Big Idea 5: Impact of Computing Flashcards

(22 cards)

1
Q

Computing innovations can ____________________________

A

reflect existing human biases because of biases written into the algorithms or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Random = ________.
_________ the practice of obtaining input or information from a large number of people via the internet

A

no bias, crowdsourcing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The material created on a computer is the property of the _______________
Access and distribution of information raises property concerns regarding ______, _____, and _______

A

creator or an organization, owner, value, use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Legal ways to use materials created by someone else:
- ______
- ______
- ______

A

Creative Commons, open source, open access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Creative Commons

A

a license that enables the free distribution of work
used when the content creator wants to give other the right to share, use, and build upon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Open Source

A

programs that are made freely available and may be redistributed and modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Open Access

A

online research output free of any and all restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____________ ex: phone number, address, social security number, age, race
can be used to aid criminal acts

A

Personally Identifiable information (PII)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

______ the process of encoding data to prevent unauthorized access
_______ the process of decoding the data

A

encryption, decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

________ encryption that involves one key for both encryption and decryption
________ uses two keys, one private and one public.

A

symmetric key, public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_________ a malicious program that can copy itself and gain access to a computer in an unauthorized way

A

computer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_______ software intended to damage a computing system or to take partial control over its operation

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_______ a technique that attempts to trick a user into providing personal information; tap/trick; ex: click this link to get this

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_______ program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

A

key logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_______ wireless access point that gives unauthorized access to secure networks

A

Rogue Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics

A

digital divide

17
Q

programs that are made freely available and may be redistributed and modified

18
Q

online research output free of any and all restrictions on access and free of many restriction on use such as copyright or license restrictions

19
Q

______ can record and maintain a history of searches made by users

_______ can record and maintain a history of individuals who have viewed their pages

A

search engines, websites

20
Q

a method of computer access control in which a user is only granted access after successfully presenting several pieces ofevidnece

A

multifactor authentication

21
Q

a malicious program that can copy itself and gain access to a computer in an unauthorized way

A

computer virus

22
Q

refer to notes/pdf