Digital Citizenship Vocab Flashcards
(33 cards)
availability
when data and files are accessible and available when an operating system is secure
browser history
record of the sites visited in the past
CIA triad security model
the three principles form the cornerstone of any organization’s security infrastructure: confidentiality, integrity, availability
common knowledge
information that everyone knows
confidentiality
privacy of data
copyright
intellectual property that protects original works of authorship as soon as an author fixes the work in a tangible form of expression
cybersecurity
being protected against criminal use online
digital citizenship
responsible use of technology to engage with society
digital footprint
everything you leave behind on the internet; never goes away
computer ethics
how computing professionals make decisions regarding professional and social conduct
hacking
unauthorized access to computer data
integrity
accuracy, completeness, and quality of data as it’s maintained over time and across formats
intellectual curiosity
person’s willingness or desire to learn new things; acquisition of general knowledge
IP
intellectual property; work or invention that is the result of creativity; only person who created has rights to it
internet fast lanes
proposed internet rules that allow ISPs to charge technology companies for access to faster lanes, speeding up delivery of video and other
ISP
internet service provider; company that is able to provide you with access to the internet; verizon, AT&T, etc.
net neutrality
the principle that ISPs must treat all internet communications equally; highly debated
netiquette
digital etiquette (manners online)
paraphrase
put someone else’s words in your own words
patent
IP that gives its owner the legal right to exclude others from making, using, or selling an invention for a limited period of time in exchange for publishing an enabling disclosure of the invention
plagiarism
stealing someone else’s work or ideas and passing them off as one’s own
public domain
creative work to which no exclusive intellectual property rights apply
ransomware
malicious software designed to block access to a computer system until a sum of money is paid
right to be forgotten law
individuals have a right under certain circumstances to force search engines to remove links about them from the past