1/49
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Phenomenon–Cause–Result–Evaluation–Suggestion structure
A clear way to explain tech’s impact: state what’s happening, why it happens, what it leads to, your judgment (pros/cons), then advice or a prediction.
Cause-and-effect connectors
Words/structures used to explain why something happens and what it leads to (e.g., “because…therefore…”).
Comparison connectors
Language that highlights differences or similarities (e.g., “compared with…,” “in contrast,” “what’s different is…”).
Concession structure
A balanced structure to avoid absolute claims (e.g., “although…however…,” “even though…still…”).
Progressive emphasis
A structure that strengthens a point by adding more impact (e.g., “not only…but also…,” “even…”).
Two-sided analysis
A framework for discussing pros and cons (e.g., “on one hand…on the other hand…”).
Conditional structure
Language for rules, consequences, or advice (e.g., “as long as…then…,” “if…then…”).
Information age
A period in which information is created and shared rapidly through digital networks, reshaping how people learn, decide, and communicate.
Information literacy
The ability to judge whether information is trustworthy by checking sources, dates, and multiple reports rather than believing the first result.
Rumor
Information without solid evidence that may spread widely online but is not necessarily true.
Verification
Confirming information by checking credible sources, time stamps, and comparing multiple outlets before accepting or sharing it.
Algorithmic recommendation
When platforms predict what you like based on clicks and watch time, then push similar content to you.
Filter bubble (information cocoon)
A situation where algorithms show you mostly similar viewpoints, reducing exposure to different perspectives and narrowing your worldview.
Short-video consumption
Getting information mainly through brief clips, which increases speed of spread but may encourage fragmentary understanding and quick judgments.
Polite reminder strategy
A respectful way to correct misinformation: show understanding, express uncertainty, suggest checking sources, and offer an alternative report.
Social media
Online platforms that extend interaction beyond face-to-face communication through messaging, likes, comments, and sharing.
WeChat (Weixin)
A multifunctional Chinese app commonly used for chatting, group communication, and even mobile payments.
A Chinese social platform often used for news, entertainment, and public discussion.
Douyin
A Chinese short-video platform known for rapid content spread and influencer-driven trends.
Blurred time boundaries
When messages and notifications can arrive anytime, disrupting rest and making it harder to separate work/study from personal time.
Social comparison anxiety
Stress caused by comparing yourself to others’ curated or edited online lives, which can increase pressure and insecurity.
Online identity presentation
The selective way people show certain parts of themselves online, creating tension between authenticity and performance.
“Likes” as a value metric
A mindset where attention metrics (likes, views) are treated as proof of personal worth over time.
Three-step conflict-response method
A communication technique: first acknowledge/validate, then explain facts or feelings, and finally propose a solution or next step.
Censorship
When content is monitored, removed, or limited on platforms, especially if considered politically sensitive or tied to security concerns.
Privacy concerns
Worries that platforms may collect, use, or share user data without clear consent or adequate protection.
Cyberbullying / online harassment
Online abuse such as insults, threats, doxxing, or targeted attacks that can harm individuals psychologically and socially.
Personal information
Data that can identify or track you, including phone number, email, address/location, photos/face data, and shopping habits.
Phishing link/site
A fake link or website designed to steal passwords or sensitive data by imitating a legitimate service.
Verification code (one-time code)
A security code that should not be shared; giving it away can allow others to access your accounts.
Social engineering scam
Fraud that uses bits of personal info and emotional pressure (panic, greed, convenience) to trick you into clicking links or transferring money.
Online banking
Bank services that let users transfer money, pay bills, and check balances digitally; convenient but still requires scam awareness.
Encryption (in online banking context)
Security technology used by banks to protect financial and personal data during digital transactions.
AI (artificial intelligence)
Technology that processes large amounts of data to recognize patterns, make recommendations, support decisions, or automate services.
Automation
Using systems or machines to complete tasks (especially repetitive, rule-based work) with less direct human labor.
Job displacement vs. job creation
The idea that AI may replace some routine jobs while also creating new roles (system maintenance, product design, data management, ethics/regulation).
Human comparative strengths
Skills emphasized as AI grows: creativity, communication, cross-disciplinary understanding, empathy, and judgment.
AI ethics
Concerns about fairness, transparency, and accountability when AI is used for screening, recommending, or evaluating people.
Bias and unfairness (in AI)
When training data is incomplete or skewed, leading AI systems to disadvantage certain groups or make inequitable decisions.
Transparency (in AI decisions)
Whether people can understand why a system made a certain recommendation or judgment.
Accountability (in AI errors)
The question of who is responsible when AI causes harm—developers, users, or institutions.
Telemedicine / remote healthcare
Medical support provided through online consultation, remote monitoring, or digital reports; helpful for basic needs but not a full replacement for in-person care.
Electronic medical record
A digital version of health records and test results that patients and providers can access and manage more efficiently.
Wearable health device
A device that tracks data like steps, sleep, or heart rate; useful for habits but can also increase anxiety and privacy risks.
Digital barrier for older adults
Difficulties seniors may face with healthcare apps (small text, unfamiliar steps, fear of mistakes), requiring offline options and support.
Online learning (web-based classes)
Learning that happens through digital platforms, making time and location flexible but increasing the need for self-discipline and focus.
Academic integrity (with tech tools)
The principle that tools may support understanding (dictionary, pronunciation, error-checking) but should not replace a student’s core thinking or original work.
Mobile payment
Cashless payment via scanning or tapping (e.g., app-based), which saves time but can encourage impulsive spending due to low friction.
E-commerce shopping festival
Large-scale online sales events (e.g., Singles’ Day) that reflect how tech reshapes consumer habits and life pace.
Digital divide
Unequal access to devices, internet, and digital skills across groups (city/rural, income, age, education), which can create new forms of inequality.