CSP Unit 7 Flashcards

1
Q

What is the Digital Divide?

A

Some communities lack access to technology, creating an inequality in internet availability.

The Digital Divide highlights disparities in technology access and usage among different populations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Computing Bias refer to?

A

Computers can unintentionally reflect the biases of their programmers’ experiences.

Example: Some automatic soap dispensers do not work well on darker skin tones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Crowdsourcing.

A

A large group of people contributes to completing a task, often through the internet.

Crowdsourcing leverages the collective intelligence and resources of a community.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Citizen Science?

A

Everyday people, not just scientists, help collect and report data for scientific research.

Citizen Science projects often involve public participation in data collection and analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Intellectual Property?

A

Creations of the mind, like inventions or artistic works, are legally associated with their creator.

Intellectual Property rights protect the interests of creators and inventors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Creative Commons licenses?

A

Licenses that allow people to use, share, and build upon someone else’s intellectual property with certain permissions.

Creative Commons provides a flexible range of protections and freedoms for authors, artists, and educators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Open Source software.

A

Software where the code is available for anyone to view, modify, and distribute.

Open Source promotes collaboration and sharing within the software development community.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does Open Access mean?

A

Free, unrestricted access to scholarly content, like research papers and academic articles.

Open Access aims to make research freely available to the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Personally Identifiable Information (PII)?

A

Private data that can identify an individual, such as SSN, address, or phone number.

Protecting PII is crucial for maintaining privacy and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Multifactor Authentication (MFA)?

A

A security process requiring multiple forms of verification before logging in, like a password and a code sent to your phone.

MFA enhances security by adding an additional layer of verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Encryption.

A

The process of scrambling or changing a message to hide its content from unauthorized users.

Encryption is essential for protecting sensitive information in digital communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Symmetric Key Encryption?

A

The same key is used to encrypt and decrypt data.

Symmetric encryption is faster but requires secure key management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Public Key Encryption.

A

Anyone can encrypt a message, but only the recipient with the private key can decrypt it.

Example: Similar to a mailbox where anyone can drop a letter in, but only the owner has the key to open it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Computer Virus?

A

A type of malware that attacks a computer and can replicate itself, spreading to other systems.

Computer viruses can cause significant damage and data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does Malware refer to?

A

Malicious software designed to harm or damage a computer.

Types of malware include viruses, worms, trojans, and ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Phishing.

A

A technique used to trick someone into revealing their personal information, often through fake emails or websites.

Phishing attacks exploit human psychology to steal sensitive data.

17
Q

What is Key Logging?

A

Software or hardware that tracks what a person types, often used to steal passwords and other sensitive information.

Key loggers can be used for malicious purposes or legitimate monitoring.

18
Q

What is a Rogue Access Point?

A

An unauthorized wireless connection, such as an unsecure public Wi-Fi network, that can pose security risks.

Rogue access points can be used by attackers to intercept data or launch attacks.