Digital Citizenship and Internet Safety Vocabulary

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/37

flashcard set

Earn XP

Description and Tags

These flashcards cover key vocabulary terms related to digital citizenship and internet safety.

Last updated 6:39 PM on 3/19/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

38 Terms

1
New cards

Anonymous

When someone keeps their identity secret so that their actions can't be tied to them.

2
New cards

Blackmail

When someone forces a target to do something by saying they'll reveal information that the target wants to keep private.

3
New cards

Catfishing

When a person uses an online persona to gain the trust of someone else.

4
New cards

Cyberstalking

Messaging, commenting, or talking to someone digitally in a way that's threatening or stressful.

5
New cards

Denigration

Making someone look bad by spreading rumors or gossip.

6
New cards

Doctored

Photos and videos that have been edited to look real, often changing what a person is doing.

7
New cards

Flaming

Posting or sending insults and offensive comments.

8
New cards

Hate Speech

Insults or harsh words that target someone based on a part of their identity, such as their religion or race.

9
New cards

Impersonation

Pretending to be someone you aren't online in order to hurt someone else.

10
New cards

Outing or Doxing

Revealing private information about someone else online.

11
New cards

Trolling

Attempting to start arguments online.

12
New cards

Contact Information

A way to get help from a website if something goes wrong.

13
New cards

Cyberbullying

Rude actions online that can include calling someone names, spreading rumors, or posting things without permission.

14
New cards

Identity Theft

When a criminal pretends to be someone else and opens bank accounts or claims things in another person's name.

15
New cards

Malware

Software that damages a device or steals information.

16
New cards

Misinformation

Information that isn't true, often created to trick people.

17
New cards

Privacy Policy

A document that states what a company will do with your information when they obtain it.

18
New cards

Ransomware

Malware that locks up a system or certain files until the victim pays money.

19
New cards

Sensitive Information

Information that could be dangerous for others to know, such as someone's full name, address, or account numbers.

20
New cards

Spyware

Malware that watches and records information from a device.

21
New cards

SSL Certificate

A way for websites to show they are protecting the data on their site.

22
New cards

Virus

Malware that spreads throughout a device and damages it.

23
New cards

Cookies

Small packets of information that websites store on your computer to track interactions with the site.

24
New cards

Digital Footprints

The trail of information about us that we leave online.

25
New cards

Invisible Audience

The hundreds of people who pay attention to your online behaviors, including strangers and potential employers.

26
New cards

IP Address

A number assigned to your computer when accessing online content that can be used to identify your activity.

27
New cards

Login Information

Everything used to verify online accounts, including passwords and associated email addresses.

28
New cards

Virtual Private Network (VPN)

A service that prevents you from being tracked and located online.

29
New cards

Digital Wellness

A part of health impacted by technology, referring to a healthy relationship with technology.

30
New cards

Intellectual Health

An aspect of overall wellness focused on creativity, learning, and open-mindedness.

31
New cards

Mental Health

Part of overall wellness including emotional, psychological, and social well-being.

32
New cards

Physical Health

Focusing on the physical body, accounting for activity level, nutrition, and sleep cycle.

33
New cards

Social Health

The ability to form relationships and interact with others.

34
New cards

Brute Force Attack

A way for hackers to get into accounts with weak passwords by trying common passwords.

35
New cards

Phishing

When a scammer impersonates a legitimate company online to trick you into providing information.

36
New cards

Remote Access

The ability to control your device through another phone or computer.

37
New cards

Security Breach

When data a company stores is exposed to a hacker.

38
New cards

Security Questions

An alternate way of identifying customers when they have forgotten a password.

Explore top notes

note
Observation and Critique Exercise
Updated 626d ago
0.0(0)
note
Of Mice and Men - Study Guide
Updated 1275d ago
0.0(0)
note
Mental Health
Updated 323d ago
0.0(0)
note
Chapter 22: Solutions
Updated 1032d ago
0.0(0)
note
WW2 1939-1945
Updated 1386d ago
0.0(0)
note
Chapter 8 - Acids, Bases, and pH
Updated 1437d ago
0.0(0)
note
Observation and Critique Exercise
Updated 626d ago
0.0(0)
note
Of Mice and Men - Study Guide
Updated 1275d ago
0.0(0)
note
Mental Health
Updated 323d ago
0.0(0)
note
Chapter 22: Solutions
Updated 1032d ago
0.0(0)
note
WW2 1939-1945
Updated 1386d ago
0.0(0)
note
Chapter 8 - Acids, Bases, and pH
Updated 1437d ago
0.0(0)

Explore top flashcards

flashcards
Gilded Age Study Guide
74
Updated 729d ago
0.0(0)
flashcards
Semester Exam Revision
182
Updated 478d ago
0.0(0)
flashcards
VOCAB FINAL HAMILTON
83
Updated 1192d ago
0.0(0)
flashcards
Verbs (me-)
41
Updated 1026d ago
0.0(0)
flashcards
Unit 3: Iceland
24
Updated 892d ago
0.0(0)
flashcards
Sociology 2463 Midterm 2
216
Updated 101d ago
0.0(0)
flashcards
Gilded Age Study Guide
74
Updated 729d ago
0.0(0)
flashcards
Semester Exam Revision
182
Updated 478d ago
0.0(0)
flashcards
VOCAB FINAL HAMILTON
83
Updated 1192d ago
0.0(0)
flashcards
Verbs (me-)
41
Updated 1026d ago
0.0(0)
flashcards
Unit 3: Iceland
24
Updated 892d ago
0.0(0)
flashcards
Sociology 2463 Midterm 2
216
Updated 101d ago
0.0(0)