This guide was based on the updated 2020-21 Course Exam Description. The Learning Objectives are taken directly from the CED's learning objectives. This big idea covers all the ways society is impacted by computing devices and how we can help mitigate some of the harmful effects.
Learning Objective: Explain how an effect of a computing innovation can be both beneficial and harmful.
Learning Objective: Explain how a computing innovation can have an impact beyond its intended purpose.
societal changes to accommodate computing innovations
differing opinions on computing innovations
unforeseen consequences of computing innovations
examples of benefits of computing innovations
examples of harms of computing innovations
World Wide Web
targeted advertising
machine learning
data mining
Learning Objective: Describe issues that contribute to the digital divide.
explain what the digital divide is
differences in internet access
socioeconomic
geographic
demographic
impact of the digital divide on groups and individuals
issues the existence of the digital divide raises
ways the digital divide can be impacted
digital divide
Internet access
Learning Objective: Explain how bias exists in computing innovations.
Learning Objective: Explain how people participate in problem-solving processes at scale.
benefits of widespread data access
citizen science: what it is and what its impacts are
crowdsourcing: what it is and what its impacts are
crowdsourcing
citizen science
Learning Objective: Explain how the use of computing can raise legal and ethical concerns.
relationship between intellectual property, copyright law, and how computing affects them
ways to legally use the work of others
examples of legal and ethical issues that arise from computing
intellectual property
copyright
plagiarism
Creative Commons
open source
open access
Learning Objective: Describe the risks to privacy from collecting and storing personal data on a computer system.โ
Learning Objective: Explain how computing resources can be protected and can be misused.โ
types and methods of information collection
types of personally identifiable information
benefits and harms of information collection
personally identifiable information (PII)
virus
worm
malware
phishing
keylogging technology
Authentication measures
strong password
multifactor authentication
Encryption
Decryption
Symmetric key encryption
public key encryption
public key
private key
digital certificates
Certificate Authoritiesย (CAs)
trust modelย
Unlike the concepts brought up in
Big Idea 3, you won't be asked to apply the content from Big Idea 5 to your Create Task. That means you
only need to answer multiple-choice questions about it.
These multiple-choice questions may be single-select, multiple-select, or attached to a reading passage.
(Confused about the types of MCQs you'll have to answer? Go to our
Exam Guide!)
Practice Problem #1:
Answer
The answer is C.
The key to this problem is understanding the definition of phishing. Phishing works by tricking users into providing their personal information by posing as a trustworthy group. Once you know that, the description of C (tricking a user to provide their account password by posing as the manufacturer) fits exactly.
Practice Problem #2
Answer
The answer is C. This is a question that relies partially on understanding the definition of the key term digital divide, but also on your inference skills.
The digital divide refers to the unequal gap between those who have easy access to the internet and technology and those who don't.ย This gap can fall on demographic, socioeconomic, and/or geographic lines. The key word here is access. A and B both assume that students have access to technology already; D assumes that all students have the financial resources to access "computers with as much processing speed as possible."
Only C directly reduces the gap between those with and those without access to technology by giving everyone at the school direct access to technology.
Resources