Big Idea 5: Impact of Computing Flashcards
(22 cards)
Computing innovations can ____________________________
reflect existing human biases because of biases written into the algorithms or data
Random = ________.
_________ the practice of obtaining input or information from a large number of people via the internet
no bias, crowdsourcing
The material created on a computer is the property of the _______________
Access and distribution of information raises property concerns regarding ______, _____, and _______
creator or an organization, owner, value, use
Legal ways to use materials created by someone else:
- ______
- ______
- ______
Creative Commons, open source, open access
What is Creative Commons
a license that enables the free distribution of work
used when the content creator wants to give other the right to share, use, and build upon
What is Open Source
programs that are made freely available and may be redistributed and modified
What is Open Access
online research output free of any and all restrictions
____________ ex: phone number, address, social security number, age, race
can be used to aid criminal acts
Personally Identifiable information (PII)
______ the process of encoding data to prevent unauthorized access
_______ the process of decoding the data
encryption, decryption
________ encryption that involves one key for both encryption and decryption
________ uses two keys, one private and one public.
symmetric key, public key
_________ a malicious program that can copy itself and gain access to a computer in an unauthorized way
computer virus
_______ software intended to damage a computing system or to take partial control over its operation
malware
_______ a technique that attempts to trick a user into providing personal information; tap/trick; ex: click this link to get this
phishing
_______ program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
key logging
_______ wireless access point that gives unauthorized access to secure networks
Rogue Access Point
differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
digital divide
programs that are made freely available and may be redistributed and modified
open source
online research output free of any and all restrictions on access and free of many restriction on use such as copyright or license restrictions
open access
______ can record and maintain a history of searches made by users
_______ can record and maintain a history of individuals who have viewed their pages
search engines, websites
a method of computer access control in which a user is only granted access after successfully presenting several pieces ofevidnece
multifactor authentication
a malicious program that can copy itself and gain access to a computer in an unauthorized way
computer virus
refer to notes/pdf
refer