upgrade
upgrade
⌨️AP Computer Science Principles Unit 5 Vocabulary

72 essential vocabulary terms and definitions for Unit 5 – Computing's Impact on Society

Study Unit 5
Practice Vocabulary
⌨️Unit 5 – Computing's Impact on Society
Topics

⌨️Unit 5 – Computing's Impact on Society

5.1 Beneficial and Harmful Effects

TermDefinition
beneficialProducing a positive or advantageous outcome or impact.
beneficial effectsPositive outcomes or advantages that result from the use of a computing innovation.
computing innovationA new or improved computer-based product, service, or concept that includes a program as an integral part of its function, which can be physical, nonphysical software, or a nonphysical concept.
data miningThe process of analyzing large datasets to discover patterns, trends, and insights that can be used for various purposes.
effectA consequence or result of a computing innovation that impacts people, society, or other fields.
harmfulProducing a negative or damaging outcome or impact.
harmful impactNegative consequences or damage that a computing innovation can cause to society, the economy, culture, or individuals.
intended purposeThe original goal or function that a computing innovation was designed to accomplish.
machine learningA computing technique that enables systems to learn and improve from data without being explicitly programmed for each task.
targeted advertisingA marketing technique that uses computing innovations to deliver specific advertisements to individuals or groups based on their data and behavior.
unintended beneficial effectsPositive consequences of a computing innovation that were not originally anticipated by its creators.
unintended purposeA use or application of a computing innovation that was not originally planned or designed by its creators.

5.2 Digital Divide

TermDefinition
accessThe ability to obtain and use computing devices and Internet services.
computing deviceA physical artifact that can run a program, such as computers, tablets, servers, routers, and smart sensors.
demographic characteristicsPopulation characteristics such as age, gender, education level, and other factors that affect access to technology.
digital divideThe differing access to computing devices and the Internet based on socioeconomic, geographic, or demographic characteristics.
equityFair and just access to resources and opportunities, particularly regarding technology and Internet access.
geographic characteristicsLocation-based factors that influence access to computing devices and Internet connectivity.
influenceThe power to affect decisions, information, and opportunities through access to computing and digital resources.
Internet accessThe ability to connect to and use the Internet, which varies based on socioeconomic, geographic, and demographic factors.
socioeconomic characteristicsFactors related to income level and social class that affect access to technology and the Internet.

5.3 Computing Bias

TermDefinition
algorithmStep-by-step procedures or sets of rules designed to solve a problem or accomplish a task.
biasPrejudice or systematic error in computing innovations that can result from algorithms or data, reflecting existing human prejudices.
computing innovationA new or improved computer-based product, service, or concept that includes a program as an integral part of its function, which can be physical, nonphysical software, or a nonphysical concept.
dataInformation represented in a form that can be processed by a program, such as numbers, text, or records.
software developmentThe process of creating and improving software applications where biases can be embedded at multiple levels.

5.4 Crowdsourcing

TermDefinition
citizen scienceScientific research conducted wholly or partly by non-professional scientists who contribute data and observations using their own computing devices.
collaborationThe process of working together with others to develop computing innovations that benefit from diverse talents and perspectives.
crowdsourcingThe practice of obtaining input, information, or solutions from a large number of people via the Internet.
dissemination of resultsThe process of sharing and distributing findings, solutions, or information widely to relevant audiences.
distributed individualsPeople spread across different locations who contribute to a common goal or research project, typically coordinated through digital networks.
problem-solving processesMethods and approaches used to identify, analyze, and develop solutions to challenges, often involving multiple participants working collaboratively.
public dataInformation that is openly accessible to the general public and can be used to identify problems and develop solutions.

5.5 Legal and Ethical Concerns

TermDefinition
algorithm biasPrejudice or unfair treatment built into algorithms that can raise legal and ethical concerns in computing innovations.
Creative CommonsA public copyright license that enables the free distribution of otherwise copyrighted work, allowing others to share, use, and build upon the creator's work.
data monitoringThe continuous collection and analysis of user activities through computing devices, which raises legal and ethical concerns.
digital divideThe differing access to computing devices and the Internet based on socioeconomic, geographic, or demographic characteristics.
intellectual propertyMaterial created on a computer or by an individual that is legally owned by the creator or an organization.
open accessOnline research output that is free of access restrictions and many usage restrictions, such as copyright or license limitations.
open sourcePrograms that are made freely available and may be redistributed and modified by users.
plagiarismThe use of material created by someone else without permission and presented as one's own, which may have legal consequences.

5.6 Safe Computing

TermDefinition
authentication measuresSecurity methods used to verify the identity of a user and protect devices and information from unauthorized access.
biometric dataPersonal information based on physical or behavioral characteristics, such as fingerprints or facial recognition, that can be used to identify an individual.
browsing historyA record of websites and pages an individual has viewed that can be collected and maintained by websites and networks.
certificate authorityAn organization that issues digital certificates to validate the ownership of encryption keys based on a trust model.
computer virusA malicious program that can copy itself and gain unauthorized access to a computer, often by attaching itself to legitimate programs.
cookiesData files stored on a user's device that track browsing behavior and can be aggregated with other personal data.
data aggregationThe process of combining disparate personal data from multiple sources to create comprehensive knowledge about an individual.
decryptionThe process of decoding encrypted data to make it readable.
digital certificateA credential issued by a certificate authority that validates the ownership of encryption keys used in secure communications.
encryptionThe process of encoding data to prevent unauthorized access.
freewareFree software that can potentially contain malware if downloaded from untrustworthy sources.
geolocationInformation about a user's physical location that can be collected by devices, websites, and networks.
identity theftThe unauthorized use of a person's PII to impersonate them or commit fraud.
keyloggingThe use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and confidential information.
malicious linkA link that can be disguised on a web page or in an email message to compromise computing security.
malwareSoftware intended to damage a computing system or to take partial control over its operation.
malware scanning softwareSoftware designed to detect and protect a computing system against infection from viruses and malware.
multifactor authenticationA method of computer access control requiring a user to present at least two separate pieces of evidence from the categories of knowledge (something they know), possession (something they have), and inherence (something they are).
permissionsSettings that control what information programs are allowed to collect from users and how they can access user data.
personally identifiable informationInformation about an individual that identifies, links, relates, or describes them, such as Social Security numbers, age, race, phone numbers, medical information, financial information, or biometric data.
phishingA technique that attempts to trick a user into providing personal information that can be used to access sensitive online resources.
public key encryptionAn encryption approach that uses a public key for encryption and a private key for decryption, allowing secure communication without sharing the private key.
rogue access pointA wireless access point that gives unauthorized access to secure networks.
search historyA record of searches made by users on search engines that can be collected, maintained, and used for targeted marketing or other purposes.
sharewareSoftware available for free or low cost that can potentially contain malware if downloaded from untrustworthy sources.
social mediaOnline platforms where individuals post information that can be viewed, shared, and used by others in ways not originally intended.
software updatesRegular patches and improvements to software that fix errors and design flaws that could compromise a computing system.
strong passwordA password that is easy for the user to remember but difficult for others to guess based on knowledge of that user.
symmetric key encryptionAn encryption approach that uses one key for both encrypting and decrypting data.
targeted advertisingA marketing technique that uses computing innovations to deliver specific advertisements to individuals or groups based on their data and behavior.
unauthorized accessGaining access to computing resources without permission, often through techniques like phishing, keylogging, or rogue access points.