Big Idea 5: Impact Of Computing (21-26%) Flashcards
(24 cards)
Search Engines
- can record and maintain a history of searches made by users.
- can use search history to suggest websites or for targeted marketing.
Beneficial Effects
help people accomplish tasks in an easier or more efficient way or improve their lives, intended or unintended (Ex. entertainment, easier to do, process everyday tasks)
Harmful Effects
negatively impact people’s lives when the innovation is being used as intended, may affect society, economy, or culture unintended (Ex. Self-driving cars are helpful but people may end up losing their jobs like taxis, damaging the economy)
Bias
causes unfair tendencies for/against individuals or groups of individuals for computer systems
Plagiarism
use of material created by someone else w/o permission
Creative Commons License
public copyright license that enables the free distribution of an otherwise copyrighted work, people can use it with limitations and/or specifications
Open Source
made freely available and may be redistributed and modified (Ex. Get a projectb going but advance it to get something else)
Open Access
online research output free of any and all restriction on access and free of many restrictions on use
Citing a Source
allows you to show you’re using words/images/ideas/etc From somewhere else, even if its Creatuive Commons
Digital Divide
Differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics
Citizen Science
Scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices
Crowdsourcing
Obtaining input/info from a large amount of people via the Internet (Ex. Social media)
Personally Identifiable Information
Information about an individual that identifies, links, relates, or describes them (SSN, age, race, phone #, credit card info, biometric data, Zip Code, Birthday)
Multifactor Authentication
Method of computer access control in which a user is only granted access after successfully preventing several separate pieces oif evidence to an authentication mechanism (typically knowledge, possession, inherence)
Encryption
encoding data to prevent unnathorized access
Decrytion
decoding the data
Symmetric Key Encryption
one key for encyrption and decryption
Public Key Encryption
pairs a public key for encryption and a private key for decryption, sender doesn’t need the receiver’s private key to encrypt BUT receiver’s private key is required to decrypt
Certificate Authority
Issue digital certificates that validate the ownership of encryption keys used in secure communications and are based on a trust model
Computer Virus
Malicious programs that can copy themselves and gain access to computer in an unauthorized way, attach themselves to legitimate programs and start running independently on a computer
Phishing
technique that attempts to trick a user into providing PII, and that info is used to access sensitive online resources (Ex. Bank accounts, emails)
Keylogging
Use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential info
Rogue Access Point
Wireless network that give unauthorized access to secure networks
Phishing
technique that attempts to trick a user into providing PII, and that info is used to access sensitive online resources (Ex. Bank accounts, emails)