Big Idea 5 - Impact of Computing Flashcards
Bias in Algorithms
Refers to systematic errors or unfairness present in computer programs or algorithms due to human biases or flawed data inputs. These biases can result in discriminatory outcomes or perpetuate existing inequalities.
Citizen Science
Refers to the involvement of ordinary people in scientific research and data collection. It allows individuals without formal scientific training to contribute to scientific projects and make meaningful contributions to research.
Computing Innovation
Refers to the creation and development of new technologies, systems, or applications that improve or revolutionize the way we use computers. It involves introducing novel ideas, methods, or solutions to address problems or enhance existing processes.
Copyright
A legal protection granted to the creators of original works (such as books, music, art) that prevents others from copying, distributing, or using their work without permission. It gives creators exclusive rights over their creations for a specific period.
Creative Commons
A licensing system that allows creators to share their work with specific permissions for others to use, remix, or distribute it. It provides a way for creators to grant certain rights while still retaining some control over their work.
Cross-Purpose Technology
Refers to the use of a single technology or tool for multiple purposes, often in different contexts or industries. It allows for versatility and efficiency by adapting existing technologies to meet various needs.
Crowdsourcing
The practice of obtaining ideas, services, or content by soliciting contributions from a large group of people, typically through an online platform. It harnesses the collective intelligence and skills of a crowd to solve problems or generate innovative solutions.
Data mining
Involves extracting useful patterns or knowledge from large datasets using techniques such as statistical analysis, machine learning, and pattern recognition.
Digital divide
Refers to the gap between individuals or communities who have access to and can effectively use digital technologies, such as computers and the internet, and those who do not.
Intellectual Property
Refers to creations of the mind, such as inventions, artistic works, designs, symbols, and names that are protected by law.
Internet Access
Refers to the ability to connect to and use the internet. It allows individuals to browse websites, send emails, stream videos, and engage in various online activities.
Keylogging Technology
Refers to software or hardware that records keystrokes made on a computer or mobile device without the user’s knowledge or consent. It can be used for various purposes, including monitoring user activity, capturing sensitive information such as passwords, and conducting surveillance.
Machine learning
A branch of artificial intelligence that enables computers to learn from data and improve their performance without being explicitly programmed.
Malware
Refers to malicious software designed with the intent to harm computers, networks, or users by disrupting operations, stealing sensitive information, or gaining unauthorized access.
Multifactor Authentication
A security measure that requires users to provide two or more different types of identification in order to access a system or application. It adds an extra layer of protection by combining something the user knows (like a password) with something they have (like a fingerprint) or something they are (like facial recognition).
Open Access
Refers to unrestricted online access to scholarly research articles. It allows anyone with internet access to read, download, copy, distribute, print, or use the articles for any lawful purpose without financial, legal, or technical barriers.
Open Source
Refers to software whose source code is freely available for anyone to view, modify, and distribute. It encourages collaboration and community-driven development.
Personally Identifiable Information (PII)
Refers to any data that can be used alone or in combination with other information to identify an individual. It includes details like name, address, social security number, or email address.
Phishing
An attempt by cybercriminals to trick individuals into revealing sensitive information such as passwords, credit card numbers, or social security numbers by posing as trustworthy entities through emails, messages, or websites.
Plagiarism
The act of using someone else’s words, ideas, or creations without giving them proper credit. It involves presenting someone else’s work as your own.
Private Key
A cryptographic key that is kept secret and used to decrypt encrypted data or create digital signatures. It is unique to an individual or entity and should be securely stored.
Public Key
In cryptography, this is part of an asymmetric cryptographic system used for encrypting data. It can be freely shared with others without compromising security since it cannot be used alone to decrypt the encrypted data.
Public Key Encryption
A cryptographic method that uses two different keys - a public key for encryption and a private key for decryption. It allows secure communication between two parties without the need to share their private keys.
Societal Changes
Refer to shifts in social norms, behaviors, values, attitudes, or structures within a community or society as a result of various factors such as technological advancements or cultural influences.
Symmetric key encryption
A method of encryption where the same key is used for both the encryption and decryption processes. It is like having a single key to lock and unlock a door.
Targeted advertising
Refers to the practice of delivering personalized advertisements to specific individuals or groups based on their demographics, interests, or online behavior.
Trust Model
A framework or system that determines how entities establish and maintain trust in a networked environment. It defines the rules, protocols, and mechanisms for verifying identities and ensuring secure communication.
Unforeseen Consequences
Refer to unexpected outcomes or results that occur as a result of an action or decision. These consequences may be positive or negative and can have unintended impacts on various aspects such as technology adoption, society, or the environment.
Virus
In computing, this is a type of malicious software (malware) that replicates itself by inserting copies into other programs or files. Viruses can cause damage to computer systems, steal personal information, or disrupt normal operations.
World Wide Web
An interconnected system of web pages and documents that are accessed over the internet. It allows users to navigate between different websites using hyperlinks and interact with various types of content like text, images, videos, and more.
Worm
A type of malware that replicates itself and spreads across computer networks without any user intervention.