1/165
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Avatar
A person's online representation as a character, whether in the form of a 2-D or 3-D image or simply through text.
Caption
title; chapter heading; text under illustration
Cyberbully
the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
Ethical/Unethical
the judgement about an action or thought
Spyware
A type of Malware that locates and saves data from users without them knowing about it and sends it to the owner who put the Malware there.
Internet Browser
Computer programs that read & interpret code to display a web page to the user
Meme
an idea, behavior, or style that spreads from person to person within a culture
Trolling
Intentionally posting provocative messages about sensitive subjects to create conflict, upset people, and bait them into "flaming" or fighting.
cookies
Small text files that are sent to your computer from certain websites. They track your behavior and transactions.
Data on the internet
mostly unstructured
Bookmarks
the process of recording the web address (URL) of a website, file, or other Internet resource that enables quick access in future
Digital Law
electronic responsibility for actions and deeds
URL Extensions
.gov, .edu, .mil (military), .com, and .org
Spam
unwanted e-mail (usually of a commercial nature sent out in bulk)
invasion of privacy
revealing personal information about an individual without his or her consent
Wikis
A website that allows the easy creation and editing of any number of interlinked web pages, using a simplified markup language or a What You See Is What You Get (WYSIWYG) text editor, within the browser.
Selfies
photos of oneself taken with a mobile device and posted online
Stereotyping
the process by which people draw inferences about others based on their knowledge of the categories to which others belong
online safety
Precautions taken to protect personal information and images from being misused by others.
Public Domain
Creative work that's not copyrighted and therefore free for you to use whenever you want.
Podcasts
a digital multimedia file available on the Internet to be downloaded
Scam
an attempt to trick someone, usually with the intention of stealing money or private information
plagarism
taking someones ideas or writing and offering them as your own
Flaming
Online fights using electronic messages with angry and vulgar language.
Digital Footprint
All of the information online about a person either posted by that person or others, intentionally or unintentionally
Malware
software that is intended to damage or disable computers and computer systems.
plugins
are programs that work with the browser to expand its capabilities, such as allow it to play video or open certain file types
phising
the activity of defrauding an online account holder of financial information by posing as a legitimate company.
Creative Commons Copyright
Creative Commons Copyright (CC) is one of the copyright licences enable free distribution of a work that is copyrighted with the author's permission
Encryption
a process of encoding messages to keep them secret, so only "authorized" parties can read it.
Viral
An idea or concept that becomes popular in a relatively short time period
Remix
to use an existing creative work and add to it, rearrange it, or mix it with other material to create something new
Social Networking
the use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself.
Tag
A tag is a keyword, term or description that is assigned, or that you assign, to a piece of information. A piece of information may have multiple tags.
Digital rights
Or oinline rights, they are our built in rights when using technology that we receive as digital citizens
Types of Computer thieves
Fraud, Hacking, Identity theft, Scam,Computer virus, Ransomware, Phishing, Cyberbullying
Decryption
a process that reverses encryption, taking a secret message and reproducing the original plain text
Password Etiquette
What are Cookies?
Small computer text files placed in your computer by the sites you visit that collect info about your computer system and the web pages you view.
What is digital citizenship?
The process of acting ethically and responsibly when accessing digital information as well as respecting the creative rights of the digital global community.
What is file sharing?
Providing access to digitally stored information/music on servers or websites.
What is piracy?
To illegally copy or download copyrighted material.
What is a third party?
A person or company other than you and the owner of the website you visit.
What is Digital Access?
There should be full electronic participation in society.
What is Digital Etiquette?
The electronic standards of conduct or procedure.
What is Digital Communication?
The electronic exchange of information.
What is Digital Commerce?
The electronic selling and buying of goods.
What is Digital Literacy?
The process of teaching and learning about technology and the use of technology.
What is Digital Law?
The electronic responsibility for action and deeds.
What are Digital Rights and Responsibilities?
The freedoms extended to everyone in a digital world.
What is Digital Health and Wellness?
The physical and psychological well being in digital technology world.
What is Digital Security?
The electronic precautions to guarantee safety.
What is Accuracy?
Information is reliable and error free.
What is Authority?
The author is qualified or has a background in the subject.
What is Objectivity?
Considers the purpose of the site.
What is Currency?
Is the content up to date.
What is Coverage?
Is covering both sides of the story.
What is a Computer Virus?
A computer virus is a small software program that spreads from one computer to another and interferes with computer operation.
What is a worm?
A worm is computer code that spreads without user interaction. Most worms begin as email attachments that infect a computer when they're opened.
What is a Trojan Horse?
A Trojan horse is a malicious software program that hides inside other programs.
What is spyware?
Spyware can install on your computer without your knowledge. These programs can change your computer's configuration or collect advertising data and personal information. Spyware can track Internet search habits and can also redirect your web browser to a different website than you intend to go to.
What is rogue security software?
A rogue security software program tries to make you think that your computer is infected by a virus and usually prompts you to download or buy a product that removes the virus.
What is malware?
Malware is a term that is used for malicious software that is designed to do damage or unwanted actions to a computer system.
What is the primary difference between Privacy and Security?
Privacy is the control an individual has over their information; Security is the protection of that information from unauthorized access.
What term defines an event where sensitive, protected, or confidential data is copied, transmitted, viewed, or stolen by an unauthorized individual?
Data Breach
What is the primary purpose of a Virtual Private Network (VPN)?
To create a secure, encrypted connection that blocks internet service providers and others from tracking personal information.
What is the primary reason why limiting information shared on social media is a key security strategy?
Once information is shared online, it is no longer under the person’s control.
Why is it important to shred personal documents before discarding them?
To prevent identity thieves from finding private data through 'dumpster diving.'
What is the term for an individual who uses technology to commit crimes such as identity theft or financial fraud?
Cybercriminal
Which of the following is an example of an Internet Scam (A18)?
A pop-up stating you've won a large prize and asking for your bank information to claim it.
What is a primary strategy for safeguarding personal data and devices (A14)?
Using a combination of strong, unique passwords and multi-factor authentication.
Why must a Social Security Number (SSN) be highly protected?
Because it is a crucial key that cybercriminals can use to steal an individual’s entire identity.
What happens to information that a person shares online (A15)?
It is often permanent and is no longer under the person’s exclusive control, as others can copy or save it.
All individuals who use the Internet have the right to be protected from what, according to the rubric (B5)?
Cyber bullying and harassment.
A core responsibility of an Internet user is to separate what from what (B3)?
Fact from non-fact (opinion, propaganda, falsehoods).
What is the difference between Content and Advertising on the Internet (B4)?
Content is intended to inform, educate, or entertain; Advertising is intended to persuade you to buy something.
Individuals have the right to legally seek help if they feel threatened in cyberspace from whom (B11)?
From their teachers, parents, or legal authorities.
What is a student's right, according to the rubric (B12)?
The right to go to schools, teachers, parents, and authorities with concerns about online behavior.
What is an individual's responsibility regarding the Internet work of others (B16)?
The responsibility of not modifying the Internet work of others without permission.
Which statement best defines the personal right to engage and interact on social media and websites (B9)?
The right to engage, as long as it adheres to the platform’s rules and does not violate digital law or threaten others.
Individuals have the right to remain safe in which three ways while interacting online (B14)?
Physically, Mentally, and Emotionally.
What is the right that individuals have regarding their own posts on sites (B15)?
The right to have those items posted without fear of them being manipulated or stolen by others who claim ownership.
What is the user's right regarding education and information (B13)?
The right to education and information about what is available online.
Which statement best defines a Digital Footprint (C1)?
The trail, record, or traces that people leave online from every email, post, photo, and click they make.
What is the relationship between a Digital Footprint and specialized advertising (C9)?
Your digital footprint is used by advertisers to gather information and target you with specialized ads.
How can a Digital Footprint negatively affect job offers (C10)?
Employers and colleges may find posts, comments, or images that reveal poor judgment, illegal activity, or unprofessional behavior.
How is digital information collected (C8) for your footprint?
Through the use of cookies, which track your activity and preferences.
What is the definition of the Digital Economy (C7)?
The entire ecosystem built from our online connectivity, where business is conducted and information is collected.
What is the best way to ensure you deliver a strong positive digital footprint (C14)?
Make sure your public-facing online content reflects responsibility, skills, and professionalism.
Why is thinking before posting so important (C11)?
Because every email, post, photo, and click leaves a trail that is difficult to remove.
Which of the following is a way an individual makes a digital footprint (C3)?
By sending an email, posting a photo, commenting on a video, or using a search engine.
How does your digital footprint get gathered by advertisers, employers, and companies (C6)?
Through data collected by your web browser, IP address, and third-party tracking (cookies).
Why is it important to know that every email, post, photo, and click leaves a trail (C5)?
Because it means all online activity contributes to your permanent, public digital footprint.
What is the best way to conduct an Internet search to get relevant results (D1)?
By using the minimum number of key terms to precisely define the topic.
When conducting an Internet search, what is a crucial step in the process of evaluating information (D3, D5)?
Checking if the information is backed by research and separating fact from opinion.
What does understanding political persuasion mean when conducting Internet searches (D4)?
Recognizing that search results and articles may be biased and intended to influence your beliefs.
How can you tell the difference between a fact and an opinion on a website (D11)?
A fact is a statement that can be proven true; an opinion is a personal belief or judgment that cannot be proven.