Java Games: Flashcards, matching, concentration, and word search.

Digital Citizenship Vocabulary

AB
AnonymousWhen someone keeps their identity secret so that their actions can't be tied to them.
BlackmailWhen someone forces a target to do something by saying they'll reveal information that the target wants to keep private.
CatfishingWhen a person uses an online persona to gain the trust of someone else.
CyberstalkingMessaging, commenting, or talking to someone digitally in a way that's threatening or stressful.
DenigrationMaking someone look bad by spreading rumors or gossip.
DoctoredPhotos and videos that have been edited to look real. They will often change what a person is doing, place their face on someone else's body, or even add them to a place they never were
FlamingPosting or sending insults and offensive comments.
Hate SpeechInsults or harsh words that target someone based on a part of their identity, such as religion or race.
ImpersonationPretending to be someone you aren't online in order to hurt someone else.
Outing or DoxingRevealing private information about someone else online.
TrollingAttempting to start arguments online.
Contact InformationA way to get help from a website if something happens.
CyberbullyingRude actions online that could include calling someone names, spreading rumors, or posting things without permission.
Identity TheftWhen a criminal pretends to be someone else and opens bank accounts or claims things in another person's name. This can cost the victim a lot of time and money to fix.
MalwareSoftware that damages a device or steals information.
MisinformationInformation that isn't true, often created to trick
Privacy PolicyA document that says what a company will do with your information (name, email address, etc.) when they get it.
RansomewareMalware that locks up a system or certain files until the victim pay money.
Sensitive InformationInformation that could be dangerous for others to know such as someone's full name, address, or account numbers.
SpywareMalware that watches and records information from a device.
VirusMalware that spreads throughout a device and damages it.
CookiesSmall packets of information that websites store on your computer to keep track of how you interacted with the site.
Digital FootprintsThe trail of information about us that we leave online. This includes the websites we visit, personal information, and our online behavior. It can heavily impact how others view us.
Invisible audienceThe hundreds of people who are paying attention to your online behavior. These can be strangers, friends, or people evalutaing you for employment.
IP AddressA number that's assigned to your computer when accessing online content. It can be used to identify your online activity.
Login InformationEverything that's used to verify online accounts. This includes passwords, associated email addresses, secret questions, and more.
Digital WellnessA part of health that is impacted by technology. Strong digital wellness means a healthy relationship with technology.
CatfishA person who uses a fake online persona to gain the trust of someone else.
MalwareSoftware designed to gain unauthorized access to and disrupt or damage a computer system.
PhishingWhen a scammer impersonates or claims to represent a legitimate company online in order to trick you into giving your information or steal your money.
RansomwareMalicious software that blocks access to a phone or computer system until a sum of money is paid.
Remote AccessThe ability to control your device through another phone or computer. It usually requires downloading some kind of app or software.
Security BreachWhen the data a company stores is exposed to a hacker. This data could include email addresses, passwords, or credit card information of the company's customers and associates.
Security QuestionsAn alternate way of identifying customers when they have forgotten a password, entered the wrong credentials, or tried to log in from an unfamiliar device.
SSl CertificateA way for websites to prove that they are encrypting or making it harder for a hacker to gain access to, the data on their site. If you use a site without an SSL Certificate2, you have a higher risk of your information being exposed or stolen.


Digital Application / Teen Living Instructor
Kempsville Middle School

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities