Digital Citizenship Flashcards

1
Q

Online harassment

A

The blanket term covering various forms of bad online behaviour such as catfishing and Identify theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cyber bullying

A

It’s using online tools to post mean and hurtful content directed at someone,making them feel embarrassed and degraded
This often leads to isolation and depression.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some ways cyberbullying is done

A

Sending the victim private hurtful messages

Sending messages in group insulting the victim (getting the group to join in)

Posting hurtful or insulting comments on the victims social media post

Spreading false rumours about the victim

Excluding the victim when tagging people on a post

Photoshopping pictures of the victim that they posted

Sharing embarrassing pics and memes

Using the victims picture in “hot or not” votes
Impersonating the victim in a mikiko

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Steps if you see cyberbullying

A

Tell the victim you support them

Stand up to the cyberbully and tell them what they are doing is wrong

Report the behaviour to the social media platform and to a trusted adult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Steps to take if you are the victim of cyberbullying

A

Message the bully once to stop so they cannot claim they “didn’t know”

Ignore the bully as best as you can

Keep proof/evidence on the bullying(screenshots,saved messages, photos

Set your accounts privacy to high and block the bully

Tell an adult

Report the bully to the social media platform

Report the bully to the police and get a protection order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the consequences of cyberbullying

A

It can give you a criminal record and up to 5 years in prison. You can be convicted with manslaughter(3rd degree murder) cause you pushed the victim to commit suicide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is cyberstalking

A

It is the use of online resources to repeatedly contact another person against their wishes makin them feel annoyed or threatened

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some examples of cyberstalking

A

Calling the victim constantly

Flooding the victim with messages

Finding the victims location and showing up in real life

Installing malware on the victims device *often via phishing) to spy on them

Tring to destroy the victims reputation
Eg hacking their social media accounts and posting inappropriate pictures or confessing to made up crimes or pretending to be the victim

Subscribing to social media platforms or subscriptions on the victims behalf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to prevent cyberstalking

A

Set the strictest privacy settings on your social media accounts

Do not tag locations where you live

Don’t send nude or embarrassing photos of you

Practice good password policies

Block the person if a relationship turns unpleasant

Watch out for phishing attempts-do not click on suspicious links

Check how much information you can find about yourself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Consequences of cyberstalking

A

You can file a restraining order against the cyberstalker and if they disobey they could be charged with up to 5 years in prison

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Do’s before you post

A

Think twice before you post or write something

Use social media privacy settings to choose the audience you share content with carefully

Delete a post if you realise you made a mistake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Online do not

A

Overstate cus noone like it when someone posts too much about themselves

Post when you are emotional because emotions can cloud your ability to think clearly

Be overly negative-keep unnecessary criticism to yourself

Only think of yourself-keep in mind that you are responsible for other people’s digital footprints as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

General tips to keep yourself safe on social media

A

Keep your account on private
Set who can tag photos of you
Specify who can send messages or communicate with you
Disable any setting which shows where you are or have been
Disable any setting which shows when you were last online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Netiquette

A

Netiquette is a description of what goo manners look like in the digital world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Netiquette do’s

A

Observe the tone of posts before you post

Consider the tone of communication (formal vs informal/ig vs linked in)

Learn how to respectfully disagree

Check posts for truthfulness before sharing

Stay on topic in a discussion

Read instructions/other people’s comments before you post something do not make people repeat themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Netiquette don’ts

A

Type in all CAPS

Have personal chats in a group chat

Insult people online

Point out people’s mistakes unless it’s necessary

Waste people’s data and time by sharing information unnecessarily

Repost other ppls content without their permission

Commit plagiarism

Share people’s personal information (eg contacts,adress) without asking for permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Rules for communication

A

In emails always fill the subject line

Address the person just as you would in a formal letter and if you don’t know who will get it write “to whom it may concern “

Use correct punctuation and capitalisation

Use appropriate language (no IDK)

End off with a greeting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ethics

A

The moral principles that govern or influence a person’s conduct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ethics online do’s

A

Be the best person you can be online

Respect other people’s opinions

Speak up or report it when you see cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Ethics online don’ts

A

Download copyrighted books,software,music and movies

Share passwords for sites in ways it was not intended- eg family plans on music sites should only be shared with family

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why do we need copyright

A

People make products which they use as a source of income . It could take a lot of effort to make it and someone could just steal it. It’s to help control wo makes copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is copyright

A

A law which protects anything people create which can be copied or sold. It gives you control of who can make copies of your product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Conditions for copyright

A

If your idea cab be seen hear read it touched it is protected by copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Copyright applies to

A

Written content

Software

Music or sound recordings

Video recordings

A wide variety of art forms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Whatvus public

A

A space where anyone can copy another person’s work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Why would copyright stop

A

The duration has ended and authors will willingly give up their copyright

27
Q

What is plagiarism

A

using someone elses work as your own without giving them credit

28
Q

Consequences of plagiarism

A

Warning at school or 0 on the assignment you plagiarised on

29
Q

What are the consequences for plagiarism in University

A

Expulsion

30
Q

What must you do if you use information from a source in an assignment

A

Refer to the source at the specific place where you used information from that source and include a description of the source in a reference list

31
Q

How to reference a book

A

Say the surname of the author and the publication date in the body of the assignment

32
Q

How to reference in the bibliography

A

Authors surname,year publication title of the book

33
Q

How yo reference an online source

A

Author or name of company
Url
Year published
Titles of the website
Daye accessed

34
Q

Public domain

A

Creative works that are copyright free

35
Q

Referencing

A

Acknowledging the source whr you found your information

36
Q

FAIR USE

A

The right to use copyrighted materials without permission

37
Q

What do you need to prove to get a protection order

A

You need to prove someone is following,watching,bothering or communicating with you in a ongoing fashion. This can be done by saving evidence such as texts and emails

38
Q

What do you do if you don’t know who is harassing you

A

You can still apply for a protection order so the court can order police to investigate

39
Q

What should you do if you are being harassed

A

You should apply for a protection order at your local court

40
Q

What happens after you apply for a protection

A

The court will Grant an interim protection order while they’re matters being investigated and they will see if a permanent protection order can be granted

41
Q

What must be offending person know

A

The offending person must be informed of the interim protection order and be given a date to when the matter will be heard in court disc give the person a chance to defend themselves and forbids the offending person from contacting you or approaching you physically

42
Q

What happens if someone breaks the terms of a protection order

A

They may be sentence for up to 5 years in jail or have to pay a fine

43
Q

What does POPI stand for

A

Protection of personal information

44
Q

Is the poppy act

A

A law which aims to protect the privacy of information

45
Q

Who is affected by the poppy act

A

People or institutions who collect, store and process information

46
Q

What happens if the requirements of the poppy act are not met

A

Someone who first to protect information can face a fine of up to 10 million
as well as have to pay damages of to those whose information was misused or made public

they can also be sending to a term in prison

47
Q

What should you do if you suspect your personal information has been misused or has been leaked

A

You can report this to the regulator( an office or group of people appointed by the Parliament to oversee the act)

48
Q

What is the r i c a act

A

A law which aims to control the monitoring of people’s Communications
this law set out rules about who is allowed to intercept your Communications
aka tap into your phone calls(listen to), monitor your emails etc

49
Q

Who is affected by the Rica act

A

Everyone

50
Q

What is the Rica act used for sometimes

A

It is used to catch criminals because they use it to plan and carry out crimes so police can apply to a judge to give them permission to monitor their Communications

51
Q

What should you do to be protected by the Rica act

A

Make sure you provide accurate information when supplying information required by the Rica act

52
Q

What is the cybercrime’s bill

A

It is a law which tries to define what cybercrime and cyber terrorism are and how these crimes can be fought punished and ultimately prevented

53
Q

Who is affected by the cybercrimes bill

A

Anyone who uses a computing device whether it be a smartphone ,tablet laptop or desktop computer

54
Q

What are some examples of cybercrimes in the bill

A

Unauthorized access to data or hardware
Unauthorized interception of Communications
fraud committed using computing devices
sending messages that incite violence or damaged to property or that threaten a person or group of persons

55
Q

What penalties are laid down for breaking rules in the cybercrime bill

A

A person can spend up to 15 years in prison
or
up to 25 years if he slatch she commits an act of terrorism against the state
or
they have to pay for it

56
Q

What should you do to protect yourself from The cybercrimes Bill or getting in trouble

A

Understand what can be regarded as a cybercrime and make sure you do not Commit This crimes

57
Q

Variables

A

variables keep values that the computer must remember so that they can be used later

58
Q

What is an example of a variable

A

Formula for calculating area of a rectangle is area = length*breath
so when you swap in numbers that is when you are giving variables a value

59
Q

How do you use decomposition to solve problems

A

First identify the main (larger) problem by describing it in your own words

then identify the smaller problems that together make up the lodge her problem

then find solutions for all the smaller problems which will together solve the main problem as well

60
Q

Describe the start/stop flowchart shape and what it does

A

It is a rectangle with circular edges and an indicates whether algorithm starts/stops

61
Q

Describe the instruction chart flowchart shape and what it does

A

It is a rectangle and the actions (processing) that must take place

62
Q

Describe the decision flowchart shape and its function

A

It is a diamond laying on its side and it has questions with a yes or no answer

63
Q

Describe the input/ output shape in a flowchart and what it does

A

It is a parallelogram and all data given to the program (input) and the results of the processing communicated to the user( output)