Impacts of Computing
Across
- 3. the ability of computer systems to perform tasks that typically require human intelligence, such as learning, problem-solving, and decision-making
- 8. a wireless access point that gives unauthorized access to secure networks is known as this.
- 10. a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security.
- 11. ____________ key encryption pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message. The foundation of all secure messaging on the open internet.
- 14. publicly available data shared by governments, organizations, and others
- 17. involves one key for both encryption and decryption.
- 23. Any piece of work that can be done without requiring a human's attention
- 25. a process that reverses encryption, taking a secret message and reproducing the original plain text.
- 26. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
- 27. a method of raising funds for projects and initiatives, like their "Hour of Code," through the collective efforts of individuals, organizations, and companies, often via platforms like Indiegogo
Down
- 1. the practice of obtaining input or information from a large number of people via the Internet.
- 2. groups elderly, rural, developing countries and demographics potentially by race or gender like ethnic minorities or women
- 4. the gaps between those who have access to technology and the internet and those who don't.
- 5. extremely large and diverse collections of structured, unstructured, and semi-structured data that continues to grow exponentially over time
- 6. the use or operation of computers.
- 7. bias (algorithmic bias) systematic and repeatable errors in a computer system that create "unfair" outcomes, such as "privileging" one category over another in ways different from the intended function of the algorithm
- 9. the process of hiding or coding information so that only the person a message was intended for can read it
- 12. software intended to damage a computing system or to take partial control over its operation
- 13. how computers recognize patterns and make decisions without being explicitly programmed; a type of AI
- 15. code that is publicly accessible for anyone to view, modify, and distribute, fostering collaboration and transparency
- 16. the generic term for a technique (or algorithm) that performs encryption
- 18. a cipher technique for encryption that shifts the alphabet by some number of characters
- 19. When you attempt to decode a secret message without knowing all the specifics of the cipher, you are _______________ the encryption.
- 20. bias data that does not accurately reflect the full population or phenomenon being studied
- 21. a process of encoding messages to keep them secret, so only "authorized" parties can read it.
- 22. a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
- 24. protecting a computing system against infection by __________ the software for malware