Cloud computing: This refers to storing data and running software online instead of on a personal device.
E-Business/E-Commerce: Conducting business and transactions over the Internet.
Scalability: This is the ability of a system to expand or shrink based on demand.
Elasticity: The ability to quickly scale resources up or down as needed.
Redundancy: Keeping backups to prevent downtime in cases of failure.
Digital Divide: This refers to the gap between those to have access to technology and those who don’t, which is due to several factors.
Open-Source Software: Publicly available software that can be used, shared, and modified for free.
Crowdsourcing: Getting information from online sources.
Citizen Science: People who aren’t experts contributing to scientific research with their own data that they collected.
UAV/Drone: UAV stands for Unmanned Aerial Vehicles, which are flying robots that are used for several purposes.
Impact of Computing: Study Guide Questions
Name at least two cloud computing applications that you regularly use.
I use social media cloud applications every day like TikTok and storage applications like Google Photos or Google Drive.
Describe how the increase in the production of technological devices negatively impact our environment.
The production of technology has a serious impact on the environment. Mining for the minerals used in devices damages ecosystems, and manufacturing contributes to toxic waste and growing e-waste pollution.
What is meant by a carbon footprint?
A carbon footprint is the total amount of greenhouse gases produced by human activities.
List three dangers of Deep Fakes.
One major risk of deepfakes is identity theft. Deepfake technology can be used to impersonate people, making scams more convincing. Another concern is misinformation, where deepfakes can make it appear as if someone, like a politician, said or did something they never did. This also affects credibility, making it harder to separate truth from fake content, which can ruin reputations if misused.
List three examples of how Drones are used for commercial, industrial, or military use.
Commercial: Drones help farmers check on crops, apply fertilizers, and manage fields more efficiently.
Industrial: Rescue teams use drones to search for missing people and evaluate damage after disasters.
Military: The military deploys drones to spy on enemy activity and collect critical intelligence.
What is meant by Open-Source Software and how is it different from (or related to) Crowdsourcing and Crowdfunding?
Open-source software is free and open for anyone to use, modify, and improve. It relates to crowdsourcing, where ideas and contributions come from a large group of people. However, crowdfunding is different, it focuses on raising money from many people to support a project.
Give one example of Algorithmic Bias.
One example could be hiring AI that favors men over women due to their specific field being dominated by males, using that data to be biased.
What can be done to minimize or eliminate algorithmic bias?
AI can be trained with diverse data to create more balanced algorithms.
What steps can be taken to eliminate the Digital Divide?
To close the digital divide, internet access and technology need to be more widely available. People should also be taught how to use technology effectively, and public access programs should receive more funding to ensure equal opportunities for everyone.
What is the purpose of Captcha-ReCAPTCHA?
The purpose of Captcha is to verify a user is human and not a robot.
How can the text that is presented in ReCAPTCHA be used?
Recaptcha is used to help train AI and to digitize books.
Impact of Computing: Blown to Bits Questions
Give one advantage and one disadvantage of automated job screening.
One advantage is that it is cheaper and more efficient than human job interviews. One disadvantage is that many feel that it’s dehumanizing and dislike the idea of a machine making important career decisions about them.
What is meant by Algorithmic Transparency?
It is the principle that people have the right to understand how computer algorithms make decisions about them and how their data is being used.
Briefly (one sentence) summarize each of the 7 Koans below:
It’s all just Bits: No matter what we see, technology ultimately works by processing bits of information, so everything is just bits.
Perfection is normal: Digital files never lose quality and are perfect, making them easy to share and reshaping how we think about ownership.
There is Want on the Midst of Plenty: While digital storage keeps growing, anything that isn’t digitized risks being lost, and with all the data online both facts and misinformation are spread freely.
Processing is Power: As technology keeps evolving at a rapid pace, making processing more powerful, this means technology bringing in new possibilities.
More of the Same Can Be a Whole New Thing: Exponential growth can go unnoticed until it makes a big noticeable impact, and falling behind, failing to recognize this growth can have major consequences.
Nothing Goes Away: So much data is collected and stored every day that privacy is a major concern, once data is out there, it’s nearly impossible to erase.
Bits Move Faster Than Thoughts: Instant communication has changed everything, but it also brings challenges like privacy risks, misinformation, and government control.
Give a RISK and an OPPORTUNITY that one of the following new technologies creates:
Encryption
Risk: If encryption is weak, hackers can break in and steal data.
Opportunity: Keeps personal information safe and private from hackers.
Storage Media
Risk: If storage devices aren’t secured, anyone can access the data.
Opportunity: Newer storage devices can hold more data, making it easier to save and manage information.
Social networking
Risk: Social media can lead to bullying and harassment.
Opportunity: Helps people connect, share news, and build communities.
Data networks
Risk: Weak networks can be hacked, putting personal information at risk.
Opportunity: Makes it easy to access information, learn new things, from anywhere in the world.