Column 1
Column 2
Column 3
Column 4
Column 5
100

behavior is exhibited by a person who has no sense of right and wrong.

What is amoral behavior


100

A tool that collects information from e-mails, text messages, blog posts, and Twitter tweets and maps them, making the information publicly available instantly.

crisis mapping tool

100

is the study of the general nature of morals and of the specific moral choices individuals make

ethics

100

Gathering data from different sources, analyzing it and then using the results to prevent future crimes.

predictive policing

100

The process of decompressing files from a compressed form

extract
200

the branch of computer science that deals with the attempt to create computers to think like humans

What is AI

200

Asking for small donations from a large number of people, often using the Internet; a style of generating capital to start a business through social media.

crowdfunding

200

actions that are against social norms or acts that are considered unacceptable to the public.

Unethical

200

a simple test to distinguish between a human and a computer system

Turing test

200

Small images that represent commands, files or applications. Usually found on the desktop

icons

300

A combination of our normal sense of the objects around us while displaying an overlay of information.

What is augmented reality

300

is the process by which great amounts of data are analyzed and investigated usually for marketing purposes

data mining

300

Obtaining information or input for a project (such as development of a product) by obtaining the opinions of many different people.

crowdsourcing

300

a set of features that allow Internet users to contribute to content easily

Web 2.0

300

Microsoft's free cloud storage for anyone with a Microsoft account

OneDrive

400

the combination of leisure time and the tools to be creative

What is cognitive surplus

400

involves identifying, extracting, preserving, and documenting any kind of digital evidence in law enforcement

digital forensics

400

Using computers and computer networks in a subversive way to promote an agenda.

hacktivism

400

Online storage of data so that you can access your data from different places and devices

cloud computing

400

The crisis mapping tool that was first created in Kenya

Ushahidi

500

Being familiar enough with computers that a user knows how to use them and understands their capabilities and limitations

What is computer literate

500

Refers to products derived from the mind, such as works of art and literature, inventions, and software code.

intellectual property

500

—a set of formal or informal ethical principles you use to make decisions.

personal ethics

500

Files or folders that have been reduced in size to take up less spaces

compressed

500

displays at the end of file name and indicates what type of app is required to open or run the file

file extension

M
e
n
u