Digital Citizenship

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/53

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

54 Terms

1
New cards

Anti-virus software

Used to block malicious (bad) programs, such as viruses or malware, from harming your computer.

2
New cards

Avatar

A graphic (picture or image) that you use to represent yourself on the internet.

3
New cards

Boundaries

Physical, emotional and mental limits we set to protect ourselves from being manipulated, used, or harmed by others.

4
New cards

Bully

Someone who acts in an aggressive, hostile or hurtful way towards others.

5
New cards

Bystander

A person who witness the actions of a bully and the reaction of the victim(s), without taking action.

6
New cards

Citation

Listing the source of specific information you have used for a project or writing assignment.

7
New cards

Citizenship

Being a member of and supporting your community and country. This comes with both rights and responsibilities.

8
New cards

Copyright

A owner's legal protection to anything they create.

9
New cards

Creative Commons

A license that allows you to decide how other may use your work. You keep your copyright, but allow others to copy and distribute your work provided they give you credit and only follow the conditions you specify.

10
New cards

Cyberbullying

Using digital media tools such as the Internet and cell phones to deliberately and repeatedly hurt, harass or embarrass someone else.

11
New cards

Digital Footprint

A trail of data you (unintentionally) create while using the Internet. In includes the websites you visit, emails you send, and information you submit to online services…etc. It cannot be edited or deleted. All of the information online about a person either posted by that person or others, intentionally or unintentionally.

12
New cards

Downloading

The process of transferring files from a website/Internet location to your personal computer/device.

13
New cards

Emoticon or Emoji

A simple face or image, sometimes animated, that expresses an emotion.

14
New cards

Empathy

Being aware of, sensitive to, and understanding what someone else is feeling or experiencing.

15
New cards

Fair Use

The idea that copyright material may be quoted without the need for permission from or payment to the original source, provided that a citation is clearly given and the material quoted is reasonably brief.

16
New cards

Firewall

Hardware or software that blocks or filters certain types of network traffic from reaching your computer/device.

17
New cards

Flaming

A mean spirited message sent to others on the Internet

18
New cards

Grooming

Techniques used by predators to try to gain your trust.

19
New cards

Hacker

A person who accesses computer information without permission.

20
New cards

Harassment

To annoy someone repeatedly.

21
New cards

Hardware

A term for the actual computer equipment and computer parts.

22
New cards

Identity Theft

A crime that happens when someone gets the personal information (credit card, social security number, bank account) of another person, usually to steal money.

23
New cards

Intellectual Property

Art, books, inventions, magazines, movies, music, performances, reports, software, stories created by you or by others.

24
New cards

Jeopardize or Jeopardizing

To put something at risk, such as your reputation or digital footprint.

25
New cards

Keyword

A word you use when looking for information on a search engine (Google, Yahoo, etc.)

26
New cards

Malicious

Means to cause harm to someone or something on purpose.

27
New cards

Malware

Malicious software or code (trojan horses, worms, spyware, adware, etc.) that is design to damage a computer/device or collect information.

28
New cards

Media Literacy

The ability to access, analyze, evaluate and create media in a variety of forms.

29
New cards

Netiquette

Courtesy, honesty and polite behavior while on the Internet

30
New cards

Open Source

Programming code with limited or no copyright restrictions, allowing you legally modify and share the software program.

31
New cards

Password

The secret word or combination of letters, numbers and symbols you use to sign in to the Internet or an online service to help confirm your identity.

32
New cards

Phishing

Techniques that scammers use to collect personal information from unsuspecting users. They may use false emails or websites where you have to enter information, that look real.

33
New cards

Piracy, Pirating

Theft of intellectual property. In other words, stealing what does not belong to you. Usually, refers to music and videos.

34
New cards

Plagiarism

Using someone else's words or ideas and passing them off as your own.

35
New cards

Predator

One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.

36
New cards

Privacy

Your right to determine what information you would like others to know about you.

37
New cards

Search Engine

A program that searches information on the Internet by looking for specific keywords.

38
New cards

Software Patch

An upgrade, bug fix, a new hardware driver or update to fix new issues such as security or stability problems.

39
New cards

Spyware

Software that goes on your computer/device without your knowledge and steals private information.

40
New cards

Tolerance

Respecting those that are different from you.

41
New cards

Trojan Horse

Software programs that hide inside regular programs, such as games or utilities. If run, these programs can do great harm to your computer/device. Compared to an event in Greek mythology.

42
New cards

Upload

The process by which an individual can send or post a file to the internet.

43
New cards

Upstander

Someone who takes action to stop bullying behavior or other inappropriate behavior.

44
New cards

Victim

Someone who is harmed by another person or persons.

45
New cards

Virus

A program that duplicates itself and spreads throughout your computer/device destroying files, changing data and hogging all your memory. They damage software, not hardware (your computer/device).

46
New cards

Worm

A virus that replicates itself, but does not change any files on your computer/device. They can multiple may times and take up all the available memory on your computer/device.

47
New cards

Reasonable Expectation of Privacy

Related to the Fourth Amendment which protects citizens' privacy in places such as: Places of residence, Restrooms, Changing rooms…etc

48
New cards

Cyber Attack

These can range from installing spyware on a personal computer to attempts to destroy the infrastructure of entire nations.

49
New cards

Hate Speech

This attacks a person or group on the basis of attributes such as race, religion, ethnic origin, sexual orientation, disability, or gender. … In some countries, a victim may seek redress under civil law, criminal law, or both.

50
New cards

Digital Reputation

Defined by your behaviors in the online environment and by the content you post about yourself and others. Tagged photos, blog posts and social networking interactions will all shape how you are perceived by others online and offline, both now and in the future.

51
New cards

Shoulder Surfing

The practice of spying on the user of an ATM, computer, or other electronic device in order to obtain their personal access information. Recently it is used during job interviews to view your digital reputation.

52
New cards

Distracted Driving Law

The law forbids virtually all use of handheld gadgets such as phones, tablets, laptop computers and gaming devices while driving. Fines start at $136 for the first offense and $234 for the second, and will be reported to the driver's insurance company (increa$e) and will appear on the driver's record.

53
New cards

Cyber Sickness

Also known as "digital motion sickness," symptoms that range from headaches to woozy feelings can occur when you quickly scroll on your smart phone or watch action-packed video on your screen. The sensation results from a mismatch between sensory inputs.

54
New cards

Text Neck

Discomfort in the neck and spine from spending long periods of time looking down at your smartphone. The angle at which our big heads look down forces our spine to bear the weight of approximately 60 pounds. The habit may lead to people requiring medical spine care at a younger age. Being mindful of how far your neck bends when you're on your phone — and bending it back to an upright position — can help reduce the risk of text neck.