1/28
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Crowdsourcing
The practice of obtaining input or information for a task by enlisting a large number of people, typically via the Internet.
Citizen Science
Scientific research conducted in whole or part by amateur scientists.
Participatory Sensing
A model where users contribute data usually via mobile devices.
Human Computation
Tasks that are easy for humans but difficult for computers.
Intellectual Property (IP)
Creations of the mind such as code, inventions, and artistic works.
Copyright
Exclusive rights granted to the creator to use and distribute their works.
Creative Commons (CC) License
Licenses that allow copyright holders to waive certain rights while retaining others.
Attribution (BY) Clause
Allows others to use a work as long as they credit the creator.
Share-Alike (SA) Clause
Allows others to use a work only if they license their new creation under the same terms.
Non-Commercial (NC) Clause
Allows others to use a work but not for profit.
No-Derivatives (ND) Clause
Allows sharing a work but prohibits changing or remixing it.
Open Source Software
Software with source code made freely available for modification and redistribution.
Proprietary Software
Software that keeps its source code secret and is owned by a specific company.
Personally Identifiable Information (PII)
Information that can identify an individual.
Direct PII
Information like name, Social Security Number, or passport number that directly identifies a person.
Linkable PII
Information such as zip code, age, gender that can often identify a person when combined.
Algorithmic Bias
When a computing system reflects the implicit values of the humans who designed it.
CIA Triad
Three goals of security: Confidentiality, Integrity, Availability.
Multifactor Authentication (MFA)
Access control method requiring two or more different pieces of evidence for access.
Malware
Malicious software intended to damage or disable computers.
Phishing
A social engineering attack where users are deceived into revealing PII or installing malware.
Symmetric Key Encryption
Encryption method using a single key for both encryption and decryption.
Public Key Encryption (Asymmetric)
Encryption method using a pair of keys, one public and one private.
Certificate Authorities (CA)
Trusted organizations that verify that a public key belongs to a specific entity.
Keylogging
Using software to record every keystroke made by a user.
Rogue Access Point
An unauthorized wireless access point that grants access to secure networks.
Confidentiality
Ensuring that only authorized users can see the data.
Integrity
Assuring that the data has not been tampered with or corrupted.
Availability
Ensuring that the system is accessible when needed.