What term refers to gaps in access to technology?
digital divide
What process encodes messages to keep them secret?
encryption
What ability allows computers to perform tasks that usually need human intelligence?
Artificial Intelligence
What term is used for algorithms that create unfair outcomes?
Computing or Algorithm Bias
What term describes unauthorized wireless access points?
Rogue
What method involves collective fundraising via platforms?
crowdfunding
What is the term for software that damages a computing system?
malware
Cloud computing allows teams to communicate and ___________ all over the world
collaborate
What type of AI allows systems to learn from data?
Machine Learning
What is the term for attempts to trick users into giving personal information?
Phishing
What is the practice of obtaining input from many people online?
crowdsourcing
What process reverses encryption to reveal original text?
Decryption
Any piece of work that can be done without requiring a human's attention
Automation
What is the name for the generic term for an encryption technique?
Cipher
What type of encryption uses one key for both processes?
Symmetric
What term describes demographics that are not adequately represented?
Underrepresented
What method requires two forms of verification for access?
Multifactor Authentication
What term describes the use of public data?
Open Data
What term describes a method of encoding that shifts the alphabet?
Caesar's Cipher
This type of encryption is the foundation of all secure messaging on the open internet.
Public Key
What is the term for large collections of diverse data?
Big Data
What technique records every keystroke made by a user?
Keylogging
What is the process of hiding information so that only intended recipients can read it?
Cryptography
What is the name for errors in data representation?
Data Bias, dirty data, representation errors
A program that spreads by first infecting files or the system areas of a computer or network router's hard drive and then making copies
Computer Virus