Big Idea 5: Impact of Computing

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

flashcard set

Earn XP

Description and Tags

Flashcards covering key vocabulary and concepts from the chapter on the impact of computing.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

Digital Divide

The disparity in access to the Internet based on geographic, socioeconomic, or government-controlled factors, impacting access to information, knowledge, and global participation.

2
New cards

Citizen Science

The participation of nonscientists in scientific research by contributing data, analysis, or computational power, aiding in data collection, problem-solving, and accelerating discoveries.

3
New cards

Bias

Prejudice, whether intentional or unintentional, in algorithms or data used by computing innovations, potentially leading to unfair or discriminatory outcomes.

4
New cards

Crowdsourcing

Obtaining information, feedback, or resources from a large group of people, often online, to solve problems, gather data, or fund projects.

5
New cards

Crowdfunding

Raising money for ventures by collecting small contributions from a large number of people, typically via the Internet.

6
New cards

Intellectual Property

Creations of the mind, such as inventions, literary and artistic works, designs, and symbols, names, and images used in commerce.

7
New cards

Plagiarism

The act of using someone else's work or ideas without permission or proper citation, resulting in academic, professional, or legal consequences.

8
New cards

Creative Commons

A set of licenses that allows creators to share their work with specific permissions for reuse, modification, and distribution, balancing copyright protection with open access.

9
New cards

Open-Source Software

Software that is freely available for anyone to use, modify, and distribute, fostering collaboration, innovation, and community-driven development.

10
New cards

Open Access

The practice of providing unrestricted access to research, data, and information, promoting knowledge dissemination, collaboration, and innovation.

11
New cards

Data Mining

The process of analyzing large datasets to discover patterns, trends, and insights, enabling businesses and researchers to make informed decisions and predictions.

12
New cards

Personally Identifiable Information (PII)

Any information that can be used to identify an individual, including data such as address, age, social security number, medical information, or biometric data.

13
New cards

Cybersecurity

The practice of protecting electronic devices, networks, and data from unauthorized access, attacks, and damage, ensuring confidentiality, integrity, and availability.

14
New cards

Phishing

A type of cyberattack that uses deceptive emails or websites to trick individuals into providing sensitive information, such as passwords or credit card numbers.

15
New cards

Malware

Software designed to infiltrate and damage computer systems without the owner's informed consent.

16
New cards

Virus

Malicious code that attaches itself to other programs and replicates by infecting other computer programs. Viruses are usually spread through infected files or websites.

17
New cards

Keylogging

A type of malware that records every keystroke made on a computer and transmits the captured information to an attacker, enabling them to steal passwords and other sensitive data.

18
New cards

Rogue Access Point

A wireless access point installed on a network without authorization.

19
New cards

Cryptography

The art of writing or solving codes, involving techniques for encrypting and decrypting information to ensure secure communication and data storage.

20
New cards

Encryption

The process of converting data into a coded format to prevent unauthorized access, ensuring confidentiality and security during transmission and storage.

21
New cards

Decryption

The process of converting encrypted data back into its original, readable format, requiring a secret key or password for access.

22
New cards

Public Key Encryption

A cryptographic system that uses pairs of keys: public keys , which may be disseminated widely, and private keys which are known only to the owner. The generation of such keys depends on cryptographic algorithms based on mathematical problems.

23
New cards

Multifactor Authentication

An authentication method that requires the user to provide two or more verification factors to gain access to a resource.

24
New cards

Targeted advertising

A form of advertising where online advertisements are directed towards consumers based on specific traits.

25
New cards

authentication

the process or action of proving or showing something to be true, genuine, or valid.

26
New cards

certificate authority

a trusted entity that issues digital certificates, which verify the identity of individuals, organizations, or devices in the digital world

27
New cards

open source

the source code of a software program is made publicly available.

28
New cards

symmetric key encryption

same key used to encrypt and decrypt a message

29
New cards

legal and ethical concerns

Anything a person creates, including any computational artifacts created with a computer, is the intellectual property of that person. Material created by someone else that you use in any way should always be cited. Peer-to-peer networks exist that are used to illegally share files of all types. Devices that continually monitor and collect data, such as a voice-activated device we install or video cameras used for facial recognition posted in our communities, can have these.

30
New cards

artificial intelligence

are used more and more in ways such as screening applications of job candidates, determining if a person merits credit to purchase a house, and locating what areas have more crime.

31
New cards

machine learning

uses algorithms to analyze data and predict behavior and is used in Artificial Intelligence (AI).

32
New cards

cloud computing

offers new ways for people to communicate, making collaboration easier and more efficient.

33
New cards

analytics

identify trends for marketing purposes and help businesses determine what and where customers are searching for their products and their competitors’ products, how long an item sits in a virtual shopping cart, and when people buy.

34
New cards

digital footprint

  • are the trail of little pieces of data we leave behind as a sign of our presence as we go through our daily lives.

  • Many people willingly provide personal information to sites to gain access or privileges, whether it’s through sports teams, shopping, or restaurants.

    • Their data is stored and may be sold with or without their knowledge or permission.