UT.WTCS.23PaTTAN Module 1 All

studied byStudied by 21 people
5.0(1)
get a hint
hint

1A1 Goal

1 / 49

Tags & Description

Praxis Prep

Studying Progress

0%
New cards
50
Still learning
0
Almost done
0
Mastered
0
50 Terms
1
New cards

1A1 Goal

Understand computing as a way of expressing creativity, solving problems, enabling communication, and fostering innovation in a variety of fields and careers

New cards
2
New cards

1A1 Subgoals: Understand computing as a way of expressing creativity, solving problems, enabling communication, and fostering innovation in a variety of fields and careers

a. recognize that computers can be used to showcase creativity

b. recognize the benefits of using computers to solve problems

c. provide examples of how computers enable communication and collaboration

d. provide examples of how computers foster innovation

New cards
3
New cards

1A2 Goal

Know the obstacles to equal access to computing among different groups and the impact of those obstacles

New cards
4
New cards

1A2 Subgoals: Know the obstacles to equal access to computing among different groups and the impact of those obstacles

a. identify obstacles to equal access to computing among different groups (e.g., groups defined by gender, socioeconomic status, disability/accessibility needs) and the impact of those obstacles

b. identify factors that contribute to the digital divide

c. match obstacles to equal access with effective solutions

New cards
5
New cards

1A3 Goal

Understand beneficial and harmful effects of computing innovations and the trade-offs between them

New cards
6
New cards

1A3 Subgoals: Understand beneficial and harmful effects of computing innovations and the trade-offs between them

a. analyze computing innovations in terms of their social, economic, and cultural impacts, both beneficial and harmful

b. identify trade-offs between beneficial and harmful effects of computer innovations

New cards
7
New cards

1B1 Goal

Know different methods of protecting intellectual property rights and the trade-offs between them in a variety of contexts (e.g., Creative Commons, open source, copyright)

New cards
8
New cards

1B1 Subgoals: Know different methods of protecting intellectual property rights and the trade-offs between them in a variety of contexts (e.g., Creative Commons, open source, copyright)

a. using correct vocabulary, describe how different methods of protecting intellectual property rights work

b. given a context, identify appropriate methods of protecting intellectual property rights

c. identify and compare trade-offs between different methods of protecting intellectual property rights

New cards
9
New cards

Public Domain

Copyright ownership waived Permission not needed Credit attribution not needed, though appreciated

New cards
10
New cards

Open License : (Creative Commons, GNU, etc.)

Copyright ownership retained Permission granted in advance Credit attribution needed

New cards
11
New cards

All rights reserved – Copyright

Copyright ownership retained Permission not given. Need to seek. Attribution depends on the agreement made

New cards
12
New cards

Open Source licenses including Creative Commons (most uses)

most commonly used in media assets and educational material. It is also the most common license for scientific publications. It is not used for software.

New cards
13
New cards

Open Source software the most popular licenses

MIT Licenses. GNU Licenses Apache License

New cards
14
New cards

Creative Commons BY

Attribution - This symbol indicates your expectation to receive credit when your work is used by someone else. It is used in all six license combinations.

New cards
15
New cards

Creative Commons SA

Share Alike - This requires any new works based on yours to carry the same license originally designated.

New cards
16
New cards

Creative Commons ND

No Derivatives - This symbol requires your original work be passed along unchanged and in whole, no changes to it whatsoever.

New cards
17
New cards

Creative Commons NC

Non Commercial - This symbol requires no money be made by any product using your work, only non-commercial use allowed.

New cards
18
New cards

Creative Commons Attribution (CC BY)

Show credit, OK to change and/or profit from it

New cards
19
New cards

Creative Commons Attribution-Share Alike (CC BY SA)

Show credit, OK to profit from it, use same license as stated with the original work

New cards
20
New cards

Creative Commons Attribution-NoDerivs (CC BY-ND)

Show credit, no changes allowed, OK to profit

New cards
21
New cards

Creative Commons Atrribution-NonCommercial (CC BY-NC)

Show credit, no profit allowed, OK to change

New cards
22
New cards

Creative Commons Atrribution-NonCommercial-ShareAlike (CC BY-NC-SA)

Show credit, no profits allowed, use original license, OK to change

New cards
23
New cards

Creative Commons Attribution-NonCommercial-NoDerivs (CC BY-NC-ND)

Show credit, non-commercial, no derivatives, most restrictive of the CC licenses

New cards
24
New cards

All Open Source Software funded by Federal Grant must be at least

CC BY - Showing Attribution

New cards
25
New cards

1B2 Goal

Understand ethical and unethical computing practices and their social, economic, and cultural implications

New cards
26
New cards

1B2 Subgoals: Understand ethical and unethical computing practices and their social, economic, and cultural implications

a. identify ethical and unethical computing practices in context

b. describe the social, economic, and cultural implications of ethical and unethical computing practices

c. identify the conditions under which a given computing practice is ethical or legal

New cards
27
New cards

Federal Laws: DMCA

The Digital Millennium Copyright Act is a controversial United States digital rights management (DRM) law enacted October 28, 1998 by then-President Bill Clinton. The intent behind DMCA was to create an updated version of copyright laws to deal with the special challenges of regulating digital material. It is a law protecting artists from having their work illegally copied and reused or modified.

New cards
28
New cards

Federal Laws: COPPA

Children’s Online Protection Privacy Act, and imposes certain requirements on operators of websites or online services directed to children under 13 years of age, and on operators of other websites or online services that have actual knowledge that they are collecting personal information online from a child under 13 years of age.

New cards
29
New cards

Federal Laws: FERPA

Family Education Rights and Privacy Act of 1974, a federal law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education.

New cards
30
New cards

Internet Data Mining Technology: NORA

Non-Obvious Relationship Awareness, a technology that mines data resources to determine the relationships between people. Non-Obvious Relationship Awareness was created by Systems Research and Development (SRD). SRD developed this technology for the Las Vegas gaming industry to help the casinos detect relationships between customers and parties named by the Nevada Gaming Control Board as excluded persons. SRD was acquired by IBM on January 7, 2005.

New cards
31
New cards

ACM: Preamble

To act responsibly, they should reflect upon the wider impacts of their work, consistently supporting the public good.[…]The Code includes principles formulated as statements of responsibility, based on the understanding that the public good is always the primary consideration

New cards
32
New cards

ACM Section 1 outlines…

fundamental ethical principles that form the basis for the remainder of the Code.

New cards
33
New cards

ACM Section 2 addresses…

more specific considerations of professional responsibility.

New cards
34
New cards

ACM Section 3…

guides individuals who have a leadership role, whether in the workplace or in a volunteer professional capacity.

New cards
35
New cards

ACM Section 4…

the Code

New cards
36
New cards

ACM Commitment to ethical conduct is required of…

every ACM member, and principles involving compliance with the Code are given in Section 4.

New cards
37
New cards

Plagiarism as defined by writing commons

using the ideas of someone else without referencing that source; failing to capture a source's point in your own words when paraphrasing; mimicking an author's style; and neglecting to include an in-text citation for a quote, paraphrase, or summary.

New cards
38
New cards

1B3 Goal

Know privacy and security issues regarding the acquisition, use, and disclosure of information in a digital world

New cards
39
New cards

1B3 subgoals: Know privacy and security issues regarding the acquisition, use, and disclosure of information in a digital world

a. using correct vocabulary, describe privacy and security issues

b. in context, identify appropriate strategies to safeguard privacy and ensure security

c. describe trade-offs between local and cloud-based data storage

d. identify methods that digital services use to collect information about users

New cards
40
New cards

Privacy Terms: Privacy

Individual privacy is the ability of an individual to conduct activities without the concern of being observed either directly or indirectly (like examination of data collected through online activities). Information privacy is the appropriate protection of individual data.

New cards
41
New cards

Privacy Terms: Security

Online security is the protection of an individual’s data either by the individual themselves, the government or a corporation.

New cards
42
New cards

Privacy Terms: Digital Footprint

This is the data that is available online about a person. The data typically contains information about the person’s online activity such as social media accounts, their contacts and other online transactions that they conduct on the Internet. Anything you do online leaves a digital trail. This trail is also called digital footprint.

New cards
43
New cards

Privacy Terms: Metadata

This is data which supports the actual data that is manipulated. For example if a digital camera stores an image the size of the image or the format of the image is the metadata.

New cards
44
New cards

Privacy Terms: Encryption

Encryption prevents others from reading data. Over the Internet, before being transmitted data is transformed by an algorithm in such a way that it is impossible to unscramble the data without knowing a secret piece of data such as a number.

New cards
45
New cards

Privacy Terms: Cryptography

The art of sending secret messages so that they can be read only by the intended recipients. Cryptography is based strongly on algorithms.

New cards
46
New cards

Privacy Terms: Cybersecurity

Cybersecurity is also known as the information technology security. It refers to technologies, processes and practices designed to protect networks, devices, software and data that are online from attacks, damage and other unauthorized access.

New cards
47
New cards

Privacy Terms: Bitcoin

This is digital currency. It is run by a computer software which keeps the currency working. Bitcoin just like any other currency will be accepted by merchants who accept it. Everything needed by a bitcoin is stored in a distributed ledger called blockchain.

New cards
48
New cards

Privacy Terms: Privacy / Security issues in Cloud-based storage

The data stored on the Internet by a computer that can be easily shared is called cloud based storage/computing.   The privacy/security concerns include who owns the data, who can access it, and in the case of a data leak who is liable.

New cards
49
New cards

Privacy Terms: Malware

This stands for malicious software. Any kind of software that is designed to do some sort of damage to the user running it or gain access to private information is called a malware. Often a malware runs without the knowledge of the user.

New cards
50
New cards

Privacy Terms: Internet Of Things

All things connected to the internet which collect data (software updates, etc.) through the Internet and supply data back to remote devices through the Internet. Examples include cellphones, cars, security cameras, refrigerators

New cards

Explore top notes

note Note
studied byStudied by 20 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 20 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 24 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 39 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 69 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard68 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard56 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard112 terms
studied byStudied by 308 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard44 terms
studied byStudied by 33 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard85 terms
studied byStudied by 115 people
Updated ... ago
5.0 Stars(7)
flashcards Flashcard58 terms
studied byStudied by 16 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard54 terms
studied byStudied by 7 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard50 terms
studied byStudied by 57 people
Updated ... ago
4.0 Stars(1)