Unit 4 Flashcards

1
Q

What is a phishing scam

A

online scams that online predators use to access people’s information online.

-want to steal your information
-send you an email or instant message through social media site or an online game.
-pretend to be someone they
aren’t
-ask you for private information or they tell you to click a hyperlink, so you can complete an important task.
-If you give them the information or click the hyperlink, you will be at risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to protect yourself from phishing scam

A
  1. Be careful of suspicious messages- dont share private info online - Don’t click on a link or download a file if you don’t know or trust the sender.
  2. Ensure webpage is safe and secure and trusted
    Most secure websites have the prefix https at the beginning of the URL in the browser address bar.
  3. Install verified anti malware software- special

software designed to protect your computer from harmful software and hackers.

4.Keep web browser and operating system up to date-automatic updates -receive the latest security updates that help to protect your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

three tips you can use to keep yourself safe from online predators when communicating online.

A
  1. Trust your instinct- dont continue to communicate if makes you nervous or uncomfortable - report suspicious activity

2.Dont share personal info with an online stranger

  1. Keep your distance- think twice before meeting someone you met online-fake profiles
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define a password

A

Passwords help protect your personal information and accounts from other people
A strong password is like a strong lock for your account, you want it to be difficult for others to guess, you also want it to be safe and secure so others can’t find it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5 tips to create strong passwords and keep them safe.

A

1.Use a combination of letters, numbers, and symbols in your password- combination of uppercase and lowercase letters and characters and adding numbers

2.Avoid using common words and phrases personal keywords -make it unique-not easily guessed

3.Use different passwords for different accounts.

4.your password is for you only-don’t save your login information on a public computer.

5.avoid doing personal business on public computers and public networks- easier for hackerr to guess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How the internet and the web make it possible for us to stay connected with friends and family across the world.

A
  1. social media and other platforms to see what’s happening in our friend’s lives
    2share personal news
  2. stay in touch with others
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is digital footprint

A

Your digital footprint is a history of all the activity you do online. Any social media posts you make, any websites you visit, and any information you share online contributes to your digital footprint.

It can’t be erased. So, your digital footprint can last forever.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

4 ways to manage your digital footprint.

A

1.know what your footprint says about you-Other people use your digital footprint to make judgements- employers
2.Manage your privacy settings
3.Manage your cookies
4 think before you share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are cookies

A

Cookies are notes given to your web browser as you browse the web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to use online information fairly and responsibly

A

When someone puts their original work online including their words, images, videos, music, and more, they become the owner of the content,have certain rights- copyrights, to decide how that content can be used.

If you want to use someone else’s content in your work, be sure to reference them to give them credit for their work.

When you are using someone’s work in a product that you are selling, you should first obtain permission from the author. You might also have to pay for a license to use someone’s work.

Sometimes, the authors of content make their work available for free use- use search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define plaigiarism

A

If you use someone else’s words or work as your own, it is considered plagiarism . This isn’t fair to the original author and can get you into trouble.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define cyberbullying

A

-bullying that takes place on the internet

-People can use the internet to send mean messages to someone, spread fake rumors, /share someone’s private information without permission.

-feelings can be hurt, their reputation can be damaged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you promote digital civility online

A
  1. Live by the Golden rule-treat others how you want to be treated-irl &online
  2. Respect differences even If you don’t agree

3.Dont participate in bullying/spread negative msg
4.Think twice before sharing online-consequences
5. Report to a trusted individual- offer support
6.Pause before replying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly