

AP CSP Big Idea #5
Presentation
•
Computers
•
9th - 12th Grade
•
Practice Problem
•
Medium
Rukayya Umar
Used 5+ times
FREE Resource
45 Slides • 25 Questions
1
Impact of Computing
By Rukayya Umar
2
Introduction--
The creation of computer programs can have extensive impacts, some unintended, on
societies,
economies, and
cultures.We will explore these effects, the legal and ethical concerns associated with programs, and programmers' responsibilities.
3
Introduction cont..
When using computing innovations and transmitting information via the internet,
Are there any risks of sharing personal identifiable information about ourselves?
Personal Identifiable Information (PII) such as
age, address, etc
How can we actively take steps to keep this information safe?
4
Open Ended
What is Data privacy?
5
Introduction cont..
Computing innovations and programs are often developed in teams.
By creating diverse groups where each person’s opinion is considered, we help avoid unintentional bias and potential negative effects, such as contributing to the digital divide, that can creep into innovations.
6
Topic 5.1 How coputing innovation can be both beneficial and harmful
People create computing innovations.
The way people complete tasks often changes to incorporate new computing innovations.
Not every effect of a computing innovation is anticipated in advance.A single effect can be viewed as both beneficial and harmful by different people, or even by the same person.
7
Multiple Choice
In computing innovation, What makes up a good team?
People from different backgrounds , genders, ages and races to represent perspective of all potential users.
Talented and hardworking people.
Programmers, funding sources, engineers, good manager.
none of the options.
8
Computing innovation can have impact beyond its intended purpose
Computing innovations can be used in ways that their creators had not originally intended:
Example:World Wide Web
Targeted advertising is used to help businesses, but it can be misused at both individual and aggregate levels.
Machine learning and data mining
9
Computing innovation can have impact beyond its intended purpose
Some of the ways computing innovations can be used may have a harmful impact on society, the economy, or culture.
Responsible programmers try to consider the unintended ways their computing innovations can be used and the potential beneficial and harmful effects of these new uses.
10
Multiple Choice
Computing innovations can reflect bias that the programmers bring with them.
True
False
11
Computing innovation can have impact beyond its intended purpose
Computing innovations have often had unintended beneficial effects by leading to advances in other fields.
12
Multiple Choice
______________________ create computing innovations.
Computers
People
Tech companies
Cooperations
13
Multiple Choice
Machine learning and data mining
help find patterns and identify insights in data, leading to new innovations.
Help with connectivity
cause of digital divide
Cause of computing bias
14
Multiple Choice
which is intentional or unintentional prejudice for or against certain groups of people, shows up in computing innovations too.
Bias
Digital divide
Diversity
TCP
15
Topic 5.2: Digital Divide
Internet access varies between socioeconomic, geographic, and demographic characteristics, as well as between countries.
The “digital divide” refers to differing access to computing devices and the Internet based on socioeconomic, geographic, or demographic characteristics.
16
Digital Divide
The digital divide can affect both groups and individuals
The digital divide raises issues of equity, access, and influence, both globally and locally
The digital divide is affected by the actions of individuals, organizations, and governments.
17
Multiple Choice
This refers to differing access to computing devices and the Internet, based on socioeconomic, geographic, or demographic characteristics.
A. Digital divide
B. Divide and Conquer
C. Machine Learning
D. World Wide Web
18
Topic 5.3: Computing Bias
Computing innovations can reflect existing human biases because of biases written into the algorithms or biases in the data used by the innovation
Programmers should take action to reduce bias in algorithms used for computing innovations as a way of combating existing human biases
19
Multiple Select
Select the variables that affect the digital divide. select all that apply
infrastructure (location)
education
cost
gender
service provider
20
Computing Bias
Biases can be embedded at all levels of software development.
21
Multiple Choice
__________ can reflect existing human biases because of biases written into the algorithms or biases in the data used by the innovation.
A. Computing biases
B. Computing challenges
C. Computing algorithms
D. Computing innovations
22
Crowdsourcing
Crowdsourcing is the practice of obtaining input or information from a large number of people via the Internet.
Human capabilities can be enhanced by collaboration via computing.
23
Topic 5.4:Crowdsourcing
Widespread access to information and public data facilitates the identification of problems, development of solutions, and dissemination of results.
Science has been affected by using distributed and “citizen science” to solve scientific problems.
24
Topic 5.4:Crowdsourcing
Citizen science is scientific research conducted in whole or part by distributed individuals, many of whom may not be scientists, who contribute relevant data to research using their own computing devices..
25
Crowdsourcing
Crowdsourcing offers new models for collaboration, such as connecting businesses or social causes with funding
26
Multiple Choice
___________________________ is the practice of obtaining input or information from many people via the internet.
Citizen Science
DDoS
Phising
Crowdsourcing
27
Multiple Choice
___________________________ is the scientific research using public participants in scientific research.
Citizen Science
DDoS
Phising
Crowdsourcing
28
Multiple Choice
Which of the following are true statements about how the Internet enables crowdsourcing?
I. The Internet can provide crowdsourcing participants access to useful tools, information, and professional knowledge.
II. The speed and reach of the Internet can lower geographic barriers, allowing individuals from different locations to contribute to projects.
III. Using the Internet to distribute solutions across many users allows all computational problems to be solved in reasonable time, even for very large input sizes.
A. I and II only
B. I and III only
C. II and III only
D. I, II, and III
29
Multiple Choice
__________ can reflect existing human biases because of biases written into the algorithms or biases in the data used by the innovation.
A. Computing biases
B. Computing challenges
C. Computing algorithms
D. Computing innovations
30
Multiple Choice
It is the practice of obtaining input or information from a large number of people via the Internet.
A. Researching
B. Information gathering
C. Crowdsourcing
D. Collecting data
31
Topic 5.5: Legal and Ethical Concerns
Understand how computing can raise legal and ethical concerns
Material created on a computer is the intellectual property of the creator or an organization.
Ease of access and distribution of digitized information raises intellectual property concerns regarding ownership, value, and use.
32
Multiple Choice
Which of the following would be the best use of citizen science?
A. An experiment that requires all participants to be working in the same laboratory
B. An experiment that requires data measurements to be taken in many different locations
C. An experiment that requires expensive equipment to conduct
D. An experiment that requires specialized knowledge and training to conduct
33
Legal and Ethical Concerns
Understand how computing can raise legal and ethical concerns
Measures should be taken to safeguard intellectual property.
The use of material created by someone else without permission and presented as one’s own is plagiarism and may have legal consequences.
34
Legal and Ethical Concerns
Legal ways to use materials created by someone else:
Creative Commons: a public copyright license that enables the free distribution of an otherwise copyrighted work
This is used when the content creator wants to give others the right to share, use, and build upon the work they have created.
35
Legal and Ethical Concerns
Legal ways to use materials created by someone else:
Open source: programs that are made freely available and may be redistributed and modified
Open access: online research output free of any and all restrictions on access and free of many restrictions on use, such as copyright or license restrictions
36
Legal and Ethical Concerns
Legal ways to use materials created by someone else:
The use of material created by someone other than you should always be cited.
Creative Commons, open source, and open access have enabled broad access to digital information.
37
Legal and Ethical Concerns
As with any technology or medium, using computing to harm individuals or groups of people raises legal and ethical concerns.
Computing can play a role in social and political issues, which in turn often raises legal and ethical concerns.
38
Legal and Ethical Concerns
The digital divide raises ethical concerns around computing
39
Legal and Ethical Concerns
Computing innovations can raise legal and ethical concerns.
Some examples of these include:
the development of software that allows access to digital media downloads and streaming
the development of algorithms that include bias
The existence of computing devices that collect and analyze data by continuously monitoring activities
40
Multiple Choice
________ is an online research output free of all restrictions on access and free of many restrictions on use,
such as copyright or license restrictions.
Open source
Open access
Software programs
Creative Commons
41
Multiple Choice
An author is considering publishing an e-book using a Creative Commons license.
In which of the following situations would it be better for the author to use a Creative Commons license instead of a traditional copyright?
I. The author wants to make the e-book available as a free download.
II. The author wants to prevent people from sharing copies of the e-book on peer-to-peer networks.
III. The author wants to allow people permission to use and modify the e-book.
A. I only
B. II only
C. I and III
D. II and III
42
Topic 5.6: Safe Computing
Understand the risks to privacy from collecting and storing personal data on a computer system
43
Topic 5.6: Safe Computing
-
Personally identifiable information (PII): is information about an individual that identifies, links, relates, or describes them
Examples of PII include:
- Social Security number
- age
- race
- phone number(s)
- medical information
- financial information
- biometric data
44
Topic 5.6: Safe Computing
-
Search engines can record and maintain a history of searches made by users
websites can record and maintain a history of individuals who have viewed their pages
devices, websites, and networks can collect information about a user's location
Technology enables the collection, use and exploitation of information about, by, and for individuals, groups and institutions
45
Topic 5.6: Safe Computing
-
Search engines can use search history to suggest websites or for targeted marketing
Disparate personal data, such as geolocation, cookies, and browsing history, can be aggregated to create knowledge about an individual.
PII and other information placed online can be used to enhance a user’s online experiences.
PII stored online can be used to simplify making online purchases.
46
Topic 5.6: Safe Computing
-
Commercial and governmental curation of information may be exploited if privacy and other protections are ignored.
Information placed online can be used in ways that were not intended and that may have a harmful impact.
For example, an email message may be forwarded, tweets can be retweeted, and social media posts can be viewed by potential employers.
47
Topic 5.6: Safe Computing
-
PII can be used to stalk or steal the identity of a person or to aid in the planning of other criminal acts.
Once information is placed online, it is difficult to delete.
Programs can collect your location and record where you have been, how you got there, and how long you were at a given location.
48
Topic 5.6: Safe Computing
-
Information posted to social media services can be used by others.
Combining information posted on social media and other sources can be used to deduce private information about you.
49
Topic 5.6: Safe Computing
-
Understand how computing resources can be protected and can be misused
Authentication measures protect devices and information from unauthorized access.
Examples of authentication measures include strong passwords and multifactor authentication.
50
Topic 5.6: Safe Computing
-
Understand how computing resources can be protected and can be misused
A strong password is something that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user.
51
Topic 5.6: Safe Computing
-
Understand how computing resources can be protected and can be misused
Multifactor authentication is a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, typically in at least two of the following categories:
knowledge (something they know),
possession (something they have), and
inherence (something they are)
52
Topic 5.6: Safe Computing
-
Understand how computing resources can be protected and can be misused
Multifactor authentication requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.
53
Topic 5.6: Safe Computing
-
Understand how computing resources can be protected and can be misused
Encryption is the process of encoding data to prevent unauthorized access. Decryption is the process of decoding the data. Two common encryption approaches are:
54
Topic 5.6: Safe Computing
-
Understand how computing resources can be protected and can be misused
Symmetric key encryption involves one key for both encryption and decryption.
Public key encryption pairs a public key for encryption and a private key for decryption.
The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message.
55
Multiple Choice
A process that reverses encryption, taking a secret message and reproducing the original plain text
A. Encryption
B. Decryption
C. Cracking Encryption
D. Cipher
56
Multiple Choice
How does cryptography enable the Internet to process transactions securely?
A. Frequency analysis is used to disguise the use of common letters in encrypted messages keeping passwords secure
B. Symmetric keys are used to encrypt and decrypt messages for speed in processing to avoid being intercepted
C. Polynumeric alphabets are used encrypt and decrypt messages to allow for use with different languages
D. The public key encryption model is easy to use to encrypt data bat intractable to decrypt for large numbers
57
Multiple Choice
Which of the following is an example of symmetric encryption?
A. Evy buys a locked box that operates using two different codes. When the first code is entered, a slot opens that allows a message to be put in the box. When the second code is entered, the door to the box opens. Evy gives the first code to her friends so they can leave messages for her and keeps the second code to herself so that she is the only one who can retrieve the messages.
B. Finn and Gwen develop a system that maps each letter of the alphabet to a unique symbol using a secret key. Finn uses the key to write a message to Gwen where each letter is replaced with the corresponding symbol. Gwen uses the key to map each symbol back to the original letter. .
C. Hannah writes a message to send to Isabel and hides the message under a rock behind the soccer field. Hannah gives Isabel the exact location of the rock so that only Isabel can find the message.
D. Juan writes a message to send to Kelly and slides the message through a slot in the front of Kelly’s locker. Juan knows that Kelly has not shared her locker combination with anyone, so no one other than Kelly will be able to read the message
58
Multiple Choice
In public key cryptography, the sender uses the recipient’s public key to encrypt a message.
Which of the following is needed to decrypt the message?
The sender’s public key
The sender’s private key
The recipient’s public key
The recipient’s private key
59
Multiple Choice
Which of the following statements best describes the properties of public key encryption?
Public key encryption is a highly secure encryption scheme in which a single shared key is used by both the sender and receiver of the message.
Public key encryption makes use of certain types of problems that are easier for humans to solve than computers.
Public key encryption makes use of mathematical problems which no algorithm can be used to solve.
Public key encryption is an encryption method that relies on separate keys for encrypting and decrypting information.
60
Multiple Choice
A coffee shop is considering accepting orders and payments through their phone app and
has decided to use public key encryption to encrypt their customers' credit card information.
Is this a secure form of payment?
No, public key encryption allows the credit card information to be read by the public.
No, the internet protocols are open standards and thus everything sent over the internet is sent "in the clear".
Yes, public key encryption is built upon computationally hard problems that even powerful computers cannot easily solve.
Yes, public key encryption is secure because it transmits credit card information in binary
61
Topic 5.6: Safe Computing
-
Understand how computing resources can be protected and can be misused
Certificate authorities issue digital certificates that validate the ownership of encryption keys used in secure communications and are based on a trust model.
Computer virus and malware scanning software can help protect a computing system against infection
62
Topic 5.6: Safe Computing
-
Understand how computing resources can be protected and can be misused
A computer virus is a malicious program that can copy itself and gain access to a computer in an unauthorized way.
Computer viruses often attach themselves to legitimate programs and start running independently on a computer
63
Topic 5.6: Safe Computing
-
Understand how computing resources can be protected and can be misused
Malware is software intended to damage a computing system or to take partial control over its operation.
All real-world systems have errors or design flaws that can be exploited to compromise them.
Regular software updates help fix errors that could compromise a computing system.
64
Multiple Choice
Which of the following activities poses the greatest personal cybersecurity risk?
Making a purchase at an online store that uses public key encryption to transmit credit card information
Paying a bill using a secure electronic payment system
Reserving a hotel room by e-mailing a credit card number to a hotel.
Withdrawing money from a bank account using an automated teller machine (ATM)
65
Topic 5.6: Safe Computing
-
Understand how computing resources can be protected and can be misused
Users can control the permissions programs have for collecting user information.
Users should review the permission settings of programs to protect their privacy
66
Topic 5.6: Safe Computing
-
Understand how computing resources can be protected and can be misused
Phishing is a technique that attempts to trick a user into providing personal information.
That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
67
Topic 5.6: Safe Computing
-
Understand how computing resources can be protected and can be misused
Keylogging is the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
68
Multiple Choice
Which of the following is LEAST likely to indicate a phishing attack?
An e-mail from your bank asks you to call the number on your card to verify a transaction
An e-mail from a merchant asks that you click on a link to reset your password
An e-mail from a utility company asks you to enter your date of birth and social security number for verification purposes.
An e-mail indicates that you have won a large sum of money and asks you to enter your bank account number so that the money can be transferred to you
69
Topic 5.6: Safe Computing
-
Understand how computing resources can be protected and can be misused
Data sent over public networks can be intercepted, analyzed, and modified. One way that this can happen is through a rogue access point.
A rogue access point is a wireless access point that gives unauthorized access to secure networks.
70
Topic 5.6: Safe Computing
-
Understand how computing resources can be protected and can be misused
A malicious link can be disguised on a web page or in an email message.
Unsolicited emails, attachments, links, and forms in emails can be used to compromise the security of a computing system. These can come from unknown senders or from known senders whose security has been compromised.
Untrustworthy (often free) downloads from freeware or shareware sites can contain malware.
Impact of Computing
By Rukayya Umar
Show answer
Auto Play
Slide 1 / 70
SLIDE
Similar Resources on Wayground
65 questions
Fast Track GED
Presentation
•
9th - 12th Grade
65 questions
AS Psych Core Study Fagen Et al Elephant Learning
Presentation
•
9th - 12th Grade
65 questions
Triangle Hierarchy
Presentation
•
9th - 12th Grade
61 questions
The Odyssey Background Information
Presentation
•
9th - 12th Grade
65 questions
AP Biology Unit 7: Natural Selection Review
Presentation
•
9th - 12th Grade
65 questions
Fractions Revision
Presentation
•
9th - 12th Grade
65 questions
La familia
Presentation
•
9th - 12th Grade
65 questions
Progressive Presidents
Presentation
•
9th - 12th Grade
Popular Resources on Wayground
10 questions
5.P.1.3 Distance/Time Graphs
Quiz
•
5th Grade
10 questions
Fire Drill
Quiz
•
2nd - 5th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
22 questions
School Wide Vocab Group 1 Master
Quiz
•
6th - 8th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade