Big Idea 5 (21-26%) Flashcards

1
Q

digital divide

A

refers to differing access to
computing devices and the Internet, based on
socioeconomic, geographic, or demographic
characteristics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

computing bias

A

Computing innovations can reflect existing
human biases because of biases written into
the algorithms or biases in the data used by the
innovation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

citizen science

A

scientific research
conducted in whole or part by distributed
individuals, many of whom may not be
scientists, who contribute relevant data to
research using their own computing devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

crowdsourcing

A

the practice of obtaining
input or information from a large number of
people via the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

personally identifiable information (PII)

A

information about an individual that identifies,
links, relates, or describes them (EX: age, race, phone #)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

authentication

A

measures protect devices
and information from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

multifactor authentication

A

a method of
computer access control in which a user is only
granted access after successfully presenting
several separate pieces of evidence to an
authentication mechanism ( 2 steps to unlock protected info)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

encryption

A

the process of encoding data to
prevent unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

decryption

A

is the
process of decoding the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

symmetric key encryption

A

involves one key
for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

public key encryption

A

pairs a public key for
encryption and a private key for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

computer virus

A

a malicious program that
can copy itself and gain access to a computer
in an unauthorized way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

malware

A

software intended to damage a
computing system or to take partial control
over its operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

phishing

A

a technique that attempts to trick
a user into providing personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

keylogging

A

the use of a program to record
every keystroke made by a computer user in
order to gain fraudulent access to passwords
and other confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

rogue access point

A

a wireless access
point that gives unauthorized access to secure
networks