Big Idea 5: Computing Innovations, Ethics, and Cybersecurity

0.0(0)
Studied by 0 people
0%Big Idea 5 Mastery
0%Exam Mastery
Build your Mastery score
multiple choiceMultiple Choice
call kaiCall Kai
Supplemental Materials
Card Sorting

1/28

Last updated 9:11 PM on 3/4/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

29 Terms

1
New cards

Crowdsourcing

The practice of obtaining input or information for a task by enlisting a large number of people, typically via the Internet.

2
New cards

Citizen Science

Scientific research conducted in whole or part by amateur scientists.

3
New cards

Participatory Sensing

A model where users contribute data usually via mobile devices.

4
New cards

Human Computation

Tasks that are easy for humans but difficult for computers.

5
New cards

Intellectual Property (IP)

Creations of the mind such as code, inventions, and artistic works.

6
New cards

Copyright

Exclusive rights granted to the creator to use and distribute their works.

7
New cards

Creative Commons (CC) License

Licenses that allow copyright holders to waive certain rights while retaining others.

8
New cards

Attribution (BY) Clause

Allows others to use a work as long as they credit the creator.

9
New cards

Share-Alike (SA) Clause

Allows others to use a work only if they license their new creation under the same terms.

10
New cards

Non-Commercial (NC) Clause

Allows others to use a work but not for profit.

11
New cards

No-Derivatives (ND) Clause

Allows sharing a work but prohibits changing or remixing it.

12
New cards

Open Source Software

Software with source code made freely available for modification and redistribution.

13
New cards

Proprietary Software

Software that keeps its source code secret and is owned by a specific company.

14
New cards

Personally Identifiable Information (PII)

Information that can identify an individual.

15
New cards

Direct PII

Information like name, Social Security Number, or passport number that directly identifies a person.

16
New cards

Linkable PII

Information such as zip code, age, gender that can often identify a person when combined.

17
New cards

Algorithmic Bias

When a computing system reflects the implicit values of the humans who designed it.

18
New cards

CIA Triad

Three goals of security: Confidentiality, Integrity, Availability.

19
New cards

Multifactor Authentication (MFA)

Access control method requiring two or more different pieces of evidence for access.

20
New cards

Malware

Malicious software intended to damage or disable computers.

21
New cards

Phishing

A social engineering attack where users are deceived into revealing PII or installing malware.

22
New cards

Symmetric Key Encryption

Encryption method using a single key for both encryption and decryption.

23
New cards

Public Key Encryption (Asymmetric)

Encryption method using a pair of keys, one public and one private.

24
New cards

Certificate Authorities (CA)

Trusted organizations that verify that a public key belongs to a specific entity.

25
New cards

Keylogging

Using software to record every keystroke made by a user.

26
New cards

Rogue Access Point

An unauthorized wireless access point that grants access to secure networks.

27
New cards

Confidentiality

Ensuring that only authorized users can see the data.

28
New cards

Integrity

Assuring that the data has not been tampered with or corrupted.

29
New cards

Availability

Ensuring that the system is accessible when needed.

Explore top flashcards

flashcards
faf
40
Updated 956d ago
0.0(0)
flashcards
faf
40
Updated 956d ago
0.0(0)