1/49
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Technology as a system
Technology understood not just as devices, but as a whole system of tools, software, infrastructure, norms, and habits that structure everyday life.
Digitalization
The shift of processes and services toward digital tools and platforms to increase efficiency and convenience (e.g., online banking, e-government).
Internet of Things (IoT)
A network of connected everyday objects (sensors/devices) that collect data and can be controlled digitally (often used in smart homes).
Smart home
A home in which connected devices (e.g., thermostats, lighting, security systems) automate or optimize comfort and energy use—while also collecting data in private spaces.
Smart infrastructure
Digitally enhanced systems (e.g., real-time transit apps, contactless payment) that make public services more efficient and easier to use.
Push notifications
Automatic alerts sent by apps to draw attention and prompt quick interaction, often shaping communication pace and expectations.
Immediate-reply expectation
The social pressure created by constant messaging that makes people feel they should respond right away, which can increase closeness or cause stress.
Informal chat register
A typically casual writing style in messaging (short, informal, sometimes less polite), which may be inappropriate in formal contexts like emails or essays.
Missing nonverbal cues
A feature of text-based digital communication: tone, facial expressions, and body language are absent, so misunderstandings become more likely.
Blurred private/public boundary
A situation in which digital content (comments, photos, messages) can quickly spread beyond its intended audience.
Screenshot risk
The possibility that a seemingly private message can be captured and shared, making private communication suddenly public.
Cause-and-effect connectors
Language that links mechanism to outcome clearly (e.g., “because of…,” “therefore…,” “this leads to…”).
Video calls
Real-time visual communication that helps maintain relationships across distance, but cannot fully replace physical presence.
Social media
Online platforms that enable sharing, interaction, and relationship maintenance in real time, but can also raise privacy and misinformation concerns.
Virtual communities
Online groups (e.g., Facebook groups) that create new forms of community by organizing events, sharing resources, and supporting local networks.
Cultural exchange (via platforms)
The global sharing of traditions and ideas through platforms like YouTube or TikTok, increasing visibility while also creating new risks (privacy, misinformation).
Privacy risk
Potential harm when personal information or behavior becomes observable, shareable, or exploitable, reducing individual control over personal life.
Algorithm
A set of rules or models used by digital systems to sort information, make decisions, or recommend content.
Recommender algorithm
A system that analyzes user interactions (clicks, watch time, likes) to show more content likely to keep the user engaged.
Filter bubble
A potential outcome of recommendation systems: users are shown mostly content that matches prior behavior, reducing exposure to diverse viewpoints.
Media literacy
The ability to use media critically—evaluating sources, recognizing manipulation, and understanding how platforms and algorithms shape information.
Misinformation
False or inaccurate information shared without the intent to mislead.
Disinformation
False information spread intentionally to mislead or manipulate.
Source evaluation checklist
A practical method to judge credibility: identify the publisher, check evidence, watch for emotional/extreme language, and confirm with other reliable sources.
Data protection
The protection of personal data so it is processed securely and only for specific, legitimate purposes.
Privacy
A broader concept than data protection: control over personal space and information—what you reveal, who can observe you, and how much control you have.
App permissions
Access rights an app requests (e.g., location, contacts, microphone), which determine what personal data it can collect.
Metadata
Data about data (e.g., when, where, how long, and from which device), often highly revealing even without names or addresses.
Data linking
The combination of multiple data types (e.g., location + search history) to create a much more detailed picture of a person.
Data profiling
Using combined data to build a detailed user profile (interests, habits) that can influence what content or offers a person receives.
Personalized advertising
Ads targeted to individuals based on data and profiles, often powered by algorithmic analysis of user behavior.
“Nothing to hide” fallacy
The flawed argument that privacy does not matter if someone has done nothing wrong; it ignores power imbalances, misuse, leaks, and discrimination risks.
Anonymity
A state in which a person cannot be identified from their data or actions (true anonymity is difficult online).
Pseudonymity
Using a nickname instead of a real name; it does not guarantee anonymity if behavior, device data, or location can still identify someone.
Digital responsibility
Ethical online behavior that protects oneself and respects others (e.g., consent, careful sharing, and critical forwarding of information).
Informed consent (sharing content)
Getting permission before posting photos/videos of others, acknowledging their right to control their image and data.
Digital civil courage
Responsible action in digital spaces—e.g., responding to hate speech or cyberbullying by reporting, supporting victims, and setting boundaries.
Cyberbullying
Harassment or intimidation using digital channels, often requiring reporting, support, and clear limits as responses.
Strong passwords
Long, unique, hard-to-guess passwords that reduce the risk of account takeover.
Two-factor authentication (2FA)
An added security step requiring a second proof of identity (e.g., code/app) beyond a password.
Cybersecurity
Practices and tools that protect accounts, devices, and networks from hacking, misuse, and data leaks.
Telemedicine
Medical consultation and follow-up delivered at a distance via video, apps, or platforms; can improve access but raises privacy and equity concerns.
Doctolib
An example of a platform that connects patients and doctors online, including appointment booking and secure video consultations.
Wearables
Devices like smartwatches that track health-related measures (steps, heart rate, sleep) and can support motivation and prevention.
Personalized medicine
Medical approaches that tailor diagnosis and treatment to individual characteristics (often including genetic profiles) to increase precision and effectiveness.
Medical imaging (MRI/CT/PET)
Diagnostic technologies that allow earlier detection and more precise treatment planning (e.g., MRI, CT scans, PET scans).
Biotechnology
The use of biological processes in research and medicine (e.g., vaccine development, gene therapy, immunotherapies).
Energiewende
Germany’s long-term transition of energy supply away from fossil fuels (and historically debated nuclear power) toward renewables like wind and solar.
E-mobility
Transportation based on electric vehicles and related infrastructure, promoted to reduce emissions (e.g., German EV models like the VW ID.4 and BMW iX).
Industry 4.0
The integration of automation, robotics, and digital systems into manufacturing to increase efficiency and quality, while changing skill requirements for workers.