A | B |
Anonymous | someone who can't be identified based on information at hand |
Password Protection | the requirement that visitors use a password when they access a website so that only certain people can view the site and participate in its online activities |
Screen Name | the online name you choose to log in with or to post on a website |
Email | a kind of message you write and send on a computer |
Cookies | small computer text files placed in your computer by the sites you visit that collect information about your computer system and the webpages you view |
Third Party | a person or company other than you and the owner of the website you visit |
Privacy Options | choices a website might give you about what it does with your information |
Online Predator | Someone who uses the anonymous nature of the Internet to find victims and eventually take advantage of them in the real world |
Security | freedom from danger; online, “security” refers to protecting one’s private information and protecting a computer from viruses or “malware” |
Inappropriate | not proper; not o.k. |
Media | communication including television, radio, and newspapers, that often reaches and impacts a large audience |
Digital Media | electronic devices and media platforms such as computers, cell phones, digital video, social networking sites, the Internet, video games, and virtual worlds that allow users to create, communicate, and interact with one another or with the device or application itself |
Cyber bullying | the use of digital media tools such as the Internet and cell phones to deliberately upset or harass someone else |
Target | the person being cyber bullied |
Emphathize | to imagine the feelings that someone else is experiencing |
Harassment | one user continually or deliberately offends another user with actions such as posting comments intended to hurt, offend or conflict with another user's beliefs |
Phishing | the act of tricking someone into giving confidential information or tricking them into doing something that they normally wouldn’t do or shouldn’t do |
Cyber ethics | Guidelines for using computers in an ethical way; using computers without plagiarizing, insulting other users, or hacking |
Netiquette | Network etiquette; an informal group of rules and ways of behaving on the Internet." or shouldn’t do |
Social Network | An association of people drawn together by family, work or hobby that keep in contract through the Internet |