AP CSP Big Idea 5 (Impact of Computing): Security and Ethics Study Notes

0.0(0)
Studied by 0 people
0%Big Idea 5 Mastery
0%Exam Mastery
Build your Mastery score
multiple choiceMultiple Choice
call kaiCall Kai
Supplemental Materials
Card Sorting

1/24

Last updated 3:08 PM on 3/12/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

25 Terms

1
New cards

Crowdsourcing

Obtaining ideas, work, data, or solutions by distributing tasks across a large group of people (often online) rather than relying on a single expert or small team.

2
New cards

Open Source

A software approach defined by licensing and access to source code; it may involve many contributors, but it is not the same concept as crowdsourcing.

3
New cards

Microtasking (Human Computation)

A form of crowdsourcing where people complete many small tasks (e.g., labeling images) that are hard or costly for computers to do well.

4
New cards

Citizen Science

Crowdsourcing where volunteers contribute observations or analysis for scientific or research goals (e.g., classifying galaxies, reporting environmental data).

5
New cards

Crowdfunding

Crowdsourcing where many people contribute money to fund a project (e.g., a new product or community effort).

6
New cards

Distributed Computing (Volunteer Computing)

Crowdsourcing where participants donate computing resources (spare CPU/GPU time) to run tasks such as scientific research.

7
New cards

Validation (Quality Control)

Methods used to check and improve the accuracy of crowdsourced contributions (e.g., redundancy, review, conflict resolution).

8
New cards

Sampling Bias

A bias that occurs when the people who participate in a crowdsourcing effort are not representative of the broader population affected by the outcome.

9
New cards

Malicious Contributions

Harmful or deceptive inputs to a crowdsourced system (e.g., spam, trolling, coordinated false data) intended to manipulate results.

10
New cards

Legal Concern

An issue governed by laws and regulations; violations can lead to penalties (what you must do).

11
New cards

Ethical Concern

An issue guided by values like fairness, minimizing harm, and honesty; something can be unethical even if legal (what you should do).

12
New cards

Intellectual Property (IP)

Ownership rights over creations of the mind (e.g., writing, music, art, software, inventions); computing makes copying and sharing easy, increasing misuse risk.

13
New cards

Copyright

Legal protection for original creative expression (e.g., code, text, music), giving creators control over copying and distribution.

14
New cards

Privacy

The ability of individuals to control information about themselves—what is collected, how it is used, and how widely it is shared.

15
New cards

Re-identification

The risk that supposedly anonymous data can be linked back to a person by combining multiple data points (e.g., location/time patterns).

16
New cards

Bias (Data/Algorithmic)

Systematic unfairness in data or automated decisions that can disproportionately harm certain groups due to biased data, non-representative samples, or design choices.

17
New cards

Digital Divide

The gap between people who have effective access to devices, reliable internet, and digital skills and those who do not.

18
New cards

CIA Triad

A security model: Confidentiality (keep data secret), Integrity (prevent improper changes), and Availability (keep systems usable).

19
New cards

Encryption

Transforming plaintext into ciphertext using an algorithm and key so only authorized parties can read the data.

20
New cards

Symmetric Encryption

Encryption where the same secret key is used to encrypt and decrypt; fast, but requires securely sharing the key.

21
New cards

Asymmetric Encryption (Public-Key Encryption)

Encryption using a public/private key pair: the public key can be shared, and only the matching private key can decrypt messages encrypted with the public key.

22
New cards

Authentication

Verifying that a user or device is who they claim to be (“Who are you?”).

23
New cards

Authorization

Determining what an authenticated user is allowed to do (“What can you access or change?”).

24
New cards

Multi-Factor Authentication (MFA)

Authentication using more than one factor (something you know/have/are), reducing risk if one factor (like a password) is stolen.

25
New cards

Phishing

A social engineering attack that tricks users into revealing sensitive information or installing malware by impersonating a trustworthy source (often via fake links or login pages).

Explore top notes

note
RIse of Democracy Vocab Pt. 3
Updated 1507d ago
0.0(0)
note
KOREAN - IMPORTANT VOCABULARY
Updated 1262d ago
0.0(0)
note
Indirect Values
Updated 1507d ago
0.0(0)
note
biology
Updated 1941d ago
0.0(0)
note
Factorisation (copy)
Updated 1081d ago
0.0(0)
note
Chapter 9 - Jacksonian Era
Updated 1444d ago
0.0(0)
note
Hello
Updated 1195d ago
0.0(0)
note
RIse of Democracy Vocab Pt. 3
Updated 1507d ago
0.0(0)
note
KOREAN - IMPORTANT VOCABULARY
Updated 1262d ago
0.0(0)
note
Indirect Values
Updated 1507d ago
0.0(0)
note
biology
Updated 1941d ago
0.0(0)
note
Factorisation (copy)
Updated 1081d ago
0.0(0)
note
Chapter 9 - Jacksonian Era
Updated 1444d ago
0.0(0)
note
Hello
Updated 1195d ago
0.0(0)

Explore top flashcards

flashcards
faf
40
Updated 965d ago
0.0(0)
flashcards
faf
40
Updated 965d ago
0.0(0)