Impact of Computing Flashcards

1
Q

What is Keylogging?

A

The use of a program to record every keystroke made by a computer user to gain fraudulent access to passwords and other private info.
Keylogger is a tool to capture every keystroke(records key that is struck) from a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Phishing?

A

A technique that attempts to trick a user into providing personal information. The personal info can be used to access sensitive online resources such as bank accounts and emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Malware?

A

Software intended to damage a computing system or to take partial control over its operation
It can spread viruses, steal personal or financial data and hijack Computers.
Examples include Bug, Virus, Worms, Bots, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does asymmetric (public key) encryption keep data secure?

A

Asymmetric encryption uses computationally hard problems with a secret (private) and shared (public) key. With asymmetric encryption, a message encrypted with one’s public key can only be deciphered by one private key and vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Multifactor Authentication?

A

Multi-factor authentication is when you use two or more authentication. factors to verify your identity. These factors include Something you know, such as a password, passphrase, or personal identification number (PIN) (Something you have, such as a token or smartcard.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between the World Wide Web and the Internet?

A

The internet is a global connection of the internets while the world wide web accesses information FROM the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the digital divide

A

It refers to the differing access to computing devices based on the Internet, based on geographical, socioeconomic or demographic backgrounds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is crowdsourcing?

A

The practice of taking input or info form a large number of people via the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is PII?

A

Personal identifiable info about a person that identifies, links relate or describes them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is multifactor authetication

A

A two-step process authentication, using knowledge (password), possession, (phone access code), inheritance(fingerprint, face id)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain Encryption and Decryption

A

A private key is used for encryption and public for description.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Public Key/Private Key

A

a key is basically a code/formula that encrypts or decrypts a word, sentence, password

Public and private keys form the basis for public-key cryptography, also known as asymmetric cryptography. In public-key cryptography, every public key matches only one private key. Together, they are used to encrypt and decrypt messages. If you encode a message using a person’s public key, they can only decode it using their matching private key.

Example:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is citizen science?

A

We use our own computing devices, apps, to send info, (report, transmit, ) to larger causes that benefit society( ex; recording air quality to the factories(big)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Rouge access point

A

A rogue access point can intercept a packet, change its contents, and then forward the changed packet to the website server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is symmetric encryption/asymmetric encryption?

A

Symmetric––uses the same key is used to both encrypt and decrypt the data. ex Ceaser Cipher. Asymmetric––uses different keys for encryption and decryption, allowing computers over the Internet to securely communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The private key should never be shared, T/F

A

True

17
Q

Define Open Source

A

programs made freely available and can be redistributed or modified

18
Q

Define Open Access

A

Online research output free of any and all restriction on access and free of many restrictions on use

19
Q

Define Creative Commons

A

Public copyright license that enables the free distribution of an otherwise copyrighted work.