Digital Citizenship Flashcards

1
Q

Online harassment

A

The blanket term covering various forms of bad online behaviour such as catfishing and Identify theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cyber bullying

A

It’s using online tools to post mean and hurtful content directed at someone,making them feel embarrassed and degraded
This often leads to isolation and depression.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some ways cyberbullying is done

A

Sending the victim private hurtful messages

Sending messages in group insulting the victim (getting the group to join in)

Posting hurtful or insulting comments on the victims social media post

Spreading false rumours about the victim

Excluding the victim when tagging people on a post

Photoshopping pictures of the victim that they posted

Sharing embarrassing pics and memes

Using the victims picture in “hot or not” votes
Impersonating the victim in a mikiko

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Steps if you see cyberbullying

A

Tell the victim you support them

Stand up to the cyberbully and tell them what they are doing is wrong

Report the behaviour to the social media platform and to a trusted adult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Steps to take if you are the victim of cyberbullying

A

Message the bully once to stop so they cannot claim they “didn’t know”

Ignore the bully as best as you can

Keep proof/evidence on the bullying(screenshots,saved messages, photos

Set your accounts privacy to high and block the bully

Tell an adult

Report the bully to the social media platform

Report the bully to the police and get a protection order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the consequences of cyberbullying

A

It can give you a criminal record and up to 5 years in prison. You can be convicted with manslaughter(3rd degree murder) cause you pushed the victim to commit suicide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is cyberstalking

A

It is the use of online resources to repeatedly contact another person against their wishes makin them feel annoyed or threatened

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some examples of cyberstalking

A

Calling the victim constantly

Flooding the victim with messages

Finding the victims location and showing up in real life

Installing malware on the victims device *often via phishing) to spy on them

Tring to destroy the victims reputation
Eg hacking their social media accounts and posting inappropriate pictures or confessing to made up crimes or pretending to be the victim

Subscribing to social media platforms or subscriptions on the victims behalf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to prevent cyberstalking

A

Set the strictest privacy settings on your social media accounts

Do not tag locations where you live

Don’t send nude or embarrassing photos of you

Practice good password policies

Block the person if a relationship turns unpleasant

Watch out for phishing attempts-do not click on suspicious links

Check how much information you can find about yourself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Consequences of cyberstalking

A

You can file a restraining order against the cyberstalker and if they disobey they could be charged with up to 5 years in prison

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Do’s before you post

A

Think twice before you post or write something

Use social media privacy settings to choose the audience you share content with carefully

Delete a post if you realise you made a mistake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Online do not

A

Overstate cus noone like it when someone posts too much about themselves

Post when you are emotional because emotions can cloud your ability to think clearly

Be overly negative-keep unnecessary criticism to yourself

Only think of yourself-keep in mind that you are responsible for other people’s digital footprints as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

General tips to keep yourself safe on social media

A

Keep your account on private
Set who can tag photos of you
Specify who can send messages or communicate with you
Disable any setting which shows where you are or have been
Disable any setting which shows when you were last online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Netiquette

A

Netiquette is a description of what goo manners look like in the digital world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Netiquette do’s

A

Observe the tone of posts before you post

Consider the tone of communication (formal vs informal/ig vs linked in)

Learn how to respectfully disagree

Check posts for truthfulness before sharing

Stay on topic in a discussion

Read instructions/other people’s comments before you post something do not make people repeat themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Netiquette don’ts

A

Type in all CAPS

Have personal chats in a group chat

Insult people online

Point out people’s mistakes unless it’s necessary

Waste people’s data and time by sharing information unnecessarily

Repost other ppls content without their permission

Commit plagiarism

Share people’s personal information (eg contacts,adress) without asking for permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Rules for communication

A

In emails always fill the subject line

Address the person just as you would in a formal letter and if you don’t know who will get it write “to whom it may concern “

Use correct punctuation and capitalisation

Use appropriate language (no IDK)

End off with a greeting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ethics

A

The moral principles that govern or influence a person’s conduct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Ethics online do’s

A

Be the best person you can be online

Respect other people’s opinions

Speak up or report it when you see cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Ethics online don’ts

A

Download copyrighted books,software,music and movies

Share passwords for sites in ways it was not intended- eg family plans on music sites should only be shared with family

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why do we need copyright

A

People make products which they use as a source of income . It could take a lot of effort to make it and someone could just steal it. It’s to help control wo makes copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is copyright

A

A law which protects anything people create which can be copied or sold. It gives you control of who can make copies of your product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Conditions for copyright

A

If your idea cab be seen hear read it touched it is protected by copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Copyright applies to

A

Written content

Software

Music or sound recordings

Video recordings

A wide variety of art forms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Whatvus public
A space where anyone can copy another person's work
26
Why would copyright stop
The duration has ended and authors will willingly give up their copyright
27
What is plagiarism
using someone elses work as your own without giving them credit
28
Consequences of plagiarism
Warning at school or 0 on the assignment you plagiarised on
29
What are the consequences for plagiarism in University
Expulsion
30
What must you do if you use information from a source in an assignment
Refer to the source at the specific place where you used information from that source and include a description of the source in a reference list
31
How to reference a book
Say the surname of the author and the publication date in the body of the assignment
32
How to reference in the bibliography
Authors surname,year publication title of the book
33
How yo reference an online source
Author or name of company Url Year published Titles of the website Daye accessed
34
Public domain
Creative works that are copyright free
35
Referencing
Acknowledging the source whr you found your information
36
FAIR USE
The right to use copyrighted materials without permission
37
What do you need to prove to get a protection order
You need to prove someone is following,watching,bothering or communicating with you in a ongoing fashion. This can be done by saving evidence such as texts and emails
38
What do you do if you don't know who is harassing you
You can still apply for a protection order so the court can order police to investigate
39
What should you do if you are being harassed
You should apply for a protection order at your local court
40
What happens after you apply for a protection
The court will Grant an interim protection order while they're matters being investigated and they will see if a permanent protection order can be granted
41
What must be offending person know
The offending person must be informed of the interim protection order and be given a date to when the matter will be heard in court disc give the person a chance to defend themselves and forbids the offending person from contacting you or approaching you physically
42
What happens if someone breaks the terms of a protection order
They may be sentence for up to 5 years in jail or have to pay a fine
43
What does POPI stand for
Protection of personal information
44
Is the poppy act
A law which aims to protect the privacy of information
45
Who is affected by the poppy act
People or institutions who collect, store and process information
46
What happens if the requirements of the poppy act are not met
Someone who first to protect information can face a fine of up to 10 million as well as have to pay damages of to those whose information was misused or made public they can also be sending to a term in prison
47
What should you do if you suspect your personal information has been misused or has been leaked
You can report this to the regulator( an office or group of people appointed by the Parliament to oversee the act)
48
What is the r i c a act
A law which aims to control the monitoring of people's Communications this law set out rules about who is allowed to intercept your Communications aka tap into your phone calls(listen to), monitor your emails etc
49
Who is affected by the Rica act
Everyone
50
What is the Rica act used for sometimes
It is used to catch criminals because they use it to plan and carry out crimes so police can apply to a judge to give them permission to monitor their Communications
51
What should you do to be protected by the Rica act
Make sure you provide accurate information when supplying information required by the Rica act
52
What is the cybercrime's bill
It is a law which tries to define what cybercrime and cyber terrorism are and how these crimes can be fought punished and ultimately prevented
53
Who is affected by the cybercrimes bill
Anyone who uses a computing device whether it be a smartphone ,tablet laptop or desktop computer
54
What are some examples of cybercrimes in the bill
Unauthorized access to data or hardware Unauthorized interception of Communications fraud committed using computing devices sending messages that incite violence or damaged to property or that threaten a person or group of persons
55
What penalties are laid down for breaking rules in the cybercrime bill
A person can spend up to 15 years in prison or up to 25 years if he slatch she commits an act of terrorism against the state or they have to pay for it
56
What should you do to protect yourself from The cybercrimes Bill or getting in trouble
Understand what can be regarded as a cybercrime and make sure you do not Commit This crimes
57
Variables
variables keep values that the computer must remember so that they can be used later
58
What is an example of a variable
Formula for calculating area of a rectangle is area = length*breath so when you swap in numbers that is when you are giving variables a value
59
How do you use decomposition to solve problems
First identify the main (larger) problem by describing it in your own words then identify the smaller problems that together make up the lodge her problem then find solutions for all the smaller problems which will together solve the main problem as well
60
Describe the start/stop flowchart shape and what it does
It is a rectangle with circular edges and an indicates whether algorithm starts/stops
61
Describe the instruction chart flowchart shape and what it does
It is a rectangle and the actions (processing) that must take place
62
Describe the decision flowchart shape and its function
It is a diamond laying on its side and it has questions with a yes or no answer
63
Describe the input/ output shape in a flowchart and what it does
It is a parallelogram and all data given to the program (input) and the results of the processing communicated to the user( output)