FBLA _ Digital Citizenship _ Final

0.0(0)
studied byStudied by 1 person
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/165

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

166 Terms

1
New cards

Avatar

A person's online representation as a character, whether in the form of a 2-D or 3-D image or simply through text.

2
New cards

Caption

title; chapter heading; text under illustration

3
New cards

Cyberbully

the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.

4
New cards

Ethical/Unethical

the judgement about an action or thought

5
New cards

Spyware

A type of Malware that locates and saves data from users without them knowing about it and sends it to the owner who put the Malware there.

6
New cards

Internet Browser

Computer programs that read & interpret code to display a web page to the user

7
New cards

Meme

an idea, behavior, or style that spreads from person to person within a culture

8
New cards

Trolling

Intentionally posting provocative messages about sensitive subjects to create conflict, upset people, and bait them into "flaming" or fighting.

9
New cards

cookies

Small text files that are sent to your computer from certain websites. They track your behavior and transactions.

10
New cards

Data on the internet

mostly unstructured

11
New cards

Bookmarks

the process of recording the web address (URL) of a website, file, or other Internet resource that enables quick access in future

12
New cards

Digital Law

electronic responsibility for actions and deeds

13
New cards

URL Extensions

.gov, .edu, .mil (military), .com, and .org

14
New cards

Spam

unwanted e-mail (usually of a commercial nature sent out in bulk)

15
New cards

invasion of privacy

revealing personal information about an individual without his or her consent

16
New cards

Wikis

A website that allows the easy creation and editing of any number of interlinked web pages, using a simplified markup language or a What You See Is What You Get (WYSIWYG) text editor, within the browser.

17
New cards

Selfies

photos of oneself taken with a mobile device and posted online

18
New cards

Stereotyping

the process by which people draw inferences about others based on their knowledge of the categories to which others belong

19
New cards

online safety

Precautions taken to protect personal information and images from being misused by others.

20
New cards

Public Domain

Creative work that's not copyrighted and therefore free for you to use whenever you want.

21
New cards

Podcasts

a digital multimedia file available on the Internet to be downloaded

22
New cards

Scam

an attempt to trick someone, usually with the intention of stealing money or private information

23
New cards

plagarism

taking someones ideas or writing and offering them as your own

24
New cards

Flaming

Online fights using electronic messages with angry and vulgar language.

25
New cards

Digital Footprint

All of the information online about a person either posted by that person or others, intentionally or unintentionally

26
New cards

Malware

software that is intended to damage or disable computers and computer systems.

27
New cards

plugins

are programs that work with the browser to expand its capabilities, such as allow it to play video or open certain file types

28
New cards

phising

the activity of defrauding an online account holder of financial information by posing as a legitimate company.

29
New cards

Creative Commons Copyright

Creative Commons Copyright (CC) is one of the copyright licences enable free distribution of a work that is copyrighted with the author's permission

30
New cards

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

31
New cards

Viral

An idea or concept that becomes popular in a relatively short time period

32
New cards

Remix

to use an existing creative work and add to it, rearrange it, or mix it with other material to create something new

33
New cards

Social Networking

the use of dedicated websites and applications to interact with other users, or to find people with similar interests to oneself.

34
New cards

Tag

A tag is a keyword, term or description that is assigned, or that you assign, to a piece of information. A piece of information may have multiple tags.

35
New cards

Digital rights

Or oinline rights, they are our built in rights when using technology that we receive as digital citizens

36
New cards

Types of Computer thieves

Fraud, Hacking, Identity theft, Scam,Computer virus, Ransomware, Phishing, Cyberbullying

37
New cards

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

38
New cards

Password Etiquette

  1. never write it down
39
New cards
  1. never share it with others
40
New cards
  1. never ask others for theirs
41
New cards
  1. never give yours to someone else
42
New cards

What are Cookies?

Small computer text files placed in your computer by the sites you visit that collect info about your computer system and the web pages you view.

43
New cards

What is digital citizenship?

The process of acting ethically and responsibly when accessing digital information as well as respecting the creative rights of the digital global community.

44
New cards

What is file sharing?

Providing access to digitally stored information/music on servers or websites.

45
New cards

What is piracy?

To illegally copy or download copyrighted material.

46
New cards

What is a third party?

A person or company other than you and the owner of the website you visit.

47
New cards

What is Digital Access?

There should be full electronic participation in society.

48
New cards

What is Digital Etiquette?

The electronic standards of conduct or procedure.

49
New cards

What is Digital Communication?

The electronic exchange of information.

50
New cards

What is Digital Commerce?

The electronic selling and buying of goods.

51
New cards

What is Digital Literacy?

The process of teaching and learning about technology and the use of technology.

52
New cards

What is Digital Law?

The electronic responsibility for action and deeds.

53
New cards

What are Digital Rights and Responsibilities?

The freedoms extended to everyone in a digital world.

54
New cards

What is Digital Health and Wellness?

The physical and psychological well being in digital technology world.

55
New cards

What is Digital Security?

The electronic precautions to guarantee safety.

56
New cards

What is Accuracy?

Information is reliable and error free.

57
New cards

What is Authority?

The author is qualified or has a background in the subject.

58
New cards

What is Objectivity?

Considers the purpose of the site.

59
New cards

What is Currency?

Is the content up to date.

60
New cards

What is Coverage?

Is covering both sides of the story.

61
New cards

What is a Computer Virus?

A computer virus is a small software program that spreads from one computer to another and interferes with computer operation.

62
New cards

What is a worm?

A worm is computer code that spreads without user interaction. Most worms begin as email attachments that infect a computer when they're opened.

63
New cards

What is a Trojan Horse?

A Trojan horse is a malicious software program that hides inside other programs.

64
New cards

What is spyware?

Spyware can install on your computer without your knowledge. These programs can change your computer's configuration or collect advertising data and personal information. Spyware can track Internet search habits and can also redirect your web browser to a different website than you intend to go to.

65
New cards

What is rogue security software?

A rogue security software program tries to make you think that your computer is infected by a virus and usually prompts you to download or buy a product that removes the virus.

66
New cards

What is malware?

Malware is a term that is used for malicious software that is designed to do damage or unwanted actions to a computer system.

67
New cards

What is the primary difference between Privacy and Security?

Privacy is the control an individual has over their information; Security is the protection of that information from unauthorized access.

68
New cards

What term defines an event where sensitive, protected, or confidential data is copied, transmitted, viewed, or stolen by an unauthorized individual?

Data Breach

69
New cards

What is the primary purpose of a Virtual Private Network (VPN)?

To create a secure, encrypted connection that blocks internet service providers and others from tracking personal information.

70
New cards

What is the primary reason why limiting information shared on social media is a key security strategy?

Once information is shared online, it is no longer under the person’s control.

71
New cards

Why is it important to shred personal documents before discarding them?

To prevent identity thieves from finding private data through 'dumpster diving.'

72
New cards

What is the term for an individual who uses technology to commit crimes such as identity theft or financial fraud?

Cybercriminal

73
New cards

Which of the following is an example of an Internet Scam (A18)?

A pop-up stating you've won a large prize and asking for your bank information to claim it.

74
New cards

What is a primary strategy for safeguarding personal data and devices (A14)?

Using a combination of strong, unique passwords and multi-factor authentication.

75
New cards

Why must a Social Security Number (SSN) be highly protected?

Because it is a crucial key that cybercriminals can use to steal an individual’s entire identity.

76
New cards

What happens to information that a person shares online (A15)?

It is often permanent and is no longer under the person’s exclusive control, as others can copy or save it.

77
New cards

All individuals who use the Internet have the right to be protected from what, according to the rubric (B5)?

Cyber bullying and harassment.

78
New cards

A core responsibility of an Internet user is to separate what from what (B3)?

Fact from non-fact (opinion, propaganda, falsehoods).

79
New cards

What is the difference between Content and Advertising on the Internet (B4)?

Content is intended to inform, educate, or entertain; Advertising is intended to persuade you to buy something.

80
New cards

Individuals have the right to legally seek help if they feel threatened in cyberspace from whom (B11)?

From their teachers, parents, or legal authorities.

81
New cards

What is a student's right, according to the rubric (B12)?

The right to go to schools, teachers, parents, and authorities with concerns about online behavior.

82
New cards

What is an individual's responsibility regarding the Internet work of others (B16)?

The responsibility of not modifying the Internet work of others without permission.

83
New cards

Which statement best defines the personal right to engage and interact on social media and websites (B9)?

The right to engage, as long as it adheres to the platform’s rules and does not violate digital law or threaten others.

84
New cards

Individuals have the right to remain safe in which three ways while interacting online (B14)?

Physically, Mentally, and Emotionally.

85
New cards

What is the right that individuals have regarding their own posts on sites (B15)?

The right to have those items posted without fear of them being manipulated or stolen by others who claim ownership.

86
New cards

What is the user's right regarding education and information (B13)?

The right to education and information about what is available online.

87
New cards

Which statement best defines a Digital Footprint (C1)?

The trail, record, or traces that people leave online from every email, post, photo, and click they make.

88
New cards

What is the relationship between a Digital Footprint and specialized advertising (C9)?

Your digital footprint is used by advertisers to gather information and target you with specialized ads.

89
New cards

How can a Digital Footprint negatively affect job offers (C10)?

Employers and colleges may find posts, comments, or images that reveal poor judgment, illegal activity, or unprofessional behavior.

90
New cards

How is digital information collected (C8) for your footprint?

Through the use of cookies, which track your activity and preferences.

91
New cards

What is the definition of the Digital Economy (C7)?

The entire ecosystem built from our online connectivity, where business is conducted and information is collected.

92
New cards

What is the best way to ensure you deliver a strong positive digital footprint (C14)?

Make sure your public-facing online content reflects responsibility, skills, and professionalism.

93
New cards

Why is thinking before posting so important (C11)?

Because every email, post, photo, and click leaves a trail that is difficult to remove.

94
New cards

Which of the following is a way an individual makes a digital footprint (C3)?

By sending an email, posting a photo, commenting on a video, or using a search engine.

95
New cards

How does your digital footprint get gathered by advertisers, employers, and companies (C6)?

Through data collected by your web browser, IP address, and third-party tracking (cookies).

96
New cards

Why is it important to know that every email, post, photo, and click leaves a trail (C5)?

Because it means all online activity contributes to your permanent, public digital footprint.

97
New cards

What is the best way to conduct an Internet search to get relevant results (D1)?

By using the minimum number of key terms to precisely define the topic.

98
New cards

When conducting an Internet search, what is a crucial step in the process of evaluating information (D3, D5)?

Checking if the information is backed by research and separating fact from opinion.

99
New cards

What does understanding political persuasion mean when conducting Internet searches (D4)?

Recognizing that search results and articles may be biased and intended to influence your beliefs.

100
New cards

How can you tell the difference between a fact and an opinion on a website (D11)?

A fact is a statement that can be proven true; an opinion is a personal belief or judgment that cannot be proven.