4 min read•june 18, 2024
Minna Chow
Minna Chow
This guide was based on the updated 2020-21 Course Exam Description. The Learning Objectives are taken directly from the CED's learning objectives.
This big idea covers all the ways society is impacted by computing devices and how we can help mitigate some of the harmful effects.
** Learning Objective: Explain how an effect of a computing innovation can be both beneficial and harmful.**
** Learning Objective: Explain how a computing innovation can have an impact beyond its intended purpose.**
🔗 5.1: Beneficial and Harmful Effects
** Learning Objective: Describe issues that contribute to the digital divide.**
** Learning Objective: Explain how bias exists in computing innovations.**
** Learning Objective: Explain how people participate in problem-solving processes at scale.**
** Learning Objective: Explain how the use of computing can raise legal and ethical concerns.**
🔗 5.5 Legal and Ethical Concerns
** Learning Objective: Describe the risks to privacy from collecting and storing personal data on a computer system. **
** Learning Objective: Explain how computing resources can be protected and can be misused. **
Unlike the concepts brought up in Big Idea 3, you won't be asked to apply the content from Big Idea 5 to your Create Task. That means you only need to answer multiple-choice questions about it.
These multiple-choice questions may be single-select, multiple-select, or attached to a reading passage.
(Confused about the types of MCQs you'll have to answer? Go to our Exam Guide!)
The key to this problem is understanding the definition of phishing. Phishing works by tricking users into providing their personal information by posing as a trustworthy group. Once you know that, the description of C (tricking a user to provide their account password by posing as the manufacturer) fits exactly.
The digital divide refers to the unequal gap between those who have easy access to the internet and technology and those who don't. This gap can fall on demographic, socioeconomic, and/or geographic lines. The key word here is access. A and B both assume that students have access to technology already; D assumes that all students have the financial resources to access "computers with as much processing speed as possible."
Only C directly reduces the gap between those with and those without access to technology by giving everyone at the school direct access to technology.
<< Hide Menu
4 min read•june 18, 2024
Minna Chow
Minna Chow
This guide was based on the updated 2020-21 Course Exam Description. The Learning Objectives are taken directly from the CED's learning objectives.
This big idea covers all the ways society is impacted by computing devices and how we can help mitigate some of the harmful effects.
** Learning Objective: Explain how an effect of a computing innovation can be both beneficial and harmful.**
** Learning Objective: Explain how a computing innovation can have an impact beyond its intended purpose.**
🔗 5.1: Beneficial and Harmful Effects
** Learning Objective: Describe issues that contribute to the digital divide.**
** Learning Objective: Explain how bias exists in computing innovations.**
** Learning Objective: Explain how people participate in problem-solving processes at scale.**
** Learning Objective: Explain how the use of computing can raise legal and ethical concerns.**
🔗 5.5 Legal and Ethical Concerns
** Learning Objective: Describe the risks to privacy from collecting and storing personal data on a computer system. **
** Learning Objective: Explain how computing resources can be protected and can be misused. **
Unlike the concepts brought up in Big Idea 3, you won't be asked to apply the content from Big Idea 5 to your Create Task. That means you only need to answer multiple-choice questions about it.
These multiple-choice questions may be single-select, multiple-select, or attached to a reading passage.
(Confused about the types of MCQs you'll have to answer? Go to our Exam Guide!)
The key to this problem is understanding the definition of phishing. Phishing works by tricking users into providing their personal information by posing as a trustworthy group. Once you know that, the description of C (tricking a user to provide their account password by posing as the manufacturer) fits exactly.
The digital divide refers to the unequal gap between those who have easy access to the internet and technology and those who don't. This gap can fall on demographic, socioeconomic, and/or geographic lines. The key word here is access. A and B both assume that students have access to technology already; D assumes that all students have the financial resources to access "computers with as much processing speed as possible."
Only C directly reduces the gap between those with and those without access to technology by giving everyone at the school direct access to technology.
© 2024 Fiveable Inc. All rights reserved.