Big Idea 5-Impact of Computing Flashcards

1
Q

Fact: People create computing innovations.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fact: The way people complete tasks often changes to incorporate new computing innovations.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Truth or False: Computing innovations are typically designed to achieve a specific purpose.

A

Truth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Truth or False: Computing innovations that designed with a specific purpose in mind will not have unintended consequences.

A

False
While computing innovations are typically designed to achieve a specific purpose,
they may have unintended consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Truth or False. Not every effect of a computing innovation is
anticipated in advance.

A

Truth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Truth or False. A single effect can only be beneficial or harmful.

A

False
A single effect can be viewed as both beneficial and harmful by different people, or even by the same person.
Name some examples.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fact: Advances in computing have generated and increased creativity in other fields, such as medicine, engineering, communications, and the arts. Name some examples.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The _______________ was originally intended
only for rapid and easy exchange of information within the scientific community.

A

World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fact: Computing innovations can be used in ways that their creators had not originally intended. Name some examples.

A

The World Wide Web was originally intended
only for rapid and easy exchange of information within the scientific community.

Targeted advertising is used to help
businesses, but it can be misused at both
individual and aggregate levels. (how so?)

Machine learning and data mining have
enabled innovation in medicine, business,
and science, but information discovered in
this way has also been used to discriminate
against groups of individuals. (how so?)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Some of the ways computing innovations can
be used may have a harmful impact on _________, ___________, or ____________.

A

society, the economy, or culture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some of the ways computing innovations can be used may have a harmful impact on society, the economy, or culture?
Name the innovation, the harmful impact and the specific group impacted.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fact: Responsible programmers try to consider the unintended ways their computing innovations can be used and the potential beneficial and harmful effects of these new uses.
Would you say that programmers developing AI technology are doing that? Why or why not?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Is it possible for a programmer to consider
all the ways a computing innovation can be
used?

A

No.

It is not possible for a programmer to consider all the ways a computing innovation can be used.

What are some examples of this happening? Of an innovation having unexpected and unintended effects?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fact: Computing innovations have often had
unintended beneficial effects by leading to
advances in other fields.

Name some examples.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fact: Rapid sharing of a program or running a
program with a large number of users can result in significant impacts beyond the intended purpose or control of the programmer.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fact: While computing innovations are typically designed to achieve a specific purpose, they may have unintended consequences.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

True or false: Internet access varies between
socioeconomic, geographic, and demographic characteristics, as well as between countries.

A

True
Name some examples and why/how it varies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The ____________ refers to differing access to
computing devices and the Internet, based on
socioeconomic, geographic, or demographic
characteristics.

A

digital divide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fact : The digital divide can affect both groups and individuals.
Name some examples.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Fact: The digital divide raises issues of equity,
access, and influence, both globally and locally.
Name some of these issues.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Fact: The digital divide is affected by the actions of individuals, organizations, and governments.
Name some of these actions.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Can computing innovations can reflect existing human biases?

A

Yes
Name some examples.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the sources of bias when creating computing innovations?

A

Biases written into the algorithms or biases in the data used by the innovation.

Name some examples.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Fact: Programmers should take action to reduce bias in algorithms used for computing innovations as a way of combating existing human biases.

What are some ways that programmers can take action?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Truth or False: Bias in programming can be completely avoided.

A

False
While programmers should actively work to reduce bias in computing innovations. Biases can be embedded at all levels of software development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Fact: Widespread access to information and public
data facilitates the identification of problems,
development of solutions, and dissemination
of results.

Name some examples.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Science has been affected by using distributed and __________ to solve scientific problems.

A

citizen science (which is an example of crowdsourcing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

In __________, the public participates voluntarily in the scientific process to address real-world problems.

A

citizen science (which is an example of crowdsourcing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

____________ is scientific research
conducted in whole or part by distributed
individuals, many of whom may not be
scientists, who contribute relevant data to
research using their own computing devices.

A

Citizen science (which is an example of crowdsourcing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

______________ is the practice of obtaining
input or information from a large number of
people via the Internet.

A

Crowdsourcing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Fact: Human capabilities can be enhanced by
collaboration via computing.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Fact: Crowdsourcing offers new models for
collaboration, such as connecting businesses
or social causes with funding.
Name some examples of crowdsourcing for each type.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Fact: Material created on a computer is the
intellectual property of the creator or an
organization.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Fact: Ease of access and distribution of digitized information raises intellectual property concerns regarding ownership, value, and use.
Name some instances when this has occurred.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Fact: The use of material created by someone
else without permission and presented as
one’s own is plagiarism and may have legal
consequences.
Name some instances when this has occurred.

A
36
Q

What are some examples of legal ways to use materials?

A

creative commons, open source material, open access

37
Q

_______________ is a public copyright
license that enables the free distribution
of an otherwise copyrighted work. This is
used when the content creator wants to give
others the right to share, use, and build upon
the work they have created.

A

Creative Commons

38
Q

___________ is when programs that are made
freely available and may be redistributed and
modified

A

open source

39
Q

____________ is when online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions

A

open access

40
Q

Fact: The use of material created by someone other than you should always be cited.

A
41
Q

Name 3 things that have enabled broad access to digital information.

A

Creative Commons, open source, and open
access have enabled broad access to digital
information.

42
Q

Fact: As with any technology or medium, using computing to harm individuals or groups of people raises legal and ethical concerns.

A
43
Q

Fact: Computing can play a role in social and political issues, which in turn often raises legal and ethical concerns.

Name some examples.

A
44
Q

Fact: Computing innovations can raise legal and
ethical concerns.
Name some examples of these.

A

the development of software that allows
access to digital media downloads and
streaming
the development of algorithms that include bias
the existence of computing devices that
collect and analyze data by continuously
monitoring activities

45
Q

Fact: The use of computing innovations may involve risks to personal safety and identity.

A
46
Q

________________ is
information about an individual that identifies, links, relates, or describes them.

A

Personally identifiable information (PII)

47
Q

Examples of personally identifiable information (PII) include:

A

Social Security number
age
race
phone number(s)
medical information
financial information
biometric data

48
Q

Fact: Search engines can record and maintain a history of searches made by users.

A
49
Q

Fact: Websites can record and maintain a history of individuals who have viewed their pages.

A
50
Q

Fact: Devices, websites, and networks can collect information about a user’s location.

A
51
Q

Fact: Technology enables the collection, use, and exploitation of information about, by, and for individuals, groups, and institutions.
Give some examples.

A
52
Q

In which ways can search engines use search history?

A

Ex. Search engines can use search history to
suggest websites or for targeted marketing.

53
Q

Fact: Disparate personal data, such as geolocation, cookies, and browsing history, can be aggregated to create knowledge about an individual.

A
54
Q

What is metadata?

A

Metadata is simply data about data. It means it is a description and context of the data.

55
Q

Some examples of metadate of a file are:______

A

Some typical metadata elements:
Title and description,
Tags and categories,
Who created and when,
Who last modified and when,
Who can access or update.

56
Q

Every time you take a photo with today’s cameras a bunch of ____________ is gathered and saved with it.

A
57
Q

What are some examples of metadata that are stored when you take a digital picture?

A

date and time,
filename,
camera settings,
geolocation.

58
Q

What are some ways that personally identifiable information (PII) and other information placed online can be used to enhance a user’s online experiences?

A

PII stored online can be used to simplify making online purchases.

59
Q

Fact: Commercial and governmental curation of information may be exploited if privacy and other protections are ignored.

A
60
Q

What are some ways that information placed online can be used in ways that were not intended and that may have a harmful impact?

A

For example, an email message may be forwarded, tweets can be retweeted, and social media posts can be viewed by potential employers.

PII can be used to stalk or steal the identity of a person or to aid in the planning of other criminal acts.

Information posted to social media services can be used by others. Combining information posted on social media and other sources can be used to deduce private information about you.

61
Q

Truth or false: Information placed online can be easily deleted.

A

Once information is placed online, it is difficult to delete.

62
Q

Fact: Programs can collect your location and record where you have been, how you got there, and how long you were at a given location.

A
63
Q

_____________________ protect devices and information from unauthorized access.

A

Authentication measures

64
Q

What are some examples of authentication measures?

A

Examples of authentication measures
include strong passwords and multifactor
authentication.

65
Q

A strong password is something that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user.

A
66
Q

___________________ is a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, typically in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are).

A

Multifactor authentication.

67
Q

___________________ requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.

A

Multifactor authentication

68
Q

_________ is the process of encoding data to prevent unauthorized access.

A

Encryption

69
Q

_______ is the process of decoding the data.

A

Decryption

70
Q

Two common encryption approaches are:

A

Symmetric key encryption and Public key encryption.

71
Q

____________ involves one key for both encryption and decryption.

A

Symmetric key encryption

72
Q

__________ pairs a public key for
encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message.

A

Public key encryption

73
Q

Certificate authorities issue __________ that validate the ownership of encryption keys used in secure communications and are based on a trust model.

A

digital certificates

74
Q

___________________ can help protect a computing system against infection.

A

Computer virus and malware scanning software

75
Q

A ______________ is a malicious program that can copy itself and gain access to a computer in an unauthorized way.

A

computer virus

76
Q

____________ often attach themselves to legitimate programs and start running independently on a computer.

A

Computer viruses

77
Q

_______ is software intended to damage a computing system or to take partial control over its operation.

A

Malware

78
Q

All real-world systems have errors or design flaws that can be exploited to compromise
them. What can developers do to maintain the safety of their programs?

A

Regular software updates help fix errors that could compromise a computing system.

79
Q

What can users do when installing a program to protect their privacy?

A

Users can control the permissions programs
have for collecting user information. Users
should review the permission settings of
programs to protect their privacy.

80
Q

___________ is a technique that attempts to trick a user into providing personal information.

A

Phishing

81
Q

What can scammers do with your personal information after a phishing attack?

A

After a phishing attack, personal information can then be used to access sensitive online resources, such as bank accounts and emails.

82
Q

__________ is the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

A

Keylogging

83
Q

Fact: Data sent over public networks can be
intercepted, analyzed, and modified.

A

One way that this can happen is through a rogue access point.

84
Q

A ___________ is a wireless access point that gives unauthorized access to secure networks.

A

rogue access point

85
Q

A ________ link can be disguised on a web page or in an email message.

A

malicious

86
Q

Fact: Unsolicited emails, attachments, links, and forms in emails can be used to compromise the security of a computing system.

These can come from unknown senders or from known senders whose security has been compromised.

A
87
Q

Fact: Untrustworthy (often free) downloads from freeware or shareware sites can contain malware.

A