Chapter 11: Impact of Computing (Big Idea 5) (copy)

studied byStudied by 1 person
0.0(0)
Get a hint
Hint

World Wide Web

1 / 33

34 Terms

1

World Wide Web

which was originally designed for scientists to share their research.

New cards
2

Multifactor authentication

________ is another layer that is increasingly used.

New cards
3

computational artifacts

Anything a person creates, including any ________ created with a computer, is the intellectual property of that person.

New cards
4

Strong passwords help

________ block those trying to gain unauthorized access.

New cards
5

Targeted advertising

which can be helpful for businesses and consumers when looking for a specific item.

New cards
6

human viruses

Computer viruses are like ________.

New cards
7

Social media

which has been used to stream events across the globe, sometimes helps to change history.

New cards
8

Online learning

is an education model that would not be possible without the tools of communication available via the Internet.

New cards
9

Crowdsourcing allows people to share information and ask the "crowd"

anyone who accesses the site-for feedback, to help solve problems, find employment, or for funding

New cards
10

Machine learning and data mining

help find patterns and identify insights in data, leading to new innovations.

New cards
11

Programmers and businesses

try to identify potential negative uses, but it is seldom possible to think of all the ways other people could use an innovation.

New cards
12

Cloud computing

offers new ways for people to communicate, making collaboration easier and more efficient.

New cards
13

Digital Divide

includes access to information, knowledge, markets, and different cultures.

New cards
14

Bias

which is intentional or unintentional prejudice for or against certain groups of people, shows up in computing innovations too.

New cards
15

Artificial intelligence

programs are used more and more in ways such as screening applications of job candidates, determining if a person merits credit to purchase a house, and locating what areas have more crime.

New cards
16

Crowdsourcing

allows people to share information and ask the ā€œcrowdā€ā€” anyone who accesses the siteā€”for feedback, to help solve problems, find employment, or for funding.

New cards
17

Peer-to-peer networks

exist that are used to illegally share files of all types.

New cards
18

Creative Commons

provides a way for creators of software, images, music, videos, and any computational artifact to share their creations with stipulations for sharing and permission from the author clearly indicated.

New cards
19

Digital data

is easy to find, copy, and paste, so ensuring you have written permission from the creator or owner is important.

New cards
20

Open-Source Software

is software that is freely shared, updated, and supported by anyone who wants to do so.

New cards
21

Open Access

The sharing of huge amounts of public data by organizations, such as the U.S. government, provides the opportunity for anyone to search for information or to help solve problems.

New cards
22

Analytics

identify trends for marketing purposes and help businesses determine what and where customers are searching for their products and their competitorsā€™ products, how long an item sits in a virtual shopping cart, and when people buy.

New cards
23

Data mining

is a field of study that analyzes large datasets.

New cards
24

Personally Identifiable Information (PII)

Any information that identifies you

New cards
25

Digital footprints and fingerprints

are the trail of little pieces of data we leave behind as a sign of our presence as we go through our daily lives.

New cards
26

Cybersecurity

has a global impact because now anyone from anywhere can attempt to gain unauthorized entry to someone elseā€™s computer, data, servers, or network.

New cards
27

Strong passwords

help block those trying to gain unauthorized access.

New cards
28

Multifactor authentication

is another layer that is increasingly used.

New cards
29

Phishing attacks

create e-mail and/or websites that look a legitimate hoping to induce a person to click on the malicious link.

New cards
30

Keylogging software

is a form of malware that captures every keystroke and transmits it to whomever planted it.

New cards
31

Cryptography

is the writing of secret codes.

New cards
32

Encryption

is converting a message to a coded format.

New cards
33

decryption

Deciphering the encrypted message is called

New cards
34

Public key encryption

uses open standards, meaning the algorithms used are published and available to everyone and are discussed by experts and interested parties and known by all.

New cards

Explore top notes

note Note
studied byStudied by 2525 people
... ago
5.0(3)
note Note
studied byStudied by 36 people
... ago
5.0(5)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 91 people
... ago
5.0(2)
note Note
studied byStudied by 25 people
... ago
5.0(1)
note Note
studied byStudied by 5 people
... ago
5.0(1)
note Note
studied byStudied by 37 people
... ago
5.0(2)
note Note
studied byStudied by 37 people
... ago
5.0(2)

Explore top flashcards

flashcards Flashcard (76)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 14 people
... ago
5.0(2)
flashcards Flashcard (57)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (24)
studied byStudied by 19 people
... ago
5.0(1)
flashcards Flashcard (81)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (277)
studied byStudied by 55 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (40)
studied byStudied by 50 people
... ago
5.0(1)
robot