Difference between revisions of "AY Honors/Digital Citizenship/Answer Key"
(Marked this version for translation) |
(+ Some answers) |
||
| Line 7: | Line 7: | ||
</noinclude> | </noinclude> | ||
<!-- 1. What is digital citizenship? --> | <!-- 1. What is digital citizenship? --> | ||
| + | |||
| + | A digital citizen is someone who, through the development of a broad range of competencies, can actively, positively and responsibly engage in both on- and offline communities, whether local, national or global. These competencies are not a one-time development but lifelong as digital technologies are disruptive and constantly evolving. Becoming a good digital citizen should ideally begin from earliest childhood at home and school, in formal, informal and non-formal educational settings. It is a lifelong development of smart and safe online habits. | ||
<!--T:2--> | <!--T:2--> | ||
| Line 16: | Line 18: | ||
</noinclude> | </noinclude> | ||
<!-- 2. What is a digital footprint? --> | <!-- 2. What is a digital footprint? --> | ||
| + | |||
| + | A digital footprint is the data that’s left behind whenever you use a digital service, or whenever someone posts information about you onto a digital forum, such as a social network. It is normal to have a digital footprint – in fact, it is very difficult to avoid in this digital world. Since anyone’s digital footprint is publicly accessible, it is recommended that everyone should know exactly what their digital footprint looks like and how to actively manage it. | ||
<!--T:4--> | <!--T:4--> | ||
| Line 25: | Line 29: | ||
</noinclude> | </noinclude> | ||
<!-- 3. List some examples of everyday digital platforms where an online digital footprint is created. --> | <!-- 3. List some examples of everyday digital platforms where an online digital footprint is created. --> | ||
| + | |||
| + | * Emailing | ||
| + | * Social media | ||
| + | * Messenger | ||
| + | * Banking | ||
| + | * Dating | ||
| + | * Photo sharing | ||
| + | * Gaming | ||
| + | * Shopping | ||
| + | * Geolocation services | ||
| + | * Applications | ||
| + | * Professional networking | ||
| + | * Travelling using a travel card or paying with a credit/ debit card | ||
<!--T:6--> | <!--T:6--> | ||
| Line 34: | Line 51: | ||
</noinclude> | </noinclude> | ||
<!-- 4. What is cybersecurity and what is cyber-attack? --> | <!-- 4. What is cybersecurity and what is cyber-attack? --> | ||
| + | |||
| + | Cybersecurity is the protection of devices, services and networks - and the information on them - from unauthorised access, theft or damage. It is the prevention of unauthorised access to the vast amount of personal information stored on these devices, and online. Cyber-attack is an attempt to damage, disrupt or gain unauthorised access to computer systems, networks or devices. | ||
<!--T:8--> | <!--T:8--> | ||
| Line 43: | Line 62: | ||
</noinclude> | </noinclude> | ||
<!-- 5. What is a password? List at least FIVE best practices on each of the Do's and Don'ts for setting passwords? --> | <!-- 5. What is a password? List at least FIVE best practices on each of the Do's and Don'ts for setting passwords? --> | ||
| + | |||
| + | A password is a sequence of characters used to verify the identity of a user, usually to gain access to an account, website or system. | ||
| + | |||
| + | '''DO’S:''' | ||
| + | * Use separate passwords for your computer account, email account, and other accounts you may have such as banking & social media. | ||
| + | * Make sure your password is strong – Three random words combined into one password is an effective way to create a strong password that is easy to remember. | ||
| + | * Save your passwords in the browser – By storing your passwords in a browser you are allowing your browser to remember your password for you and is safer than using weak passwords. | ||
| + | * Save your passwords in a password manager – In case you have trouble remembering your passwords but want your accounts to be secure, you can use a password manager (or password vault). | ||
| + | * Make sure you always have Two Factor Authentication enabled. | ||
| + | |||
| + | '''DONT’S:''' | ||
| + | * Never share your password with anyone (including IT support) | ||
| + | * Do not perform financial transactions on public networks | ||
| + | * Never write your password down and keep it on your desk or anywhere others can access it easily | ||
| + | * Avoid using the same password on multiple websites, all your accounts could be compromised in one go. | ||
| + | * Avoid using common passwords such as the word “password”, do not use your username, birth dates, family, or pet names. | ||
<!--T:10--> | <!--T:10--> | ||
| Line 52: | Line 87: | ||
</noinclude> | </noinclude> | ||
<!-- 6. What are smart devices and how can you use them safely? --> | <!-- 6. What are smart devices and how can you use them safely? --> | ||
| + | |||
| + | Smart devices are electrical items that connect to the internet (or to your home network), usually via Wi-Fi. They include ‘hi-tech’ devices (smart speakers, fitness trackers and security cameras) and also standard household items (such as fridges, thermostats, kettles and washing machines). | ||
| + | |||
| + | Manufacturers of smart devices regularly release updates that help fix bugs or security issues in their products which - if ignored - could put your data or privacy at risk. Without these fixes, your device becomes easier to hack. Your device is not secure if a criminal can guess the password used to access your smart device. This would allow them to log into your device, and use it to access your network or to conduct cyber-attacks. | ||
<!--T:12--> | <!--T:12--> | ||
| Line 60: | Line 99: | ||
<noinclude><translate><!--T:13--> | <noinclude><translate><!--T:13--> | ||
</noinclude> | </noinclude> | ||
| − | <!-- 7. What are | + | <!-- 7. What is social media? How can social media be a force for both good and evil (give some examples)? --> |
| + | |||
| + | Social media are forms of digital communication through which users create online communities to share information, ideas, personal messages, and other content. | ||
| + | |||
| + | Social media use is not inherently beneficial or harmful. Social media platforms offer powerful opportunities for socialization and connection, job seeking and professional networking. | ||
| + | |||
| + | Social media may also have some negative effects, including mis- and disinformation, hate speech, and cyberbullying. At the extreme, social media use can interfere with sleep, physical activity, and in-person social interactions. | ||
| + | |||
| + | Examples of social media sites (any of these, and many more): | ||
| + | |||
| + | # Facebook | ||
| + | # WhatsApp | ||
| + | # YouTube | ||
| + | # Instagram | ||
| + | # TikTok | ||
| + | # WeChat | ||
| + | # Telegram | ||
| + | # Snapchat | ||
| + | # Kuaishou | ||
| + | # X (formerly Twitter) | ||
| + | # Sina Weibo | ||
| + | # QQ | ||
| + | # Pinterest | ||
| + | # Reddit | ||
| + | # LinkedIn | ||
| + | # Quora | ||
| + | # Discord | ||
| + | # Twitch | ||
| + | # Tumblr | ||
| + | # Threads | ||
| + | # Bluesky | ||
| + | # Mastodon | ||
<!--T:14--> | <!--T:14--> | ||
| Line 69: | Line 139: | ||
<noinclude><translate><!--T:15--> | <noinclude><translate><!--T:15--> | ||
</noinclude> | </noinclude> | ||
| − | <!-- 8. | + | <!-- 8. Starting with the year (1990) when the World Wide Web was invented, create a timeline of social media platforms, charting when they were introduced and what the age limits are to join each one of them? --> |
<!--T:16--> | <!--T:16--> | ||
| Line 78: | Line 148: | ||
<noinclude><translate><!--T:17--> | <noinclude><translate><!--T:17--> | ||
</noinclude> | </noinclude> | ||
| − | <!-- 9. | + | <!-- 9. Discuss the differences between misinformation and disinformation as related to the digital platforms? --> |
| + | |||
| + | Misinformation is fake news that is created and spread by a MIStake – by someone who doesn’t realise that it’s false. | ||
| + | |||
| + | On the other hand, disinformation is fake news that is created and spread deliberately – by someone who knows full well that it’s false. The purpose is often to persuade people to think a certain way, sometimes vote a certain way or even to make money from advertising when someone clicks on a story. | ||
| + | |||
| + | Children should demonstrate complete understanding by giving real-life examples of the two. | ||
<!--T:18--> | <!--T:18--> | ||
| Line 87: | Line 163: | ||
<noinclude><translate><!--T:19--> | <noinclude><translate><!--T:19--> | ||
</noinclude> | </noinclude> | ||
| − | <!-- 10. | + | <!-- 10. Discuss up to date legislation in your country which safeguards online safety for all citizens? --> |
| + | |||
| + | '''Australia''' | ||
| + | |||
| + | [https://www.esafety.gov.au/newsroom/whats-on/online-safety-act Online Safety Act 2021] | ||
| + | |||
| + | '''United Kingdom''' | ||
| + | |||
| + | [https://www.gov.uk/government/publications/online-safety-act-explainer/online-safety-act-explainer Online Safety Act 2023] | ||
| + | |||
| + | '''USA''' | ||
| + | |||
| + | [https://www.blumenthal.senate.gov/about/issues/kids-online-safety-act Kids Online Safety Act (KOSA)] | ||
| + | |||
| + | '''Other countries''' | ||
| + | |||
| + | Require individualised search. | ||
<!--T:20--> | <!--T:20--> | ||
| Line 96: | Line 188: | ||
<noinclude><translate><!--T:21--> | <noinclude><translate><!--T:21--> | ||
</noinclude> | </noinclude> | ||
| − | <!-- 11. | + | <!-- 11. Demonstrate how the following scripture passages enhances digital citizenship etiquette? Philippians 4: 8; Psalm 119:11; 1 Corinthians 10:31. --> |
<!--T:22--> | <!--T:22--> | ||
| Line 105: | Line 197: | ||
<noinclude><translate><!--T:23--> | <noinclude><translate><!--T:23--> | ||
</noinclude> | </noinclude> | ||
| − | <!-- 12. | + | <!-- 12. How does each one of the ten commandments help one become a good digital citizen? Refer to Exodus 20:1-17. --> |
<!--T:24--> | <!--T:24--> | ||
| Line 114: | Line 206: | ||
<noinclude><translate><!--T:25--> | <noinclude><translate><!--T:25--> | ||
</noinclude> | </noinclude> | ||
| − | <!-- 13. | + | <!-- 13. Choose and complete any three of the following: --> |
<!--T:26--> | <!--T:26--> | ||
Latest revision as of 17:31, 6 September 2025
1
A digital citizen is someone who, through the development of a broad range of competencies, can actively, positively and responsibly engage in both on- and offline communities, whether local, national or global. These competencies are not a one-time development but lifelong as digital technologies are disruptive and constantly evolving. Becoming a good digital citizen should ideally begin from earliest childhood at home and school, in formal, informal and non-formal educational settings. It is a lifelong development of smart and safe online habits.
2
A digital footprint is the data that’s left behind whenever you use a digital service, or whenever someone posts information about you onto a digital forum, such as a social network. It is normal to have a digital footprint – in fact, it is very difficult to avoid in this digital world. Since anyone’s digital footprint is publicly accessible, it is recommended that everyone should know exactly what their digital footprint looks like and how to actively manage it.
3
- Emailing
- Social media
- Messenger
- Banking
- Dating
- Photo sharing
- Gaming
- Shopping
- Geolocation services
- Applications
- Professional networking
- Travelling using a travel card or paying with a credit/ debit card
4
Cybersecurity is the protection of devices, services and networks - and the information on them - from unauthorised access, theft or damage. It is the prevention of unauthorised access to the vast amount of personal information stored on these devices, and online. Cyber-attack is an attempt to damage, disrupt or gain unauthorised access to computer systems, networks or devices.
5
A password is a sequence of characters used to verify the identity of a user, usually to gain access to an account, website or system.
DO’S:
- Use separate passwords for your computer account, email account, and other accounts you may have such as banking & social media.
- Make sure your password is strong – Three random words combined into one password is an effective way to create a strong password that is easy to remember.
- Save your passwords in the browser – By storing your passwords in a browser you are allowing your browser to remember your password for you and is safer than using weak passwords.
- Save your passwords in a password manager – In case you have trouble remembering your passwords but want your accounts to be secure, you can use a password manager (or password vault).
- Make sure you always have Two Factor Authentication enabled.
DONT’S:
- Never share your password with anyone (including IT support)
- Do not perform financial transactions on public networks
- Never write your password down and keep it on your desk or anywhere others can access it easily
- Avoid using the same password on multiple websites, all your accounts could be compromised in one go.
- Avoid using common passwords such as the word “password”, do not use your username, birth dates, family, or pet names.
6
Smart devices are electrical items that connect to the internet (or to your home network), usually via Wi-Fi. They include ‘hi-tech’ devices (smart speakers, fitness trackers and security cameras) and also standard household items (such as fridges, thermostats, kettles and washing machines).
Manufacturers of smart devices regularly release updates that help fix bugs or security issues in their products which - if ignored - could put your data or privacy at risk. Without these fixes, your device becomes easier to hack. Your device is not secure if a criminal can guess the password used to access your smart device. This would allow them to log into your device, and use it to access your network or to conduct cyber-attacks.
7
Social media are forms of digital communication through which users create online communities to share information, ideas, personal messages, and other content.
Social media use is not inherently beneficial or harmful. Social media platforms offer powerful opportunities for socialization and connection, job seeking and professional networking.
Social media may also have some negative effects, including mis- and disinformation, hate speech, and cyberbullying. At the extreme, social media use can interfere with sleep, physical activity, and in-person social interactions.
Examples of social media sites (any of these, and many more):
- YouTube
- TikTok
- Telegram
- Snapchat
- Kuaishou
- X (formerly Twitter)
- Sina Weibo
- Quora
- Discord
- Twitch
- Tumblr
- Threads
- Bluesky
- Mastodon
8
9
Misinformation is fake news that is created and spread by a MIStake – by someone who doesn’t realise that it’s false.
On the other hand, disinformation is fake news that is created and spread deliberately – by someone who knows full well that it’s false. The purpose is often to persuade people to think a certain way, sometimes vote a certain way or even to make money from advertising when someone clicks on a story.
Children should demonstrate complete understanding by giving real-life examples of the two.
10
Australia
United Kingdom
USA
Other countries
Require individualised search.
11
12
13
13a
13b
13c
13d
13e
13f

