Fiveable
Fiveable
pep
Fiveable
Fiveable

or

Log in

Find what you need to study


Light

Big Idea 5 Overview: Impact of Computing

4 min readdecember 21, 2022

Minna Chow

Minna Chow

Minna Chow

Minna Chow

This guide was based on the updated 2020-21 Course Exam Description. The Learning Objectives are taken directly from the CED's learning objectives.

The One Thing You Need to Know About this Big Idea:

This big idea covers all the ways society is impacted by computing devices and how we can help mitigate some of the harmful effects.

5.1 Beneficial and Harmful Effects

Key Ideas

  • to accommodate computing innovations

  • differing opinions on computing innovations

    • positive

    • negative

  • of computing innovations

    • positive

    • negative

    • cross-purpose (ex: technology originally intended for medical use being used for a different field like the arts)

  • examples of benefits of computing innovations

  • examples of harms of computing innovations

Vocabulary

Resources

🔗 5.1: Beneficial and Harmful Effects

5.2 Digital Divide

Key Ideas

  • explain what the is

  • differences in

    • socioeconomic

    • geographic

    • demographic

  • impact of the on groups and individuals

  • issues the existence of the raises

    • equity

    • access

    • influence

    • global/regional disparity

  • ways the can be impacted

    • to decrease it

    • and actions that might increase it

Vocabulary

Resources

🔗 5.2 Digital Divide

5.3 Computing Bias

Key Ideas

  • biases in algorithms

  • biases in data

  • biases in all levels of software development

  • action programmers can take to reduce bias

Vocabulary

  • bias

Resources

🔗 5.3 Computing Bias

5.4 Crowdsourcing

Key Ideas

  • benefits of widespread data access

  • : what it is and what its impacts are

  • : what it is and what its impacts are

Vocabulary

Resources

🔗 5.4 Crowdsourcing

5.5 Legal and Ethical Concerns

Key Ideas

  • relationship between , law, and how computing affects them

  • ways to legally use the work of others

  • examples of legal and ethical issues that arise from computing

Vocabulary

Resources

🔗 5.5 Legal and Ethical Concerns

5.6 Safe Computing

Key Ideas

  • types and methods of information collection

  • types of personally identifiable information

  • benefits and harms of information collection

  • types of authentication

  • encryption and decryption

  • dangers of computing

  • ways to foster safe computing

Vocabulary

  • personally identifiable information (PII)

  • Authentication measures

  • strong password

  • Encryption

  • Decryption

  • digital certificates

  • Certificate Authorities (CAs)

  •  

Resources

🔗 5.6 Safe Computing

Exam Weighing

  • 21-26% of the AP Exam

  • Practically, this translates to about 20 questions on the Multiple-Choice section of the test.

Big Idea 5 Practice Problems and Solutions

Unlike the concepts brought up in Big Idea 3, you won't be asked to apply the content from Big Idea 5 to your Create Task. That means you only need to answer multiple-choice questions about it.

These multiple-choice questions may be single-select, multiple-select, or attached to a reading passage.

(Confused about the types of MCQs you'll have to answer? Go to our Exam Guide!)

Practice Problem #1:

https://firebasestorage.googleapis.com/v0/b/fiveable-92889.appspot.com/o/images%2FScreen%20Shot%202022-12-20%20at%202.53-YrC7NeJUDSjj.png?alt=media&token=d93829fe-d48a-42fb-a0c3-fbc326e63889

Answer

The answer is C.

The key to this problem is understanding the definition of . works by tricking users into providing their personal information by posing as a trustworthy group. Once you know that, the description of C (tricking a user to provide their account password by posing as the manufacturer) fits exactly.

Practice Problem #2

https://firebasestorage.googleapis.com/v0/b/fiveable-92889.appspot.com/o/images%2FScreen%20Shot%202022-12-20%20at%202.53-8chBQK0AOTBf.png?alt=media&token=d8be8ce4-fdcc-4c18-b310-a17f7bf2000b

Answer

The answer is C. This is a question that relies partially on understanding the definition of the key term , but also on your inference skills.

The refers to the unequal gap between those who have easy access to the internet and technology and those who don't. This gap can fall on demographic, socioeconomic, and/or geographic lines. The key word here is access. A and B both assume that students have access to technology already; D assumes that all students have the financial resources to access "computers with as much processing speed as possible."

Only C directly reduces the gap between those with and those without access to technology by giving everyone at the school direct access to technology.

Resources

🔗 Multiple Choice Questions

🔗 MCQ Answers and Review

Key Terms to Review (31)

Bias in Algorithms

: Bias in algorithms refers to systematic errors or unfairness present in computer programs or algorithms due to human biases or flawed data inputs. These biases can result in discriminatory outcomes or perpetuate existing inequalities.

Citizen Science

: Citizen science refers to the involvement of ordinary people in scientific research and data collection. It allows individuals without formal scientific training to contribute to scientific projects and make meaningful contributions to research.

Computing Innovation

: Computing innovation refers to the creation and development of new technologies, systems, or applications that improve or revolutionize the way we use computers. It involves introducing novel ideas, methods, or solutions to address problems or enhance existing processes.

Copyright

: Copyright is a legal protection granted to the creators of original works (such as books, music, art) that prevents others from copying, distributing, or using their work without permission. It gives creators exclusive rights over their creations for a specific period.

Creative Commons

: Creative Commons is a licensing system that allows creators to share their work with specific permissions for others to use, remix, or distribute it. It provides a way for creators to grant certain rights while still retaining some control over their work.

Cross-Purpose Technology

: Cross-purpose technology refers to the use of a single technology or tool for multiple purposes, often in different contexts or industries. It allows for versatility and efficiency by adapting existing technologies to meet various needs.

Crowdsourcing

: Crowdsourcing is the practice of obtaining ideas, services, or content by soliciting contributions from a large group of people, typically through an online platform. It harnesses the collective intelligence and skills of a crowd to solve problems or generate innovative solutions.

Data mining

: Data mining involves extracting useful patterns or knowledge from large datasets using techniques such as statistical analysis, machine learning, and pattern recognition.

Digital divide

: The digital divide refers to the gap between individuals or communities who have access to and can effectively use digital technologies, such as computers and the internet, and those who do not.

Intellectual Property

: Intellectual property refers to creations of the mind, such as inventions, artistic works, designs, symbols, and names that are protected by law.

Internet Access

: Internet access refers to the ability to connect to and use the internet. It allows individuals to browse websites, send emails, stream videos, and engage in various online activities.

Keylogging Technology

: Keylogging technology refers to software or hardware that records keystrokes made on a computer or mobile device without the user's knowledge or consent. It can be used for various purposes, including monitoring user activity, capturing sensitive information such as passwords, and conducting surveillance.

Machine learning

: Machine learning is a branch of artificial intelligence that enables computers to learn from data and improve their performance without being explicitly programmed.

Malware

: Malware refers to malicious software designed with the intent to harm computers, networks, or users by disrupting operations, stealing sensitive information, or gaining unauthorized access.

Multifactor Authentication

: Multifactor authentication is a security measure that requires users to provide two or more different types of identification in order to access a system or application. It adds an extra layer of protection by combining something the user knows (like a password) with something they have (like a fingerprint) or something they are (like facial recognition).

Open Access

: Open access refers to unrestricted online access to scholarly research articles. It allows anyone with internet access to read, download, copy, distribute, print, or use the articles for any lawful purpose without financial, legal, or technical barriers.

Open Source

: Open source refers to software whose source code is freely available for anyone to view, modify, and distribute. It encourages collaboration and community-driven development.

Personally Identifiable Information (PII)

: Personally identifiable information refers to any data that can be used alone or in combination with other information to identify an individual. It includes details like name, address, social security number, or email address.

Phishing

: Phishing is an attempt by cybercriminals to trick individuals into revealing sensitive information such as passwords, credit card numbers, or social security numbers by posing as trustworthy entities through emails, messages, or websites.

Plagiarism

: Plagiarism is the act of using someone else's words, ideas, or creations without giving them proper credit. It involves presenting someone else's work as your own.

Private Key

: A private key is a cryptographic key that is kept secret and used to decrypt encrypted data or create digital signatures. It is unique to an individual or entity and should be securely stored.

Public Key

: In cryptography, a public key is part of an asymmetric cryptographic system used for encrypting data. It can be freely shared with others without compromising security since it cannot be used alone to decrypt the encrypted data.

Public Key Encryption

: Public key encryption is a cryptographic method that uses two different keys - a public key for encryption and a private key for decryption. It allows secure communication between two parties without the need to share their private keys.

Societal Changes

: Societal changes refer to shifts in social norms, behaviors, values, attitudes, or structures within a community or society as a result of various factors such as technological advancements or cultural influences.

Symmetric key encryption

: Symmetric key encryption is a method of encryption where the same key is used for both the encryption and decryption processes. It is like having a single key to lock and unlock a door.

Targeted advertising

: Targeted advertising refers to the practice of delivering personalized advertisements to specific individuals or groups based on their demographics, interests, or online behavior.

Trust Model

: A trust model is a framework or system that determines how entities establish and maintain trust in a networked environment. It defines the rules, protocols, and mechanisms for verifying identities and ensuring secure communication.

Unforeseen Consequences

: Unforeseen consequences refer to unexpected outcomes or results that occur as a result of an action or decision. These consequences may be positive or negative and can have unintended impacts on various aspects such as technology adoption, society, or the environment.

Virus

: In computing, a virus is a type of malicious software (malware) that replicates itself by inserting copies into other programs or files. Viruses can cause damage to computer systems, steal personal information, or disrupt normal operations.

World Wide Web

: The World Wide Web (WWW) is an interconnected system of web pages and documents that are accessed over the internet. It allows users to navigate between different websites using hyperlinks and interact with various types of content like text, images, videos, and more.

Worm

: A worm is a type of malware that replicates itself and spreads across computer networks without any user intervention.

Big Idea 5 Overview: Impact of Computing

4 min readdecember 21, 2022

Minna Chow

Minna Chow

Minna Chow

Minna Chow

This guide was based on the updated 2020-21 Course Exam Description. The Learning Objectives are taken directly from the CED's learning objectives.

The One Thing You Need to Know About this Big Idea:

This big idea covers all the ways society is impacted by computing devices and how we can help mitigate some of the harmful effects.

5.1 Beneficial and Harmful Effects

Key Ideas

  • to accommodate computing innovations

  • differing opinions on computing innovations

    • positive

    • negative

  • of computing innovations

    • positive

    • negative

    • cross-purpose (ex: technology originally intended for medical use being used for a different field like the arts)

  • examples of benefits of computing innovations

  • examples of harms of computing innovations

Vocabulary

Resources

🔗 5.1: Beneficial and Harmful Effects

5.2 Digital Divide

Key Ideas

  • explain what the is

  • differences in

    • socioeconomic

    • geographic

    • demographic

  • impact of the on groups and individuals

  • issues the existence of the raises

    • equity

    • access

    • influence

    • global/regional disparity

  • ways the can be impacted

    • to decrease it

    • and actions that might increase it

Vocabulary

Resources

🔗 5.2 Digital Divide

5.3 Computing Bias

Key Ideas

  • biases in algorithms

  • biases in data

  • biases in all levels of software development

  • action programmers can take to reduce bias

Vocabulary

  • bias

Resources

🔗 5.3 Computing Bias

5.4 Crowdsourcing

Key Ideas

  • benefits of widespread data access

  • : what it is and what its impacts are

  • : what it is and what its impacts are

Vocabulary

Resources

🔗 5.4 Crowdsourcing

5.5 Legal and Ethical Concerns

Key Ideas

  • relationship between , law, and how computing affects them

  • ways to legally use the work of others

  • examples of legal and ethical issues that arise from computing

Vocabulary

Resources

🔗 5.5 Legal and Ethical Concerns

5.6 Safe Computing

Key Ideas

  • types and methods of information collection

  • types of personally identifiable information

  • benefits and harms of information collection

  • types of authentication

  • encryption and decryption

  • dangers of computing

  • ways to foster safe computing

Vocabulary

  • personally identifiable information (PII)

  • Authentication measures

  • strong password

  • Encryption

  • Decryption

  • digital certificates

  • Certificate Authorities (CAs)

  •  

Resources

🔗 5.6 Safe Computing

Exam Weighing

  • 21-26% of the AP Exam

  • Practically, this translates to about 20 questions on the Multiple-Choice section of the test.

Big Idea 5 Practice Problems and Solutions

Unlike the concepts brought up in Big Idea 3, you won't be asked to apply the content from Big Idea 5 to your Create Task. That means you only need to answer multiple-choice questions about it.

These multiple-choice questions may be single-select, multiple-select, or attached to a reading passage.

(Confused about the types of MCQs you'll have to answer? Go to our Exam Guide!)

Practice Problem #1:

https://firebasestorage.googleapis.com/v0/b/fiveable-92889.appspot.com/o/images%2FScreen%20Shot%202022-12-20%20at%202.53-YrC7NeJUDSjj.png?alt=media&token=d93829fe-d48a-42fb-a0c3-fbc326e63889

Answer

The answer is C.

The key to this problem is understanding the definition of . works by tricking users into providing their personal information by posing as a trustworthy group. Once you know that, the description of C (tricking a user to provide their account password by posing as the manufacturer) fits exactly.

Practice Problem #2

https://firebasestorage.googleapis.com/v0/b/fiveable-92889.appspot.com/o/images%2FScreen%20Shot%202022-12-20%20at%202.53-8chBQK0AOTBf.png?alt=media&token=d8be8ce4-fdcc-4c18-b310-a17f7bf2000b

Answer

The answer is C. This is a question that relies partially on understanding the definition of the key term , but also on your inference skills.

The refers to the unequal gap between those who have easy access to the internet and technology and those who don't. This gap can fall on demographic, socioeconomic, and/or geographic lines. The key word here is access. A and B both assume that students have access to technology already; D assumes that all students have the financial resources to access "computers with as much processing speed as possible."

Only C directly reduces the gap between those with and those without access to technology by giving everyone at the school direct access to technology.

Resources

🔗 Multiple Choice Questions

🔗 MCQ Answers and Review

Key Terms to Review (31)

Bias in Algorithms

: Bias in algorithms refers to systematic errors or unfairness present in computer programs or algorithms due to human biases or flawed data inputs. These biases can result in discriminatory outcomes or perpetuate existing inequalities.

Citizen Science

: Citizen science refers to the involvement of ordinary people in scientific research and data collection. It allows individuals without formal scientific training to contribute to scientific projects and make meaningful contributions to research.

Computing Innovation

: Computing innovation refers to the creation and development of new technologies, systems, or applications that improve or revolutionize the way we use computers. It involves introducing novel ideas, methods, or solutions to address problems or enhance existing processes.

Copyright

: Copyright is a legal protection granted to the creators of original works (such as books, music, art) that prevents others from copying, distributing, or using their work without permission. It gives creators exclusive rights over their creations for a specific period.

Creative Commons

: Creative Commons is a licensing system that allows creators to share their work with specific permissions for others to use, remix, or distribute it. It provides a way for creators to grant certain rights while still retaining some control over their work.

Cross-Purpose Technology

: Cross-purpose technology refers to the use of a single technology or tool for multiple purposes, often in different contexts or industries. It allows for versatility and efficiency by adapting existing technologies to meet various needs.

Crowdsourcing

: Crowdsourcing is the practice of obtaining ideas, services, or content by soliciting contributions from a large group of people, typically through an online platform. It harnesses the collective intelligence and skills of a crowd to solve problems or generate innovative solutions.

Data mining

: Data mining involves extracting useful patterns or knowledge from large datasets using techniques such as statistical analysis, machine learning, and pattern recognition.

Digital divide

: The digital divide refers to the gap between individuals or communities who have access to and can effectively use digital technologies, such as computers and the internet, and those who do not.

Intellectual Property

: Intellectual property refers to creations of the mind, such as inventions, artistic works, designs, symbols, and names that are protected by law.

Internet Access

: Internet access refers to the ability to connect to and use the internet. It allows individuals to browse websites, send emails, stream videos, and engage in various online activities.

Keylogging Technology

: Keylogging technology refers to software or hardware that records keystrokes made on a computer or mobile device without the user's knowledge or consent. It can be used for various purposes, including monitoring user activity, capturing sensitive information such as passwords, and conducting surveillance.

Machine learning

: Machine learning is a branch of artificial intelligence that enables computers to learn from data and improve their performance without being explicitly programmed.

Malware

: Malware refers to malicious software designed with the intent to harm computers, networks, or users by disrupting operations, stealing sensitive information, or gaining unauthorized access.

Multifactor Authentication

: Multifactor authentication is a security measure that requires users to provide two or more different types of identification in order to access a system or application. It adds an extra layer of protection by combining something the user knows (like a password) with something they have (like a fingerprint) or something they are (like facial recognition).

Open Access

: Open access refers to unrestricted online access to scholarly research articles. It allows anyone with internet access to read, download, copy, distribute, print, or use the articles for any lawful purpose without financial, legal, or technical barriers.

Open Source

: Open source refers to software whose source code is freely available for anyone to view, modify, and distribute. It encourages collaboration and community-driven development.

Personally Identifiable Information (PII)

: Personally identifiable information refers to any data that can be used alone or in combination with other information to identify an individual. It includes details like name, address, social security number, or email address.

Phishing

: Phishing is an attempt by cybercriminals to trick individuals into revealing sensitive information such as passwords, credit card numbers, or social security numbers by posing as trustworthy entities through emails, messages, or websites.

Plagiarism

: Plagiarism is the act of using someone else's words, ideas, or creations without giving them proper credit. It involves presenting someone else's work as your own.

Private Key

: A private key is a cryptographic key that is kept secret and used to decrypt encrypted data or create digital signatures. It is unique to an individual or entity and should be securely stored.

Public Key

: In cryptography, a public key is part of an asymmetric cryptographic system used for encrypting data. It can be freely shared with others without compromising security since it cannot be used alone to decrypt the encrypted data.

Public Key Encryption

: Public key encryption is a cryptographic method that uses two different keys - a public key for encryption and a private key for decryption. It allows secure communication between two parties without the need to share their private keys.

Societal Changes

: Societal changes refer to shifts in social norms, behaviors, values, attitudes, or structures within a community or society as a result of various factors such as technological advancements or cultural influences.

Symmetric key encryption

: Symmetric key encryption is a method of encryption where the same key is used for both the encryption and decryption processes. It is like having a single key to lock and unlock a door.

Targeted advertising

: Targeted advertising refers to the practice of delivering personalized advertisements to specific individuals or groups based on their demographics, interests, or online behavior.

Trust Model

: A trust model is a framework or system that determines how entities establish and maintain trust in a networked environment. It defines the rules, protocols, and mechanisms for verifying identities and ensuring secure communication.

Unforeseen Consequences

: Unforeseen consequences refer to unexpected outcomes or results that occur as a result of an action or decision. These consequences may be positive or negative and can have unintended impacts on various aspects such as technology adoption, society, or the environment.

Virus

: In computing, a virus is a type of malicious software (malware) that replicates itself by inserting copies into other programs or files. Viruses can cause damage to computer systems, steal personal information, or disrupt normal operations.

World Wide Web

: The World Wide Web (WWW) is an interconnected system of web pages and documents that are accessed over the internet. It allows users to navigate between different websites using hyperlinks and interact with various types of content like text, images, videos, and more.

Worm

: A worm is a type of malware that replicates itself and spreads across computer networks without any user intervention.


© 2024 Fiveable Inc. All rights reserved.

AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website.


© 2024 Fiveable Inc. All rights reserved.

AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website.