Impacts of Computing

123456789101112131415161718192021222324252627
Across
  1. 3. the ability of computer systems to perform tasks that typically require human intelligence, such as learning, problem-solving, and decision-making
  2. 8. a wireless access point that gives unauthorized access to secure networks is known as this.
  3. 10. a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security.
  4. 11. ____________ key encryption pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message. The foundation of all secure messaging on the open internet.
  5. 14. publicly available data shared by governments, organizations, and others
  6. 17. involves one key for both encryption and decryption.
  7. 23. Any piece of work that can be done without requiring a human's attention
  8. 25. a process that reverses encryption, taking a secret message and reproducing the original plain text.
  9. 26. the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
  10. 27. a method of raising funds for projects and initiatives, like their "Hour of Code," through the collective efforts of individuals, organizations, and companies, often via platforms like Indiegogo
Down
  1. 1. the practice of obtaining input or information from a large number of people via the Internet.
  2. 2. groups elderly, rural, developing countries and demographics potentially by race or gender like ethnic minorities or women
  3. 4. the gaps between those who have access to technology and the internet and those who don't.
  4. 5. extremely large and diverse collections of structured, unstructured, and semi-structured data that continues to grow exponentially over time
  5. 6. the use or operation of computers.
  6. 7. bias (algorithmic bias) systematic and repeatable errors in a computer system that create "unfair" outcomes, such as "privileging" one category over another in ways different from the intended function of the algorithm
  7. 9. the process of hiding or coding information so that only the person a message was intended for can read it
  8. 12. software intended to damage a computing system or to take partial control over its operation
  9. 13. how computers recognize patterns and make decisions without being explicitly programmed; a type of AI
  10. 15. code that is publicly accessible for anyone to view, modify, and distribute, fostering collaboration and transparency
  11. 16. the generic term for a technique (or algorithm) that performs encryption
  12. 18. a cipher technique for encryption that shifts the alphabet by some number of characters
  13. 19. When you attempt to decode a secret message without knowing all the specifics of the cipher, you are _______________ the encryption.
  14. 20. bias data that does not accurately reflect the full population or phenomenon being studied
  15. 21. a process of encoding messages to keep them secret, so only "authorized" parties can read it.
  16. 22. a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
  17. 24. protecting a computing system against infection by __________ the software for malware