Computer problems in the world
Using online resources
Online security
Encryption terms
100

 Digital divide

gaps between those who have access to the internet and those who do not

100

Open-sourcing

work is freely shared, distributed, and modified

100

personally identifiable information (PII)

nformation that can be used to identify you

100

Encryption

encoding data to prevent others from accessing it

200

 computing bias

computing innovations can reflect existing racial/gender/etc biases. Ex: recruiting algorithms that prefer one race or gender over another

200

 copyright

When someone uses something without someones permission

200

virus vs worm

Viruses are attached to infected files and must be activated by the user; worms can operate independently.

200

key

a secret piece of information used to encrypt data

300

 Creative Commons

copyright license for creators to give others the ability to use their work

300

malware

malicious software that takes control of a system

300

symmetric key encryption

one key for both encrypting & decrypting

400

Intellectual property

the work that people consider “theirs”

400

phishing

tricks people into giving their personal information away by pretending to be a trustworthy group

400

public key encryption

public key to encrypt & private key to decrypt

500

Citizen Science

scientific research that the general population helps to conduct.

500

multi-factor authentication

requiring multiple methods of verification.