A | B |
Term | Definition |
Cyberbullying definition | Is the use of technology to harass, bully, threaten or intimidate others |
Cyberharrassment | anonymously using a device with the purpose of harassing or threatening the victim. It also includes relaying sexually suggestive messages after the victim has requested the caller to stop such communications. |
Cyberstalking | when a person causes serious mental distress to another or causes the person to believe they are in danger of serious harm, through the use of a computer. |
Cybertheft/fraud | No one can assume an assumed identity to fraudulently purchase items or sign up for services; You cannot deceitfully sell goods knowingly selling something different than advertised |
DO First: D | Don't Retaliate |
DO First: F | Figure out who it is |
DO First: I | Ignore |
DO First: O | Off your buddy list/unfriend/unfollow/block user |
DO First: R | Respond after thinking |
DO First: S | Save Evidence |
DO First: T | Tell an adult for help |
If you feel you are being cyberbullied you should | DO FIRST |
Jessica Logan Act | requires school districts to establish cyber-bullying policies and to annually teach teachers and inform parents about their overall bullying policies. It also requires them to teach students about the policies if state or federal funding is provided for that purpose. |
Jessica Logan Who Was She | She was an Ohio teen whose sext picture was shared with everyone at multiple schools who ended up committing suicide because of the constant humilitation and cyberbullying |
Ohio Cyberbullying Laws | Ohio has 4 laws related to cyberbullying: |
Types of Cyberbullies: 4. Inadvertent Cyberbully | doesn’t know they are being a cyberbully; they don’t know how to react appropriately tosends out electronic communication without understanding how and why others can take it the wrong way (they think they are being funny, joking, sarcastic, but since no body language online the receiver of communication takes the communication in a way that feels like they are being cyberbullied) |
Types of Cyberbullies: 2. Revenge of the Nerds Cyberbully | need an audience; want to exert their power/authority/intelligence over other people; have often been a victim of bullying (non-cyber); typically works in secret; rarely sees the seriousness of his/her actions ; most dangerous of all cyberbullies |
Types of Cyberbullies: 3. Mean Girls Cyberbully | ego-based and most immature of all cyberbullies; typically female cyberbullies but can be boys; victims usually girls but sometimes boys; Like the movie Mean Girls |
Types of Cyberbullies: 1. Vengeful Angel Cyberbully | doesn’t see themselves as a bully; right wrong; protecting themselves or others from a bully ; the become a cyberbully themselves! Similar to BATMAN |
Types of Technology Used in Cyberbullying | Cell phones (voice or text), Iming, Postings on websites, Postings on social network sites, private messages to social network sites, Email…. |
Ways to prevent from becoming a Cyberbully | Use good netiquette; unplug once in a while; don’t post anything about anyone that you wouldn’t want posted about yourself; don't post pics of others without asking for permission first; talk out issues with a friend or adult first before lashing out with your computer/cell phone |
Ways to prevent from being a VICTIM to cyberbullying | don’t believe everything you read online; be nice to people in the “real” worldnever open messages from people you don’t know; trust your instincts; unplug once in a while; don't share your passwords with anyone else |
Input Devices | sends info from the user to CPU (mouse, keyboard, microphones) |
CPU | central processing unit; Brains of the computer |
Output Devices | sends info from the CPU to user (printer, monitor, speakers) |
Binary Code | the basics of all computers; 1 = on/true; 0 = off/false |
speed of calculations | 1 hundred million calculations per second for average computer |
supercomputers speed of calculations | trillions/quadrillions of calculations per second |
Supercomputers are: | series of big computers "chained together" to work as 1 |
Charles Babbage | "father" of computers; had the idea for computers in the 1830's |
The Analytical Machine | design for computer by Charles Babbage but never built due to lack of money and design issues |
Herman Hollerith | MIT Professor who created the Hollerith Census Tabulator |
Hollerith Census Tabulator | made for 1890 census to speed up process of counting census cards; done in 6 weeks vs 10 years; punch card computer system |
Colossus Computer | first electronic digital computer made in World War II to break German Enigma machine codes |
ENIAC | built in 1943-45; electronic general purpose computer to solve many different problems |
ENIAC Specifications | 100 feet long, 30 tons, and 18,000 vacuum tubes |
Univac stands for | Universal Atomatic Computer |
Univac was | first mainframe computer commercially sold and mass produced; size of a typical classroom |
IBM, who started it | started with Hollerith Census Tabulator and went on to build mainframes through 1960's |
NASA needed Computer Guidance System | since pencils/paper & slide rules couldn't be used in space |
NASA's computer | needed to be smaller than mainframe to fit on space craft and included integrated circuits |
Integrated circuits | invented in 1959, consisted of a network of silcon on a single chip which had multiple transistors on it |
Transistors | invented by Bell Labs and replaced vacuum tubes, made of silicon and tiny wires; perform binary functions in computers |
3 things that made smaller computers possible | transitors, integrated circuits and microprocessors |
microprocessor | developed by Intel; was a combination of multiple integrated circuits including a processor (tiny computer); the brains of the computer |
Xerox | made ALTO computer in 1973 |
ALTO Computer | first microcomputer with GUI, mouse, built-in networking and laser printer for $18,000 |
GUI | Graphic User Interface; ability to use mouse to click on items and get a drop down menu |
Apple Computer started | founded by Steve Jobs & Steve Wozniak in 1976 |
Apple II computer | first plug & play computer marketed for home users |
Apple's Macintosh Computer | first Apple computer/home computer to have GUI and mouse |
Altair | first microcomputer; non-programmed, no monitor, no keyboard, no GUI |
PC | personal computer; name of IBM's first home computer; also the general name of all Intel based computers (non-Mac's) |
Microsoft | software company started by Bill Gates |
PC-DOS | Microsoft's first OS licensed to PC computers (Apple didn't want it) which made all computers except Apple compatible |
Windows Operating System | Microsoft's first GUI-mouse based OS; inspired by Apple's operating system |
OS | operating system; examples Windows 7, Apple OS, Linux |
WWW | world wide web; aka The Internet; widely available in the mid-1990's |
Herman Hollerith Legacy | Herman Hollerith's company eventually would become IBM, one of the biggest computer companies in the world |
Packet | Small bundle of information that you are requesting or sending on the internet |
Router | Sorts the packets into the right direction (sort of precise); to the correct part of the subnet you are on, |
Proxy | The Middleman; 1st security stop to make sure you are not trying to get to inappropriate sites (only used on some networks including schools and corporations; not usually on home networks) |
Ping of Death | Also known as viruses, spyware, phishers, spam, denial-of-service attacks… |
Firewall | 2nd security stop; checks for specific type of information you are sharing as you leave the network Checking packets for suspicious items within the packet (viruses, spyware…) like a customs agent or security stop at the airport |
Web Server | Final destination of packet where it is unpacked and loaded to web browser |
RAM | Random Access Memory; The Short Term Memory on your computer; the more RAM the more things you can do on your computer at one time, |
Hard Drive (HDD) | Long Term Storage on your computer which has moving parts inside, |
Motherboard | he main component inside the case. It is a large rectangular board with integrated circuitry that connects the other parts of the computer including the CPU, the RAM, the disk drives(CD, DVD, hard disk, or any others) as well as any peripherals connected via cords, |
Optical drives | a CD, DVD or Blu-Ray disc drive that is internally or externally connected to the computer, |
Peripherals | Any device that connects to a computer but is not part of the computer itself |
Examples of peripherals | Printers Speakers Mice headphones scanners |
CPU | Central Processing Unit performs most of the calculations which enable a computer to function, and is sometimes referred to as the "brain" of the computer, |
Removable Media | storage media that can be connected to the computer temporarily like USB pens/flash drives, external hard drives, SD cards..., |
Fixed Media | storage media that is part of the computer, such as a hard drive which have spinning disks, aka Hard Disk Drives (HDD) or Solid State Drives (SSD) |
SSD | Solid State Drives; which have no moving parts inside are are faster and more efficient but more expensive, |
Storage Media | where files and documents are saved on the computer most computers will have a hard drive or flash memory storage device; some storage devices are fixed while some are removable |
Power Supply | powers the computer from the electrical outlet or battery, |
Case | the plastic or metal enclosure that covers all of the components of the computer, |
Processors (or Microprocessors or CPU) | brains of the computer that does all of the calculating; Intel & AMD biggest manufacturers of processors |
Most important components when buying a computer | more money for high quality CPU and RAM at purchase = longer lifespan of computer |
Microsoft | software company that created Windows OS, Office (Word, Excel, Power Point) and MS-DOS |
Founders of Microsoft | Bill Gates & Paul Allen, |
Bill Gates | founder of Microsoft with "gambling" personality, impulsive but smart, possibly ADHD |
Steve Ballmer | previous CEO of Microsoft; college friend of Bill Gates |
Harvard University | school attended by Bill Gates (he didn't graduate) and Steve Ballmer (he did graduate) |
Microsoft's first tech innovation | wrote BASIC programming language for MITS/Altair computer |
MITS/Altair | first microcomputer (aka Personal Computer aka PC) |
How Microsoft makes their money | by licensing software to individual computers (not selling the copyright of software to a company) |
MS-DOS | software owned by Microsoft that they bought from Seattle Computer Company |
GUI | Graphic User Interface |
Reunion of Microsoft & Apple | in 1997 Microsoft invested $150 million dollars into apple, becoming a major stockholder |
Apple | computer company create by Steve Jobs and Steve Wozniak |
Steve Jobs | founder of Apple, experimental personality (drugs, religions, therapies...), charming but didn't treat people nicely |
Evil Genius | nickname of Steve Jobs, |
Steve "Woz" Wozniak | co-founder of Apple Computers; was the original inventor of computers for Apple |
Apple's first tech innovation | used "Blue Box" to steal long distance telephone service from AT&T; idea came from hacker called Captain Crunch |
IBM | makers of main frame computers (in 70's and 80's) who Steve Jobs compared to Big Brother |
HP | turned down opportunity to create Woz's first computer The Apple I in 1976 |
Apple II | personal computer with CPU, keyboard, color graphics and floppy disk; launched personal computer industry |
The Lisa | First computer using GUI and mouse sold to the public |
Xerox | originally created the idea of GUI and the mouse; both Apple and Microsoft "pirated" the idea of Xerox |
The Macintosh | Rival of The Lisa, and the subject of the infamous 1984 Apple Super Bowl Commercial |
Steve Jobs Fired from Apple | in 1985 due to conflicts with CEO Jack Sculley and the Board of Directors |
Pixar Animation Studios | a company that Steve Jobs bought that was later bought by Disney |
Reunion at Apple | Steve Jobs rehired as CEO of Apple in 1997; revitalized Apple with products such as iPod, MacAir, MacBook, iTunes, iPhone and iPad |
Apple I | first computer that Woz and Steve Jobs made as Apple Computers; made of wood |
Yahoo | founded by Jerry Yang & David Filo at Stanford University in 1994, |
How Yahoo worked | it is a web directory |
search engine | A program for the retrieval of data, files, or documents from the Internet. |
Examples of search engines | Yahoo, Google, Excite, Lycos, Dogpile.... |
Yahoo started: | as a way to collect websites to win a fantasy basketball league |
how Yahoo makes money | used banner ads on Yahoo pages to generate revenue/income |
web directory | Human manual catalogging of websites by subject, often providing brief descriptions of each website’s content |
Excite | started in 1994 at Stanford University |
How Excite worked | used web crawlers to find search results automatically without human interaction |
How Excite made money | used banner ads on Excite pages to generate revenue/income |
web crawlers | a computer program that browses the World Wide Web in a methodical, automated manner and reports back back to a search engine with results |
Google | founded by Sergey Brin and Larry Page at Stanford University in 1998, |
How Google Works | uses a web crawler to find websites and count the number of in-links for search results with higher results listed higher on the search list |
"In-Links" | when a website is listed by other websites |
Google's name | named GOOGLE after the mathematical term googol which means 1 followed by 100 zeros or 1 to the 100th power, |
Google's company motto | “Don’t be evil”, |
To Google | means searching for something on the Internet |
How Google made money | purposely did not use banner ads to generate income but “pirated” the idea of sponsored links to generate income |
Adwords | using keywords typed in a search to generate related sponsored ad’s in a search query, |
operating system | the "master" software program on a computer that allows all other functions and software to work |
Examples of Operating Systems | Apple OS, Windows 7, Windows XP, Windows Vista, Linux, Unix, MS-DOS, Android... |
BLOG | online opinion of any topic in 2-10 paragraph format. anyone can create a blog |
WIKI | definition by collaboration website that has a collection of definitions made by a large group of people the idea is that the more people who contribute towards a definition, the better the definition will be like peer editing with a much larger group of editors |
MICROBLOG | short and concise blogs usually under 140 characters status updates/twitter updates 2-3 sentences at most |
Podcast | A podcast, or non-streamed webcast, is a series of digital media files, either audio or video, that are released episodically and often downloaded through an RSS feed. |
Stream: | List of updates in some sort of chronological or reverse chronological order |
Avatar: | Your online persona which is a combination of your image or user name on a social network |
Chat | One-to-one communication aka private messaging |
Hashtag # | Used to annotate a message on a social network Allow a backchannel to be created with posts with the same hashtag |
Friends | People you are connected with on a social network |
Meme | a thought, idea, joke, or concept to be shared online. It is typically an image with text above and below it, but can also come in video and link form |
Crowd Sourcing | When many people are working together online to complete a single tasks |
Cloud Computing | when users access data remotely across an internet connection, rather than through working from a desktop |
Tweet | A microblog made on Twitter |
Retweet | when someone on Twitter sees your message and decides to re-share it with his/her followers |
Follow | Following someone’s online activity i.e. Twitter |
Tags | keywords attached to any blog post, image or video to help users search topics or media. |
Tag Cloud/Word Cloud | A tag cloud is a visual depiction of user-generated tags, or simply the word content of a site, typically used to describe the content of web sites. |
Dooced | a slang term for someone who is fired from their job because of controversial content they published online. |
Social Media | Internet-based applications that allow the creation and exchange of user-generated content |
Social Networks | Services that allow you to connect with other people of similar interests and background. Usually they consist of a profile, various ways to interact with other users, ability to setup groups, etc. (Facebook) |
Social Bookmarking | Services that allow you to save, organize and manage links to various websites and resources around the internet. Most allow you to “tag” your links to make them easy to search and share. (Delicious and Diigo) |
Social News | social news website features user-posted stories that are ranked based on popularity. Users can comment on these posts, and these comments may also be ranked (Slashdot, Digg, or Reddit) |
Media Sharing | Services that allow you to upload and share various media such as pictures and video. Can also allow collaborative game play and file creation (Flickr, Youtube, Aviary, Minecraft, Steam,…) |
Microblogging Blogging & Wikis | services that allow you to send opinion based updates sometimes based on facts out to subscribers (Blogs & Microblogs) or to collaboratively edit information (Wikis) |
Comments Reviews & Forums | Online forums allow members to hold conversations by posting messages. (Amazon, Blogger, Wikispaces, Amazon, Yelp, Edmunds.,…) Some services happen in real-time to allow conversations with members around a shared interest (GetGlued) |
SixDegrees.com | first social network started in 1997 |
Friendster | 2nd big social network for adults in 2002 |
MySpace | became popular in 2004 when teens started using it to follow bands & musicians |
Facebook | began in early 2004 as a Harvard-only network. Beginning in September 2005, Facebook expanded to include high school students, professionals inside corporate networks, and, eventually, everyone. |
Anti-virus software | program that checks your computer for viruses |
Avoiding Phishing Scams | don't click on links in suspicious looking emails and avoid giving info a company would already have |
Captcha/Recapcha | a test to see if you are a human or computer who is signing up for a new email account |
Cleaning Trojan viruses off of computers | hard to clean; usually need to erase hard drive and re-image your computer |
Computer Viruses | a computer program that is installed without your knowledge usually with harmful consequences |
Cookies | a temporary internet file dropped to your computer to make return visit to site more personalized |
Dangers of computer viruses | slows down computer, corrupts files, erases software... |
Do Mac/Apple computers get computer viruses? | Yes they do. |
DoS Attack | Denial of Service Attack |
Effects of Trojan Viruses | corrupt files, erase date, turn your computer into a "Zombie" computer for someone else to control |
Examples of personal information: | age, gender, opinions, pets, likes & dislikes |
Examples of private information: | full name, email, phone number, social security number... |
examples of repetitive strain injuries | Eye strain, Carpal tunnel syndrome,Wii-itis, Tech Neck |
How do you get spyware | hidden in regular file downloads like games, movies, videos from untrusted sources |
How to stop SPAM | no way to totally stop it if you have an email address |
Identity Theft | occurs when someone uses your private information without your permission to commit fraud or other crimes |
If you meet a cyber friend in real life: | 1)tell an adult, 2)take a friend, 3)Meet in a public place with cameras |
Offline Identity | real life |
Online Identity | how you present yourself online including avatars, posts, and content |
Personal information | information about yourself that is always okay to share with someone online |
Personal Safety with Mobile Devices | Turn off GPS tagging on social media because some people may use that to find you in the real world |
Phishing | sending an e-mail falsely claiming to be a business to scam the user into surrendering private information that will be used for identity theft |
Private Information | information about yourself that you should never share with anyone; share as Need to Know basis only (forms, applications….) |
Repetitive Strain Injuries | injuries from doing the same type of activity over time which wears out specific parts of your body |
Reverse phone Number | Web services that allow you to enter a phone number to find out where someone lives either for free or for very little money |
Self-replicating computer virus | can make a copy of itself over and over again; hard to get rid of |
SPAM | Unwanted junk emails |
SPIM | Unwanted junk instant messages |
SPIT | Unwanted junk via internet telephony (aka video chatting/ VoIP phone over internet services) |
Spyware | Any software that covertly gathers user information through the user's Internet connection without his or her knowledge |
Spyware can lead to | system crashes and general system instability as well as identity theft |
Spyware have the ability to | monitor keystrokes and scan files, snoop other applications on your device |
Steps to a Strong Password | 8 or more characters, letters, numbers, symbols, upper and lower case, no private info, no obvious or repeated sequences |
Taking care of your body and well-being with Technology | take breaks often, talk to the real human beings |
Tech Neck | look down at devices over time can lead to chronic neck/spine pain |
To effectively use anti-virus program you must allow the antivirus software to | 1) update itself, 2) update virus definition files to protect against newest viruses at least once a week and 3)to scan your computer for viruses at least once a week |
Trojans or Trojan Horse | a file that pretends to be one thing but tricks user into installing the virus on the computer |
Why do people send SPAM SPIM and SPIT? | because they make money off of it with very little effort |
Why do we have to worry about Technology Safety? | We all end up paying higher prices for goods and services because money lost to online theft and fraud. |
why you don't share your phone number with people you don't know | reverse phone number look up! |
Will a virus will damage your hard drive or motherboard? | No, only the software typically |
Worms | type of viruses that spreads without human action (self-replicating) |
DoS Definition | causing so much internet traffic purposely cause a website to go down |
#1 rule for using any device camera | YOU MUST WEAR CLOTHES [yes I am yelling!] |