Big idea 5: Impact of computing Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

digital divide

A

The idea that some communities or populations have less access to computing than others, typically due to limitations of Internet speed or computer hardware access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

crowdsourcing

A

A model in which many online users combine efforts to help fund projects, generate ideas, or create goods or services (like Wikipedia).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

citizen science

A

Crowdsourcing for science! The participation of volunteers from the public in a scientific research project (like collecting rain samples or counting butterflies).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Creative Commons

A

An alternative to copyright that allows people to declare how they want their artistic creations to be shared, remixed, used in noncommercial contexts, and how the policy should propagate with remixed versions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

open access

A

A policy that allows people to have access to documents (like research papers) for reading or data (like government datasets) for analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PII (Personally identifiable information)

A

Information about an individual that can be used to uniquely identify them (directly or indirectly).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

multifactor authentication (MFA)

A

A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories (such as knowledge and possession).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

encryption

A

The process of scrambling data to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

symmetric encryption

A

A technique for encrypting data where the same key is used to both encrypt and decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

public key encryption

A

An asymmetric encryption technique that uses different keys for encrypting versus decrypting data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

cookie

A

A small amount of text that tracks information about a user visiting a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

virus

A

A type of computer malware that can make copies of itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

phishing

A

An attack where a user is tricked into revealing private information, often via a deceptive email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

rogue access point

A

A wireless access point that provides an attacker with unauthorized access to the traffic going over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly