1/33
Flashcards covering key vocabulary and concepts from the chapter on the impact of computing.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Digital Divide
The disparity in access to the Internet based on geographic, socioeconomic, or government-controlled factors, impacting access to information, knowledge, and global participation.
Citizen Science
The participation of nonscientists in scientific research by contributing data, analysis, or computational power, aiding in data collection, problem-solving, and accelerating discoveries.
Bias
Prejudice, whether intentional or unintentional, in algorithms or data used by computing innovations, potentially leading to unfair or discriminatory outcomes.
Crowdsourcing
Obtaining information, feedback, or resources from a large group of people, often online, to solve problems, gather data, or fund projects.
Crowdfunding
Raising money for ventures by collecting small contributions from a large number of people, typically via the Internet.
Intellectual Property
Creations of the mind, such as inventions, literary and artistic works, designs, and symbols, names, and images used in commerce.
Plagiarism
The act of using someone else's work or ideas without permission or proper citation, resulting in academic, professional, or legal consequences.
Creative Commons
A set of licenses that allows creators to share their work with specific permissions for reuse, modification, and distribution, balancing copyright protection with open access.
Open-Source Software
Software that is freely available for anyone to use, modify, and distribute, fostering collaboration, innovation, and community-driven development.
Open Access
The practice of providing unrestricted access to research, data, and information, promoting knowledge dissemination, collaboration, and innovation.
Data Mining
The process of analyzing large datasets to discover patterns, trends, and insights, enabling businesses and researchers to make informed decisions and predictions.
Personally Identifiable Information (PII)
Any information that can be used to identify an individual, including data such as address, age, social security number, medical information, or biometric data.
Cybersecurity
The practice of protecting electronic devices, networks, and data from unauthorized access, attacks, and damage, ensuring confidentiality, integrity, and availability.
Phishing
A type of cyberattack that uses deceptive emails or websites to trick individuals into providing sensitive information, such as passwords or credit card numbers.
Malware
Software designed to infiltrate and damage computer systems without the owner's informed consent.
Virus
Malicious code that attaches itself to other programs and replicates by infecting other computer programs. Viruses are usually spread through infected files or websites.
Keylogging
A type of malware that records every keystroke made on a computer and transmits the captured information to an attacker, enabling them to steal passwords and other sensitive data.
Rogue Access Point
A wireless access point installed on a network without authorization.
Cryptography
The art of writing or solving codes, involving techniques for encrypting and decrypting information to ensure secure communication and data storage.
Encryption
The process of converting data into a coded format to prevent unauthorized access, ensuring confidentiality and security during transmission and storage.
Decryption
The process of converting encrypted data back into its original, readable format, requiring a secret key or password for access.
Public Key Encryption
A cryptographic system that uses pairs of keys: public keys , which may be disseminated widely, and private keys which are known only to the owner. The generation of such keys depends on cryptographic algorithms based on mathematical problems.
Multifactor Authentication
An authentication method that requires the user to provide two or more verification factors to gain access to a resource.
Targeted advertising
A form of advertising where online advertisements are directed towards consumers based on specific traits.
authentication
the process or action of proving or showing something to be true, genuine, or valid.
certificate authority
a trusted entity that issues digital certificates, which verify the identity of individuals, organizations, or devices in the digital world
open source
the source code of a software program is made publicly available.
symmetric key encryption
same key used to encrypt and decrypt a message
legal and ethical concerns
Anything a person creates, including any computational artifacts created with a computer, is the intellectual property of that person. Material created by someone else that you use in any way should always be cited. Peer-to-peer networks exist that are used to illegally share files of all types. Devices that continually monitor and collect data, such as a voice-activated device we install or video cameras used for facial recognition posted in our communities, can have these.
artificial intelligence
are used more and more in ways such as screening applications of job candidates, determining if a person merits credit to purchase a house, and locating what areas have more crime.
machine learning
uses algorithms to analyze data and predict behavior and is used in Artificial Intelligence (AI).
cloud computing
offers new ways for people to communicate, making collaboration easier and more efficient.
analytics
identify trends for marketing purposes and help businesses determine what and where customers are searching for their products and their competitors’ products, how long an item sits in a virtual shopping cart, and when people buy.
digital footprint
are the trail of little pieces of data we leave behind as a sign of our presence as we go through our daily lives.
Many people willingly provide personal information to sites to gain access or privileges, whether it’s through sports teams, shopping, or restaurants.
Their data is stored and may be sold with or without their knowledge or permission.