All Flashcards
What are the differences between a virus and a worm?
Virus: Requires user interaction to spread | Worm: Can spread without user interaction
What are the differences between symmetric key encryption and public key encryption?
Symmetric Key: Uses the same key for encryption and decryption | Public Key: Uses a pair of keys, one public and one private
What are the differences between open source and proprietary software?
Open Source: Source code is available for modification | Proprietary: Source code is not available
What is the societal impact of computing innovations?
Computing innovations can have intended and unintended consequences, both beneficial and harmful, affecting society in various ways.
What is the digital divide?
The gap between those with and without access to technology and the internet, impacting opportunities for education, employment, and civic engagement.
How does bias exist in computing innovations?
Bias can be present in algorithms, data, and software development, leading to skewed or unfair results.
How do people participate in problem-solving processes at scale through crowdsourcing?
Crowdsourcing and citizen science harness the power of many to solve problems, but it's important to consider the quality and reliability of the data.
What are the legal and ethical concerns raised by computing?
Computing raises serious questions about intellectual property, copyright, plagiarism, data breaches, and privacy violations.
What are the risks to privacy from collecting and storing personal data?
Collection and storage of personal data can lead to privacy breaches, misuse of information, and potential harm to individuals.
How can computing resources be protected and misused?
Computing resources can be protected through authentication, encryption, and safe computing practices, but can be misused through viruses, malware, and phishing.
What are the benefits of widespread data access?
More data can lead to better insights and solutions, but it also raises concerns about privacy and security.
What is the importance of authentication in safe computing?
Authentication is crucial for verifying user identity and preventing unauthorized access to computing resources.
What is the role of encryption in protecting data?
Encryption encodes data to keep it secret, protecting it from unauthorized access and misuse.
What is the impact of socioeconomic factors on the digital divide?
Socioeconomic factors significantly influence access to technology, creating disparities in opportunities for education, employment, and civic engagement.
How can algorithms perpetuate existing biases?
Algorithms trained on biased data can perpetuate and amplify existing biases, leading to unfair or discriminatory outcomes.
What are the key considerations when using crowdsourcing for a project?
It's important to consider the quality and reliability of the data, as well as potential biases and ethical concerns.
What is the definition of 'World Wide Web'?
The system of linked hypertext documents accessed via the Internet.
What is the definition of 'Targeted Advertising'?
Ads tailored to specific users based on their data.
What is the definition of 'Machine Learning'?
Algorithms that learn from data without explicit programming.
What is the definition of 'Data Mining'?
Discovering patterns in large datasets.
What is the definition of 'Digital Divide'?
The gap between those with and without access to technology.
What is the definition of 'Internet Access'?
The ability to connect to the internet.
What is the definition of 'Bias' in computing?
Prejudice in favor of or against one thing, person, or group compared with another.
What is the definition of 'Crowdsourcing'?
Obtaining information or input from a large group of people.
What is the definition of 'Citizen Science'?
Scientific research conducted by amateur scientists.
What is the definition of 'Intellectual Property'?
Creations of the mind that have commercial value.
What is the definition of 'Copyright'?
Legal right granted to the creator of original work.
What is the definition of 'Plagiarism'?
Presenting someone else's work as your own.
What is the definition of 'Creative Commons'?
Licenses that allow creators to share their work while retaining some rights.
What is the definition of 'Open Source'?
Software with source code that is available for modification.
What is the definition of 'Open Access'?
Research that is freely available to the public.
What is the definition of 'Personally Identifiable Information (PII)'?
Data that can identify a specific individual.
What is the definition of 'Malware'?
Software designed to damage or gain unauthorized access to a computer system.
What is the definition of 'Phishing'?
Tricking users into providing personal information.
What is the definition of 'Encryption'?
Encoding data to keep it secret.
What is the definition of 'Decryption'?
Decoding encrypted data.