answered already passed
computing innovation - correct answer ✔✔includes a program as an integral part of its function.
Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing
software), or non-physical computing concepts (e.g. e-commerce)
personally identifiable information (PII) - correct answer ✔✔information about an individual
that identifies, links, relates, or describes them
phishing - correct answer ✔✔a technique that attempts to trick a user into providing personal
information. That personal information can then be used to access sensitive online resources,
such as bank accounts and emails
keylogging - correct answer ✔✔the use of a program to record every keystroke made by a
computer user in order to gain fraudulent access to passwords and other confidential
information
malware - correct answer ✔✔software intended to damage a computing system or to take
partial control over its operation
rogue access point - correct answer ✔✔a wireless access point that gives unauthorized access
to secure networks
encryption - correct answer ✔✔process of encoding messages to keep them secret, so only
"authorized" parties can read it
decryption - correct answer ✔✔a process that reverses encryption, taking a secret message and
reproducing the original plain text