Big Idea 5 - Impact of Computing Flashcards

1
Q

Bias in Algorithms

A

Refers to systematic errors or unfairness present in computer programs or algorithms due to human biases or flawed data inputs. These biases can result in discriminatory outcomes or perpetuate existing inequalities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Citizen Science

A

Refers to the involvement of ordinary people in scientific research and data collection. It allows individuals without formal scientific training to contribute to scientific projects and make meaningful contributions to research.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computing Innovation

A

Refers to the creation and development of new technologies, systems, or applications that improve or revolutionize the way we use computers. It involves introducing novel ideas, methods, or solutions to address problems or enhance existing processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Copyright

A

A legal protection granted to the creators of original works (such as books, music, art) that prevents others from copying, distributing, or using their work without permission. It gives creators exclusive rights over their creations for a specific period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Creative Commons

A

A licensing system that allows creators to share their work with specific permissions for others to use, remix, or distribute it. It provides a way for creators to grant certain rights while still retaining some control over their work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cross-Purpose Technology

A

Refers to the use of a single technology or tool for multiple purposes, often in different contexts or industries. It allows for versatility and efficiency by adapting existing technologies to meet various needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Crowdsourcing

A

The practice of obtaining ideas, services, or content by soliciting contributions from a large group of people, typically through an online platform. It harnesses the collective intelligence and skills of a crowd to solve problems or generate innovative solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data mining

A

Involves extracting useful patterns or knowledge from large datasets using techniques such as statistical analysis, machine learning, and pattern recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital divide

A

Refers to the gap between individuals or communities who have access to and can effectively use digital technologies, such as computers and the internet, and those who do not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Intellectual Property

A

Refers to creations of the mind, such as inventions, artistic works, designs, symbols, and names that are protected by law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internet Access

A

Refers to the ability to connect to and use the internet. It allows individuals to browse websites, send emails, stream videos, and engage in various online activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Keylogging Technology

A

Refers to software or hardware that records keystrokes made on a computer or mobile device without the user’s knowledge or consent. It can be used for various purposes, including monitoring user activity, capturing sensitive information such as passwords, and conducting surveillance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Machine learning

A

A branch of artificial intelligence that enables computers to learn from data and improve their performance without being explicitly programmed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malware

A

Refers to malicious software designed with the intent to harm computers, networks, or users by disrupting operations, stealing sensitive information, or gaining unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Multifactor Authentication

A

A security measure that requires users to provide two or more different types of identification in order to access a system or application. It adds an extra layer of protection by combining something the user knows (like a password) with something they have (like a fingerprint) or something they are (like facial recognition).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Open Access

A

Refers to unrestricted online access to scholarly research articles. It allows anyone with internet access to read, download, copy, distribute, print, or use the articles for any lawful purpose without financial, legal, or technical barriers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Open Source

A

Refers to software whose source code is freely available for anyone to view, modify, and distribute. It encourages collaboration and community-driven development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Personally Identifiable Information (PII)

A

Refers to any data that can be used alone or in combination with other information to identify an individual. It includes details like name, address, social security number, or email address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Phishing

A

An attempt by cybercriminals to trick individuals into revealing sensitive information such as passwords, credit card numbers, or social security numbers by posing as trustworthy entities through emails, messages, or websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Plagiarism

A

The act of using someone else’s words, ideas, or creations without giving them proper credit. It involves presenting someone else’s work as your own.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Private Key

A

A cryptographic key that is kept secret and used to decrypt encrypted data or create digital signatures. It is unique to an individual or entity and should be securely stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Public Key

A

In cryptography, this is part of an asymmetric cryptographic system used for encrypting data. It can be freely shared with others without compromising security since it cannot be used alone to decrypt the encrypted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Public Key Encryption

A

A cryptographic method that uses two different keys - a public key for encryption and a private key for decryption. It allows secure communication between two parties without the need to share their private keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Societal Changes

A

Refer to shifts in social norms, behaviors, values, attitudes, or structures within a community or society as a result of various factors such as technological advancements or cultural influences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Symmetric key encryption

A

A method of encryption where the same key is used for both the encryption and decryption processes. It is like having a single key to lock and unlock a door.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Targeted advertising

A

Refers to the practice of delivering personalized advertisements to specific individuals or groups based on their demographics, interests, or online behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Trust Model

A

A framework or system that determines how entities establish and maintain trust in a networked environment. It defines the rules, protocols, and mechanisms for verifying identities and ensuring secure communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Unforeseen Consequences

A

Refer to unexpected outcomes or results that occur as a result of an action or decision. These consequences may be positive or negative and can have unintended impacts on various aspects such as technology adoption, society, or the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Virus

A

In computing, this is a type of malicious software (malware) that replicates itself by inserting copies into other programs or files. Viruses can cause damage to computer systems, steal personal information, or disrupt normal operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

World Wide Web

A

An interconnected system of web pages and documents that are accessed over the internet. It allows users to navigate between different websites using hyperlinks and interact with various types of content like text, images, videos, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Worm

A

A type of malware that replicates itself and spreads across computer networks without any user intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

3D printing

A

The process of creating physical objects from a digital model by adding layers of material on top of each other. It allows for the production of complex and customized objects.

33
Q

Computing Bias

A

Refers to unfair or discriminatory outcomes resulting from biased algorithms or data used in computer systems. It can perpetuate social inequalities or reinforce stereotypes.

34
Q

Legal and Ethical Concerns

A

Refer to the rules, regulations, and moral principles that govern the use of technology. It involves understanding and abiding by laws related to privacy, intellectual property, cybersecurity, and responsible computing practices.

35
Q

Safe Computing

A

Refers to practicing responsible behaviors while using computers or other devices connected to a network. It involves taking precautions against malware attacks (such as viruses), protecting personal information online (like passwords), and being aware of potential risks when browsing websites or downloading files.

36
Q

Digital Literacy Programs

A

Digital literacy programs are initiatives aimed at teaching individuals the skills needed to effectively use technology and navigate the digital world. They focus on topics such as computer basics, internet safety, online communication, and information literacy.

37
Q

Educational Access

A

Refers to the availability and opportunity for individuals to obtain a quality education, regardless of their background or circumstances. It ensures that everyone has equal access to educational resources, facilities, and opportunities.

38
Q

Equity

A

Refers to fairness and justice in providing equal opportunities and resources to all individuals, regardless of their background or circumstances. It aims to address historical disadvantages and ensure that everyone has a level playing field.

39
Q

Federal Communications Commission (FCC)

A

An independent agency of the United States government responsible for regulating communication technologies. It oversees various areas, including radio, television, internet services, and telecommunications infrastructure.

40
Q

Financial Access

A

Refers to the ability of individuals or communities to obtain financial services such as banking, credit, loans, and insurance. It ensures that everyone has equal opportunities for economic growth and stability.

41
Q

Virtual Learning Systems

A

Online platforms or software that provide educational content and resources for students to learn remotely. They offer interactive lessons, assignments, and assessments that can be accessed from anywhere with an internet connection.

42
Q

Algorithm

A

A step-by-step procedure or set of rules for solving a specific problem or accomplishing a task within a finite number of steps.

43
Q

Bias

A

Rrefers to the tendency of a system or process to favor certain outcomes or groups over others, often resulting in unfair or unequal treatment.

44
Q

Computing Innovations

A

Refer to new ideas, technologies, or applications that bring about significant advancements in the field of computer science.

45
Q

Criminal risk assessment tools

A

Algorithms or software programs used to evaluate the likelihood of an individual committing future criminal offenses based on various factors such as past behavior, demographics, and social environment.

46
Q

Data

A

Refers to information that is collected, stored, and processed by computers. It can be in the form of numbers, text, images, or any other type of digital content.

47
Q

Demographic Parity

A

Refers to achieving equal representation or proportional representation of different demographic groups in a particular context, such as employment or education. It aims to ensure that individuals from various backgrounds have fair and equitable opportunities.

48
Q

Equal Opportunity

A

Refers to the principle that every individual should have the same access to resources, rights, and opportunities without discrimination based on factors such as race, gender, or socioeconomic status. It promotes fairness and aims to level the playing field for everyone.

49
Q

Facial recognition systems

A

Technologies that analyze facial features from images or videos and match them against existing databases for identification purposes. They use algorithms to detect and compare unique facial patterns.

50
Q

Fairness metrics

A

Measures used to evaluate how fair or unbiased a machine learning model is in its decision-making process. They assess whether the model treats different groups of individuals equally and without discrimination.

51
Q

Machine learning models

A

Computer programs that can learn from data and make predictions or decisions without being explicitly programmed. They use statistical techniques to identify patterns in data and generalize from them.

52
Q

Recruiting algorithms

A

Machine learning models that are used by companies to automate and streamline the hiring process. These algorithms analyze applicant data and make predictions about their suitability for a job.

53
Q

Crowdfunding

A

A method of raising money for a project or venture by collecting small amounts of money from a large number of people through an online platform. It allows individuals or organizations to gather financial support for their ideas or initiatives.

54
Q

AI Art

A

A form of artistic expression created with artificial intelligence technology. It involves using algorithms and machine learning techniques to generate visual or auditory artworks that mimic human creativity.

55
Q

Echo chambers

A

Refer to online environments or social circles where individuals are exposed only to ideas, opinions, and perspectives that align with their own beliefs, reinforcing their existing views and limiting exposure to diverse viewpoints.

56
Q

Fair Use

A

A legal doctrine that allows limited use of copyrighted material without permission from the copyright owner. It provides exceptions to copyright law for purposes such as criticism, comment, news reporting, teaching, scholarship, and research.

57
Q

First Amendment

A

Refers to the part of the United States Constitution that guarantees the freedom of speech, religion, press, assembly, and petition. It protects individuals’ rights to express themselves and their opinions without government interference.

58
Q

Misinformation

A

Refers to false or inaccurate information that is spread unintentionally or deliberately, often through various media channels.

59
Q

Moral Rights

A

Refer to the legal rights that creators have over their work, which include the right to be recognized as the author and the right to protect the integrity of their work.

60
Q

Open sourcing

A

Refers to making source code available to the public so that anyone can view, modify, or distribute it. It promotes collaboration and transparency in software development.

61
Q

Adware

A

Software that displays unwanted advertisements on a user’s device without their consent. It often comes bundled with free applications and can slow down the device’s performance.

62
Q

Authentication

A

The process of verifying the identity of a user or device attempting to access a system or network. It ensures that only authorized individuals or devices can gain access by using credentials such as usernames, passwords, biometrics, or digital certificates.

63
Q

Backups

A

Refer to making copies of important files or data in case the original is lost, damaged, or corrupted. It is a preventive measure taken to ensure data recovery in the event of accidental deletion, hardware failure, or other unforeseen circumstances.

64
Q

Biometric Data

A

Refers to unique physical or behavioral characteristics of an individual that can be used for identification purposes, such as fingerprints, facial recognition, or iris scans.

65
Q

Browsing History

A

Refers to a record of web pages visited by a user on a particular device. It includes information such as URLs, timestamps, and page titles.

66
Q

Cookies

A

Small text files that websites store on a user’s computer or device. They are used to remember user preferences and track website activity.

67
Q

Data Breach

A

Occurs when unauthorized individuals gain access to sensitive or confidential information stored in a computer system or network without permission.

68
Q

Firewalls

A

Security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules. They act as a barrier between a trusted internal network and an untrusted external network, protecting against unauthorized access and potential threats.

69
Q

Internet Connection Security

A

Refers to measures taken to protect the confidentiality, integrity, and availability of data transmitted over the internet. It involves implementing various security protocols, encryption techniques, and access controls to safeguard information from unauthorized access or interception.

70
Q

IP Address

A

A unique numerical label assigned to each device connected to a computer network. It serves as an identifier for devices to communicate with each other over the internet.

71
Q

Keylogging

A

Refers to the act of recording or monitoring keystrokes on a computer or device without the user’s knowledge or consent. It is often used as a malicious technique to capture sensitive information such as passwords, credit card numbers, or personal messages.

72
Q

Personal Data

A

Refers to any information that can be used to identify an individual, such as their name, address, phone number, or social security number. It also includes sensitive information like medical records and financial details.

73
Q

Ransomware

A

A type of malicious software that encrypts files on a computer or network, making them inaccessible until a ransom is paid to the attacker.

74
Q

Rogue Access Point

A

An unauthorized wireless access point that has been installed on a network without proper authorization. It poses security risks by allowing attackers to intercept network traffic and potentially gain unauthorized access to sensitive information.

75
Q

Software Updates

A

Refer to patches or new versions released by software developers to fix bugs, improve functionality, enhance security, or add new features to existing software applications.

76
Q

Strong Password

A

A combination of letters, numbers, and symbols that is difficult for others to guess or crack. It helps protect personal information and accounts from unauthorized access.

77
Q

Targeted Marketing

A

Refers to the practice of tailoring advertisements and promotional messages to specific individuals or groups based on their demographics, interests, or online behavior.

78
Q

Virus Scanning Software

A

Also known as antivirus software is designed to detect, prevent, and remove malicious programs such as viruses, worms, trojans from computer systems. It scans files, emails, and other data for known patterns or behaviors associated with malware.