Legal and Ethical Concerns - AP Computer Science Principles
Card 1 of 30
What is a zero-day exploit?
What is a zero-day exploit?
Tap to reveal answer
A vulnerability unknown to the software vendor. Particularly dangerous because no patches exist when first discovered.
A vulnerability unknown to the software vendor. Particularly dangerous because no patches exist when first discovered.
← Didn't Know|Knew It →
What is data privacy?
What is data privacy?
Tap to reveal answer
Protection of personal data from unauthorized access. Ensures individuals control how their personal information is collected and used.
Protection of personal data from unauthorized access. Ensures individuals control how their personal information is collected and used.
← Didn't Know|Knew It →
What is the purpose of the GDPR?
What is the purpose of the GDPR?
Tap to reveal answer
To protect data privacy in the European Union. Establishes strict rules for data collection, processing, and user consent.
To protect data privacy in the European Union. Establishes strict rules for data collection, processing, and user consent.
← Didn't Know|Knew It →
What does 'open source' mean?
What does 'open source' mean?
Tap to reveal answer
Software with source code that anyone can inspect, modify, and enhance. Promotes collaboration, transparency, and community-driven development.
Software with source code that anyone can inspect, modify, and enhance. Promotes collaboration, transparency, and community-driven development.
← Didn't Know|Knew It →
Define 'cybersecurity'.
Define 'cybersecurity'.
Tap to reveal answer
Protection of computer systems from theft or damage. Involves preventing breaches, malware attacks, and unauthorized access attempts.
Protection of computer systems from theft or damage. Involves preventing breaches, malware attacks, and unauthorized access attempts.
← Didn't Know|Knew It →
What is phishing?
What is phishing?
Tap to reveal answer
Fraudulent attempt to obtain sensitive information. Often uses fake emails or websites to trick users into revealing passwords.
Fraudulent attempt to obtain sensitive information. Often uses fake emails or websites to trick users into revealing passwords.
← Didn't Know|Knew It →
What is a digital footprint?
What is a digital footprint?
Tap to reveal answer
The record of one's online activities. Includes all digital traces left by online searches, posts, and interactions.
The record of one's online activities. Includes all digital traces left by online searches, posts, and interactions.
← Didn't Know|Knew It →
Define 'encryption'.
Define 'encryption'.
Tap to reveal answer
Process of converting information into a secure format. Makes data unreadable to unauthorized parties using mathematical algorithms.
Process of converting information into a secure format. Makes data unreadable to unauthorized parties using mathematical algorithms.
← Didn't Know|Knew It →
What is the DMCA?
What is the DMCA?
Tap to reveal answer
Digital Millennium Copyright Act, protects digital copyrighted works. Criminalizes circumventing digital rights management and copyright protection.
Digital Millennium Copyright Act, protects digital copyrighted works. Criminalizes circumventing digital rights management and copyright protection.
← Didn't Know|Knew It →
What is an ethical hacker?
What is an ethical hacker?
Tap to reveal answer
A person who tests and improves security systems. Works legally to identify vulnerabilities before malicious hackers exploit them.
A person who tests and improves security systems. Works legally to identify vulnerabilities before malicious hackers exploit them.
← Didn't Know|Knew It →
Define 'plagiarism'.
Define 'plagiarism'.
Tap to reveal answer
Using someone else's work without giving credit. Violates academic integrity and intellectual property rights of original creators.
Using someone else's work without giving credit. Violates academic integrity and intellectual property rights of original creators.
← Didn't Know|Knew It →
What is a Creative Commons license?
What is a Creative Commons license?
Tap to reveal answer
A license that allows free use of a work under certain conditions. Offers alternatives to traditional copyright with varying levels of permissions.
A license that allows free use of a work under certain conditions. Offers alternatives to traditional copyright with varying levels of permissions.
← Didn't Know|Knew It →
What is the purpose of two-factor authentication?
What is the purpose of two-factor authentication?
Tap to reveal answer
To provide an extra layer of security for accounts. Requires something you know and something you have for account access.
To provide an extra layer of security for accounts. Requires something you know and something you have for account access.
← Didn't Know|Knew It →
Define 'cyberbullying'.
Define 'cyberbullying'.
Tap to reveal answer
Bullying using digital technologies. Uses technology platforms to harass, threaten, or intimidate others online.
Bullying using digital technologies. Uses technology platforms to harass, threaten, or intimidate others online.
← Didn't Know|Knew It →
What is a terms of service agreement?
What is a terms of service agreement?
Tap to reveal answer
A legal agreement between a service provider and a user. Outlines rules, responsibilities, and limitations for using a digital service.
A legal agreement between a service provider and a user. Outlines rules, responsibilities, and limitations for using a digital service.
← Didn't Know|Knew It →
What is data mining?
What is data mining?
Tap to reveal answer
The process of discovering patterns in large data sets. Uses algorithms to extract insights and knowledge from massive datasets.
The process of discovering patterns in large data sets. Uses algorithms to extract insights and knowledge from massive datasets.
← Didn't Know|Knew It →
Identify one ethical issue in AI development.
Identify one ethical issue in AI development.
Tap to reveal answer
Bias in AI algorithms. Algorithms can perpetuate discrimination and unfairness in decision-making.
Bias in AI algorithms. Algorithms can perpetuate discrimination and unfairness in decision-making.
← Didn't Know|Knew It →
What is the purpose of a privacy policy?
What is the purpose of a privacy policy?
Tap to reveal answer
To inform users how their data is collected and used. Required by law to ensure transparency in data handling practices.
To inform users how their data is collected and used. Required by law to ensure transparency in data handling practices.
← Didn't Know|Knew It →
What is an example of a digital rights management system?
What is an example of a digital rights management system?
Tap to reveal answer
Apple's FairPlay. Apple's system controls distribution and usage of protected digital content.
Apple's FairPlay. Apple's system controls distribution and usage of protected digital content.
← Didn't Know|Knew It →
What does COPPA regulate?
What does COPPA regulate?
Tap to reveal answer
Online privacy of children under 13. Children's Online Privacy Protection Act requires parental consent for data collection.
Online privacy of children under 13. Children's Online Privacy Protection Act requires parental consent for data collection.
← Didn't Know|Knew It →
Define 'malware'.
Define 'malware'.
Tap to reveal answer
Software designed to harm or exploit any device, service, or network. Includes viruses, worms, trojans, ransomware, and other malicious programs.
Software designed to harm or exploit any device, service, or network. Includes viruses, worms, trojans, ransomware, and other malicious programs.
← Didn't Know|Knew It →
Define 'identity theft'.
Define 'identity theft'.
Tap to reveal answer
Use of someone's personal data without consent. Criminal act that can lead to financial fraud and privacy violations.
Use of someone's personal data without consent. Criminal act that can lead to financial fraud and privacy violations.
← Didn't Know|Knew It →
What is an ISP?
What is an ISP?
Tap to reveal answer
Internet Service Provider. Company that provides internet access and connectivity to consumers.
Internet Service Provider. Company that provides internet access and connectivity to consumers.
← Didn't Know|Knew It →
What is the FTC?
What is the FTC?
Tap to reveal answer
Federal Trade Commission, protects consumers. Government agency that enforces consumer protection and privacy laws.
Federal Trade Commission, protects consumers. Government agency that enforces consumer protection and privacy laws.
← Didn't Know|Knew It →
Identify a consequence of digital piracy.
Identify a consequence of digital piracy.
Tap to reveal answer
Loss of revenue for content creators. Reduces income for artists, developers, and legitimate content distributors.
Loss of revenue for content creators. Reduces income for artists, developers, and legitimate content distributors.
← Didn't Know|Knew It →
What is a firewall?
What is a firewall?
Tap to reveal answer
A network security system that monitors and controls incoming and outgoing traffic. Acts as barrier between trusted internal networks and untrusted external connections.
A network security system that monitors and controls incoming and outgoing traffic. Acts as barrier between trusted internal networks and untrusted external connections.
← Didn't Know|Knew It →
What is the role of a data protection officer?
What is the role of a data protection officer?
Tap to reveal answer
To ensure compliance with data protection laws. Oversees data handling practices and ensures regulatory compliance within organizations.
To ensure compliance with data protection laws. Oversees data handling practices and ensures regulatory compliance within organizations.
← Didn't Know|Knew It →
What is spyware?
What is spyware?
Tap to reveal answer
Software that gathers information about a person without their knowledge. Secretly monitors user activity and may steal sensitive personal information.
Software that gathers information about a person without their knowledge. Secretly monitors user activity and may steal sensitive personal information.
← Didn't Know|Knew It →
What is intellectual property?
What is intellectual property?
Tap to reveal answer
Creations of the mind, such as inventions, art, and designs. Covers inventions, artistic works, and other creative outputs that can be legally owned.
Creations of the mind, such as inventions, art, and designs. Covers inventions, artistic works, and other creative outputs that can be legally owned.
← Didn't Know|Knew It →
Define copyright law.
Define copyright law.
Tap to reveal answer
Law that protects original works of authorship. Grants creators exclusive rights to reproduce, distribute, and display their works.
Law that protects original works of authorship. Grants creators exclusive rights to reproduce, distribute, and display their works.
← Didn't Know|Knew It →