Big Idea 5: Impact Of Computing (21-26%) Flashcards

(24 cards)

1
Q

Search Engines

A
  • can record and maintain a history of searches made by users.
  • can use search history to suggest websites or for targeted marketing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Beneficial Effects

A

help people accomplish tasks in an easier or more efficient way or improve their lives, intended or unintended (Ex. entertainment, easier to do, process everyday tasks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Harmful Effects

A

negatively impact people’s lives when the innovation is being used as intended, may affect society, economy, or culture unintended (Ex. Self-driving cars are helpful but people may end up losing their jobs like taxis, damaging the economy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bias

A

causes unfair tendencies for/against individuals or groups of individuals for computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Plagiarism

A

use of material created by someone else w/o permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Creative Commons License

A

public copyright license that enables the free distribution of an otherwise copyrighted work, people can use it with limitations and/or specifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Open Source

A

made freely available and may be redistributed and modified (Ex. Get a projectb going but advance it to get something else)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Open Access

A

online research output free of any and all restriction on access and free of many restrictions on use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Citing a Source

A

allows you to show you’re using words/images/ideas/etc From somewhere else, even if its Creatuive Commons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital Divide

A

Differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Citizen Science

A

Scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Crowdsourcing

A

Obtaining input/info from a large amount of people via the Internet (Ex. Social media)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Personally Identifiable Information

A

Information about an individual that identifies, links, relates, or describes them (SSN, age, race, phone #, credit card info, biometric data, Zip Code, Birthday)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multifactor Authentication

A

Method of computer access control in which a user is only granted access after successfully preventing several separate pieces oif evidence to an authentication mechanism (typically knowledge, possession, inherence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption

A

encoding data to prevent unnathorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Decrytion

A

decoding the data

17
Q

Symmetric Key Encryption

A

one key for encyrption and decryption

18
Q

Public Key Encryption

A

pairs a public key for encryption and a private key for decryption, sender doesn’t need the receiver’s private key to encrypt BUT receiver’s private key is required to decrypt

19
Q

Certificate Authority

A

Issue digital certificates that validate the ownership of encryption keys used in secure communications and are based on a trust model

20
Q

Computer Virus

A

Malicious programs that can copy themselves and gain access to computer in an unauthorized way, attach themselves to legitimate programs and start running independently on a computer

21
Q

Phishing

A

technique that attempts to trick a user into providing PII, and that info is used to access sensitive online resources (Ex. Bank accounts, emails)

22
Q

Keylogging

A

Use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential info

23
Q

Rogue Access Point

A

Wireless network that give unauthorized access to secure networks

24
Q

Phishing

A

technique that attempts to trick a user into providing PII, and that info is used to access sensitive online resources (Ex. Bank accounts, emails)