Software meant to damage or take control of a computing system.
What is Malware?
a term for the rules and regulations put on large internet providers that prevent them from favoring their own services and discriminating against rivals.
What is Net Neutrality?
What is commonly used today, paired with a public key, to encrypt private communication between devices?
What is a Private Key? (also accept large prime P)
What is the importance of intellectual property? Description accepted.
Good enough.
PHISHING
What is the attack that Ms. Macek fell for?
This form of cyberattack is often used to steal passwords when you type them in.
What is Keylogging?
This country notably overturned Net Neutrality legislation in 2025.
What is the United States?
This method uses one key for both encryption and decryption.
What is Symmetric Key Encryption?
This license allows anybody to use this content without permission if they credit the creator.
What is Creative Commons?
Taking advantage of random people’s computing power to advance research.
What is Citizen Science?
This type of cyber attack poses as a real email or other communication to deceive people, specifically CS teachers like Ms. Macek.
What is Phishing?
What is the consumer?
A technique for encryption that shifts the alphabet by some number of characters.
What is Caesar's Cipher?
Programs that are made freely available and may be redistributed and modified.
What is Open Source?
A digital/computer related technology that can have both beneficial and harmful effects on everything. Very broad term.
What is Computing Innovation?
A type of malware that disguises itself as legitimate software to deceive users into installing it.
What is a Trojan Horse?
Net Neutrality prevents these from restricting internet access.
What are Internet Service Providers (ISPs)?
The generic term for a technique (or algorithm) that performs encryption
What is a Cipher?
Online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions.
What is Open Access?
A reflection of human prejudice in AI and other innovations caused by imbalances in the data used by the AI or innovation.
What is Computing Bias?
If you connect to a public network, a hacker could gain access to your computer using this.
What is a Rogue Access Point?
Net Neutrality is often criticized for being an example of this.
What is Regulation?
The process of decoding encrypted data.
What is Decryption?
The use of material created by someone else without permission and presented as one’s own; AI images do this accidentally a lot.
What is Plagiarism?
Differing access to computing devices and the Internet between socioeconomic, geographic, and demographic characteristics, as well as between countries.
What is Digital Divide?