Big Idea 5 Flashcards

1
Q

Positive Outcomes of Computing Innovations

A
  • WWW
  • Targeted Advertising
  • Social media
  • Machine learning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Downsides when Computing Innovations used in Unintended ways

A
  • Cyberbullying
  • Robbing of homes
  • Discrimination
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cloud Computing

A

offers new ways for communication and collaboration between people. storing documents to the cloud essentially stores the document in a computer server in another location. many people can work on the same document at once and documents can be accessed by different divices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Digital Divide

A

line between the people who can use the internet and www and the people who DONT have access to the Internet and WW.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bias in Computing Innovations

A

unintentionally, prejudice can be shown up in computing innovation as humans write the algorithms. (AI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Crowdsourcing

A

allows people to share information and ask the crowd (anyone who can access the site) for feedback.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Legal/Ethical Concerns

A
  • plagiarism
  • illegal downloads
  • copyright concerns
  • sharing of personal information such as face ID
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Creative Commons

A

provides a way for creator to share their creation for sharing and specific permissions clearly indicated by the author.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Open Source Software

A

software that is freely shared, updated, and supported by anyone who wants to do so. concerns arise if this is used malevolently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Open Access

A

sharing of huge amounts of public data (such as from the US gov) allows anyone to search for information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Search Trends and Analytics

A

using what you’ve searched, companies can predict trends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Mining

A

field of study that analyzes large datasets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Machine Learning

A

uses algorithms to analyze Dara and predict behavior (targeted ads)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PII

A

Personally Identifiable Information. any information that identifies you.

  • address
  • age
  • social security number
  • medical/financial info
  • fingerprint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PII Effects (+ and -)

A
  • saving passwords makes it easier to access them again
  • predict websites based on previous visits
  • ads based on shopping cart
  • using location to show specific ads
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Multifactor Authentication

A

additional steps on top of password to ensure identity (knowledge, another device, biometric data (fingerprint))

17
Q

Cybersecurity

A

protects our electronic devices and networks from attacks and unauthorized use.

18
Q

Cybersecurity attacks

A
  • downloading a computer virus: viruses attach themselves to an infected file and then spread to the code of your device
  • phishing attacks: email/website that looks legitimate to infuse a person to click on the link and insert their private information
  • downloading other malware
  • key logging software: form of malware that captures every keystroke and transmits it to the attacker to help identify passwords
  • accessing public network
19
Q

Solution for computer malware

A

antivirus software, firewalls, and caution

20
Q

Cryptography

A

waiting secret codes

21
Q

Encryption

A

converting a message to a coded formate

22
Q

Decryption

A

deciphering the encrypted message

23
Q

Ciphers

A

coded messages that include:

key - allows creation of secret messages
algorithm - set of steps used to make the message unreadable to anyone without a key

24
Q

Asymmetric Keys

A

two keys are needed (one to encrypt and other to decrypt)

25
Q

Public Key Encryption

A

uses open standards, meaning the algorithms used are published and available to everyone. the public key is used to encrypt data and is published to anyone. messages are then decrypted using a private key.

26
Q

One way function

A

the sender doesn’t need the private key to encrypt the messages, only the relieves needs it to decrypt them

27
Q

CAs

A

Certificate Authorities which identify trusted sites

28
Q

Symmetric Keys used for

A

Encrypting AND Decrypting Dara

29
Q

Malware

A

software that can take control/harm a computer system

30
Q

Rogue Access Point

A

data sent over public networks can be incepted, analyzed, modified