through the internet.

55
New cards

Malware

 Software that harms computers

56
New cards

Ransomware

Software that locks computers

57
New cards

Virus

A program that reproduces itself and spreads by attaching to shared files.

58
New cards

Worm

A program embedded in email attachments that reproduces itself and sends copies to everyone in your contact list.

59
New cards

Exploit

When software takes advantage of bugs in legitimate programs to attack a system.

60
New cards

Trojan

A program that appears harmless but secretly performs unauthorized malicious activities.

61
New cards

What is the safest way to ensure data privacy?

Encryption

62
New cards

Key

The secret code that both the sender and receiver have that allows the message to be unscrambled and read

63
New cards

Ciphertext

gibberish ("x7#kP9!zQ")

64
New cards

Two types of encryption keys:

  1. Symmetric

  2. Asymmetric

65
New cards

Symmetric Encryption

The same key is used to encrypt and decrypt the message

66
New cards

Asymmetric Encryption

Different keys used, one for encrypting and another one for decrypting the message

67
New cards

RSA

A widely used asymmetric encryption method created by Rivest, Shamir, and Adleman that uses a public key to encrypt data and a private key to decrypt it.

68
New cards
69
New cards

Public Key

Shared with everyone. Anyone can use it to lock/encrypt a message meant for you

70
New cards

Private Key

Only the owner has it, and it unlocks/decrypts the message

71
New cards

Diffie-Helman Key Exchange

A method that lets two people create a shared secret key over the internet without ever directly sending it, making it impossible for outsiders to figure out the key even if they watch the exchange.

72
New cards

Edward Snowden

A former US intelligence contractor who in 2013 leaked classified NSA documents revealing the government was secretly tracking phone calls and monitoring internet traffic of virtually all Americans.