1/71
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
True or False: Technology may have beneficial effects and harmful effects
True
Crowdsourcing
The practice of obtaining information, ideas, services, or contributions from a large group of people online rather than from a single person or organization.
Crowdfunding
A way of raising money for a project, business, or cause by collecting small contributions from a large number of people online.
Example of Crowdfunding
Gofundme
Electronic Finance
The system for moving money digitally (Venmo, Paypal, Zelle)
Digital Currency
Money that only exists online (Bitcoin, Ethereum, Dogecoin)
Blockchain
A system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system.
Collaboration
Working with others remotely using technology (Google Meet, Zoom)
Filter Bubbles
What happens when an app or website keeps showing you content that matches what it already thinks you like, while hiding or showing you less of other viewpoints.
Example of Filter Bubbles:
If you watch a lot of political videos on YouTube, the algorithm keeps recommending more extreme versions of those same views, gradually narrowing what you see.
Encryption
Turning words into gibberish "x7#kP9!zQ"
Two-Factor authentication
A security method that requires users to provide two distinct forms of identification before accessing an account or system
Phishing
A type of cyberattack where criminals impersonate reputable organizations or individuals through email, text, or social media to deceive users into revealing sensitive data
Intellectual Property (IP)
Ownership of something you created with your mind (idea, song, book, invention, or piece of software)
Software License Agreement
A legal contract between the software creator and the user that defines the rules for how the software can be used.
Software License Agreement rules:
How many devices you can install it on
Whether you can share or copy it
Whether you can use it for business purposes
Whether you can modify it
Proprietary Software
Private source code. You can use it but can't see how it's built.
Open Source Software
Software is publicly available. Anyone can see, study, and modify the code.
Copyright
A legal right that automatically belongs to someone the moment they create an original work, giving them exclusive control over how that work is used.
Copyrights protects the owner’s right to do the following:
Make a copy of their work
Create a derivative work
Distribute or publish the work
Publicly perform/display the work
Free Personal Use
You are free to read, view, or listen to online content and share the URL, but cannot repost or claim it as your own.
Fair Use
Limited use of copyrighted material without permission, allowed for educational purposes or review/criticism. (quoting a paragraph from book for school essay)
Public Domain
Content with no copyright protection — free for anyone to use in any form, treated as if you own it.
Types of Copyright on the Web:
Free Personal Use
Fair Use
Public Domain - No Rights Reserved
Creative Commons License
A license that lets creators give people the right to share, use, and build upon their work under specific conditions.
Attribution (Creative Commons)
You can copy, remix, and build on the work as long as you give the original creator credit.
Noncommercial (Creative Commons)
You can copy and remix the work as long as you don't sell it or make money from it.
No Derivative Work (Creative Commons)
You can copy and share the work but must use it verbatim — no remixing or modifying allowed.
Share Alike (Creative Commons)
You can create derivative works but must release them under the same license as the original.
The Fourth Amendment
Protects Americans from unreasonable searches (basically the government can't just go through your stuff without a good reason)
True or False: European privacy laws are much stricter than American privacy laws.
True
True or False: Two-factor authentication is the process of encrypting data using two different encryption algorithms.
False (about verifying your identity in two different ways)
SELECT ALL THAT APPLY. Which of the following is a stage in the software development cycle?
a. Judging
b. Planning
c. Advertising
d. Deployment
B and D
Which of the following best describes sequential processing?
a. Utilizing a single processor to execute multiple tasks simultaneously.
b. Distributing computational tasks among multiple processors to be executed at the same
time.
c. The execution of tasks one after another to optimize resource allocation.
d. Increasing clock speed to enhance computational performance.
C
Which of the following best describes symmetric key encryption?
a. Each user has their own public key and a private key to encrypt and decrypt messages.
b. Both the sender and receiver of a message use only their own private keys to encrypt or
decrypt a message.
c. The sender and receiver of a message have the same private key.
d. The sender uses the same key to encrypt the message as the receiver uses to decrypt
the message.
D
What does DDoS stand for?
Distributed Denial of Service
Generally speaking, without being a copyright holder you cannot:
a. use the software.
b. sell the software or give it away.
c. alter the software.
d. try the software before you buy it.
B
Which of the following best describes Fair Use?
a. Using materials that are not protected by copyright, trademark, or patent laws.
b. When copyrighted work is copied or distributed without permission from the copyright
owner.
c. A free license that allows your work to be available for public use.
d. The limited use of copyrighted material for educational or scholarly purposes.
D
Europe’s "Right to be Forgotten”
The idea that people should be able to request that old, irrelevant information about them be removed from search engines like Google (it doesn't censor content, it just changes what shows up in Google searches._
California's "Eraser Law
Specifically protects minors by sealing their juvenile internet records, giving young people a fresh start
Difference between Privacy and Security
Privacy = your right to control your information
Security = the tools that protect that right
5 main possibilities of use of information:
1. No Uses — they delete it once they're done with you. Most privacy-friendly option.
2. Approval/Opt-in — they can only use it for extra purposes if you specifically say yes. You have to actively agree. Most protective for the user.
3. Objection/Opt-out — they use it by default, but will stop if you specifically say no. You have to actively go out of your way to stop them. This is how most companies operate.
4. No Limits — they can do whatever they want with your data. Most dangerous for the user.
5. Internal Use — they keep it on file for future dealings with you specifically, like saving your credit card or address for next time you order.
Privacy
The right of people to choose freely under what circumstances and to what extent they will reveal themselves, their attitude, and their behavior to others.
HIPAA
Protects your medical records and health information
PCI
Protects your credit card and payment information
What does OECD stand for?
Organization for Economic Cooperation and Development
OECD's 8 Privacy Principles
1. Limited Collection — only collect data you actually need, and get the person's consent first
2. Quality — the data must be accurate, relevant, and kept up to date
3. Purpose — you can only use the data for the specific reason you said you were collecting it for
4. Use Limitation — don't share or disclose the data outside of that stated purpose
5. Security — protect the data with reasonable security measures so it doesn't get stolen or leaked
6. Openness — be transparent about your data policies, don't hide what you're doing
7. Participation — people have the right to know what data has been collected about them
8. Accountability — whoever is in charge of the data is responsible for following all these rules
Online tracking
Website automatically sending details about your visit to other content providers (to show you ads and other products)
Cell phone tracking
Phone location tracking
Your phone's location can be tracked in two ways:
GPS/Location Services: the obvious one you can turn on/off in your settings
Cell towers: determines the general location of the cell phones, even if “location services” (GPS) is off
Phone companies log cell phone calls and details
Numbers, duration, etc.
Cookies
Small files a website saves on your computer to remember information about you
3rd party cookies
When a website has ads on it:
The ad company (a third party) can place their own cookie on your computer
That ad company then tracks you across every website that uses their ads
Identity theft
The crime of posing as someone else for fraudulent purposes
VPN (Virtual Private Network)
Allows for secure connection to a remote computer through the internet.
Malware
 Software that harms computers
Ransomware
Software that locks computers
Virus
A program that reproduces itself and spreads by attaching to shared files.
Worm
A program embedded in email attachments that reproduces itself and sends copies to everyone in your contact list.
Exploit
When software takes advantage of bugs in legitimate programs to attack a system.
Trojan
A program that appears harmless but secretly performs unauthorized malicious activities.
What is the safest way to ensure data privacy?
Encryption
Key
The secret code that both the sender and receiver have that allows the message to be unscrambled and read
Ciphertext
gibberish ("x7#kP9!zQ")
Two types of encryption keys:
Symmetric
Asymmetric
Symmetric Encryption
The same key is used to encrypt and decrypt the message
Asymmetric Encryption
Different keys used, one for encrypting and another one for decrypting the message
RSA
A widely used asymmetric encryption method created by Rivest, Shamir, and Adleman that uses a public key to encrypt data and a private key to decrypt it.
Public Key
Shared with everyone. Anyone can use it to lock/encrypt a message meant for you
Private Key
Only the owner has it, and it unlocks/decrypts the message
Diffie-Helman Key Exchange
A method that lets two people create a shared secret key over the internet without ever directly sending it, making it impossible for outsiders to figure out the key even if they watch the exchange.
Edward Snowden
A former US intelligence contractor who in 2013 leaked classified NSA documents revealing the government was secretly tracking phone calls and monitoring internet traffic of virtually all Americans.