FBLA - Digital Citizenship

full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/53

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

54 Terms

1

Anti-virus software

Used to block malicious (bad) programs, such as viruses or malware, from harming your computer.

<p>Used to block malicious (bad) programs, such as viruses or malware, from harming your computer.</p>
2

Avatar

A graphic (picture or image) that you use to represent yourself on the internet.

<p>A graphic (picture or image) that you use to represent yourself on the internet.</p>
3

Boundaries

Physical, emotional and mental limits we set to protect ourselves from being manipulated, used, or harmed by others.

<p>Physical, emotional and mental limits we set to protect ourselves from being manipulated, used, or harmed by others.</p>
4

Bully

Someone who acts in an aggressive, hostile or hurtful way towards others.

<p>Someone who acts in an aggressive, hostile or hurtful way towards others.</p>
5

Bystander

A person who witness the actions of a bully and the reaction of the victim(s), without taking action.

<p>A person who witness the actions of a bully and the reaction of the victim(s), without taking action.</p>
6

Citation

Listing the source of specific information you have used for a project or writing assignment.

<p>Listing the source of specific information you have used for a project or writing assignment.</p>
7

Citizenship

Being a member of and supporting your community and country. This comes with both rights and responsibilities.

<p>Being a member of and supporting your community and country. This comes with both rights and responsibilities.</p>
8

Copyright

A owner's legal protection to anything they create.

<p>A owner's legal protection to anything they create.</p>
9

Creative Commons

A license that allows you to decide how other may use your work. You keep your copyright, but allow others to copy and distribute your work provided they give you credit and only follow the conditions you specify.

<p>A license that allows you to decide how other may use your work. You keep your copyright, but allow others to copy and distribute your work provided they give you credit and only follow the conditions you specify.</p>
10

Cyberbullying

Using digital media tools such as the Internet and cell phones to deliberately and repeatedly hurt, harass or embarrass someone else.

<p>Using digital media tools such as the Internet and cell phones to deliberately and repeatedly hurt, harass or embarrass someone else.</p>
11

Digital Footprint

A trail of data you (unintentionally) create while using the Internet. In includes the websites you visit, emails you send, and information you submit to online services...etc. It cannot be edited or deleted. All of the information online about a person either posted by that person or others, intentionally or unintentionally.

<p>A trail of data you (unintentionally) create while using the Internet. In includes the websites you visit, emails you send, and information you submit to online services...etc. It cannot be edited or deleted. All of the information online about a person either posted by that person or others, intentionally or unintentionally.</p>
12

Downloading

The process of transferring files from a website/Internet location to your personal computer/device.

<p>The process of transferring files from a website/Internet location to your personal computer/device.</p>
13

Emoticon or Emoji

A simple face or image, sometimes animated, that expresses an emotion.

<p>A simple face or image, sometimes animated, that expresses an emotion.</p>
14

Empathy

Being aware of, sensitive to, and understanding what someone else is feeling or experiencing.

<p>Being aware of, sensitive to, and understanding what someone else is feeling or experiencing.</p>
15

Fair Use

The idea that copyright material may be quoted without the need for permission from or payment to the original source, provided that a citation is clearly given and the material quoted is reasonably brief.

<p>The idea that copyright material may be quoted without the need for permission from or payment to the original source, provided that a citation is clearly given and the material quoted is reasonably brief.</p>
16

Firewall

Hardware or software that blocks or filters certain types of network traffic from reaching your computer/device.

<p>Hardware or software that blocks or filters certain types of network traffic from reaching your computer/device.</p>
17

Flaming

A mean spirited message sent to others on the Internet

<p>A mean spirited message sent to others on the Internet</p>
18

Grooming

Techniques used by predators to try to gain your trust.

<p>Techniques used by predators to try to gain your trust.</p>
19

Hacker

A person who accesses computer information without permission.

<p>A person who accesses computer information without permission.</p>
20

Harassment

To annoy someone repeatedly.

<p>To annoy someone repeatedly.</p>
21

Hardware

A term for the actual computer equipment and computer parts.

<p>A term for the actual computer equipment and computer parts.</p>
22

Identity Theft

A crime that happens when someone gets the personal information (credit card, social security number, bank account) of another person, usually to steal money.

<p>A crime that happens when someone gets the personal information (credit card, social security number, bank account) of another person, usually to steal money.</p>
23

Intellectual Property

Art, books, inventions, magazines, movies, music, performances, reports, software, stories created by you or by others.

<p>Art, books, inventions, magazines, movies, music, performances, reports, software, stories created by you or by others.</p>
24

Jeopardize or Jeopardizing

To put something at risk, such as your reputation or digital footprint.

<p>To put something at risk, such as your reputation or digital footprint.</p>
25

Keyword

A word you use when looking for information on a search engine (Google, Yahoo, etc.)

<p>A word you use when looking for information on a search engine (Google, Yahoo, etc.)</p>
26

Malicious

Means to cause harm to someone or something on purpose.

<p>Means to cause harm to someone or something on purpose.</p>
27

Malware

Malicious software or code (trojan horses, worms, spyware, adware, etc.) that is design to damage a computer/device or collect information.

<p>Malicious software or code (trojan horses, worms, spyware, adware, etc.) that is design to damage a computer/device or collect information.</p>
28

Media Literacy

The ability to access, analyze, evaluate and create media in a variety of forms.

<p>The ability to access, analyze, evaluate and create media in a variety of forms.</p>
29

Netiquette

Courtesy, honesty and polite behavior while on the Internet

<p>Courtesy, honesty and polite behavior while on the Internet</p>
30

Open Source

Programming code with limited or no copyright restrictions, allowing you legally modify and share the software program.

<p>Programming code with limited or no copyright restrictions, allowing you legally modify and share the software program.</p>
31

Password

The secret word or combination of letters, numbers and symbols you use to sign in to the Internet or an online service to help confirm your identity.

<p>The secret word or combination of letters, numbers and symbols you use to sign in to the Internet or an online service to help confirm your identity.</p>
32

Phishing

Techniques that scammers use to collect personal information from unsuspecting users. They may use false emails or websites where you have to enter information, that look real.

<p>Techniques that scammers use to collect personal information from unsuspecting users. They may use false emails or websites where you have to enter information, that look real.</p>
33

Piracy, Pirating

Theft of intellectual property. In other words, stealing what does not belong to you. Usually, refers to music and videos.

<p>Theft of intellectual property. In other words, stealing what does not belong to you. Usually, refers to music and videos.</p>
34

Plagiarism

Using someone else's words or ideas and passing them off as your own.

<p>Using someone else's words or ideas and passing them off as your own.</p>
35

Predator

One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.

<p>One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them.</p>
36

Privacy

Your right to determine what information you would like others to know about you.

<p>Your right to determine what information you would like others to know about you.</p>
37

Search Engine

A program that searches information on the Internet by looking for specific keywords.

<p>A program that searches information on the Internet by looking for specific keywords.</p>
38

Software Patch

An upgrade, bug fix, a new hardware driver or update to fix new issues such as security or stability problems.

39

Spyware

Software that goes on your computer/device without your knowledge and steals private information.

<p>Software that goes on your computer/device without your knowledge and steals private information.</p>
40

Tolerance

Respecting those that are different from you.

<p>Respecting those that are different from you.</p>
41

Trojan Horse

Software programs that hide inside regular programs, such as games or utilities. If run, these programs can do great harm to your computer/device. Compared to an event in Greek mythology.

<p>Software programs that hide inside regular programs, such as games or utilities. If run, these programs can do great harm to your computer/device. Compared to an event in Greek mythology.</p>
42

Upload

The process by which an individual can send or post a file to the internet.

<p>The process by which an individual can send or post a file to the internet.</p>
43

Upstander

Someone who takes action to stop bullying behavior or other inappropriate behavior.

<p>Someone who takes action to stop bullying behavior or other inappropriate behavior.</p>
44

Victim

Someone who is harmed by another person or persons.

<p>Someone who is harmed by another person or persons.</p>
45

Virus

A program that duplicates itself and spreads throughout your computer/device destroying files, changing data and hogging all your memory. They damage software, not hardware (your computer/device).

<p>A program that duplicates itself and spreads throughout your computer/device destroying files, changing data and hogging all your memory. They damage software, not hardware (your computer/device).</p>
46

Worm

A virus that replicates itself, but does not change any files on your computer/device. They can multiple may times and take up all the available memory on your computer/device.

<p>A virus that replicates itself, but does not change any files on your computer/device. They can multiple may times and take up all the available memory on your computer/device.</p>
47

Reasonable Expectation of Privacy

Related to the Fourth Amendment which protects citizens' privacy in places such as: Places of residence, Restrooms, Changing rooms...etc

48

Cyber Attack

These can range from installing spyware on a personal computer to attempts to destroy the infrastructure of entire nations.

49

Hate Speech

This attacks a person or group on the basis of attributes such as race, religion, ethnic origin, sexual orientation, disability, or gender. ... In some countries, a victim may seek redress under civil law, criminal law, or both.

50

Digital Reputation

Defined by your behaviors in the online environment and by the content you post about yourself and others. Tagged photos, blog posts and social networking interactions will all shape how you are perceived by others online and offline, both now and in the future.

51

Shoulder Surfing

The practice of spying on the user of an ATM, computer, or other electronic device in order to obtain their personal access information. Recently it is used during job interviews to view your digital reputation.

52

Distracted Driving Law

The law forbids virtually all use of handheld gadgets such as phones, tablets, laptop computers and gaming devices while driving. Fines start at $136 for the first offense and $234 for the second, and will be reported to the driver's insurance company (increa$e) and will appear on the driver's record.

53

Cyber Sickness

Also known as "digital motion sickness," symptoms that range from headaches to woozy feelings can occur when you quickly scroll on your smart phone or watch action-packed video on your screen. The sensation results from a mismatch between sensory inputs.

54

Text Neck

Discomfort in the neck and spine from spending long periods of time looking down at your smartphone. The angle at which our big heads look down forces our spine to bear the weight of approximately 60 pounds. The habit may lead to people requiring medical spine care at a younger age. Being mindful of how far your neck bends when you're on your phone — and bending it back to an upright position — can help reduce the risk of text neck.