Difference between revisions of "AY Honors/Digital Citizenship/Answer Key"
(+ Some answers) |
(Marked this version for translation) |
||
| Line 8: | Line 8: | ||
<!-- 1. What is digital citizenship? --> | <!-- 1. What is digital citizenship? --> | ||
| + | <!--T:40--> | ||
A digital citizen is someone who, through the development of a broad range of competencies, can actively, positively and responsibly engage in both on- and offline communities, whether local, national or global. These competencies are not a one-time development but lifelong as digital technologies are disruptive and constantly evolving. Becoming a good digital citizen should ideally begin from earliest childhood at home and school, in formal, informal and non-formal educational settings. It is a lifelong development of smart and safe online habits. | A digital citizen is someone who, through the development of a broad range of competencies, can actively, positively and responsibly engage in both on- and offline communities, whether local, national or global. These competencies are not a one-time development but lifelong as digital technologies are disruptive and constantly evolving. Becoming a good digital citizen should ideally begin from earliest childhood at home and school, in formal, informal and non-formal educational settings. It is a lifelong development of smart and safe online habits. | ||
| Line 19: | Line 20: | ||
<!-- 2. What is a digital footprint? --> | <!-- 2. What is a digital footprint? --> | ||
| + | <!--T:41--> | ||
A digital footprint is the data that’s left behind whenever you use a digital service, or whenever someone posts information about you onto a digital forum, such as a social network. It is normal to have a digital footprint – in fact, it is very difficult to avoid in this digital world. Since anyone’s digital footprint is publicly accessible, it is recommended that everyone should know exactly what their digital footprint looks like and how to actively manage it. | A digital footprint is the data that’s left behind whenever you use a digital service, or whenever someone posts information about you onto a digital forum, such as a social network. It is normal to have a digital footprint – in fact, it is very difficult to avoid in this digital world. Since anyone’s digital footprint is publicly accessible, it is recommended that everyone should know exactly what their digital footprint looks like and how to actively manage it. | ||
| Line 30: | Line 32: | ||
<!-- 3. List some examples of everyday digital platforms where an online digital footprint is created. --> | <!-- 3. List some examples of everyday digital platforms where an online digital footprint is created. --> | ||
| + | <!--T:42--> | ||
* Emailing | * Emailing | ||
* Social media | * Social media | ||
| Line 52: | Line 55: | ||
<!-- 4. What is cybersecurity and what is cyber-attack? --> | <!-- 4. What is cybersecurity and what is cyber-attack? --> | ||
| + | <!--T:43--> | ||
Cybersecurity is the protection of devices, services and networks - and the information on them - from unauthorised access, theft or damage. It is the prevention of unauthorised access to the vast amount of personal information stored on these devices, and online. Cyber-attack is an attempt to damage, disrupt or gain unauthorised access to computer systems, networks or devices. | Cybersecurity is the protection of devices, services and networks - and the information on them - from unauthorised access, theft or damage. It is the prevention of unauthorised access to the vast amount of personal information stored on these devices, and online. Cyber-attack is an attempt to damage, disrupt or gain unauthorised access to computer systems, networks or devices. | ||
| Line 63: | Line 67: | ||
<!-- 5. What is a password? List at least FIVE best practices on each of the Do's and Don'ts for setting passwords? --> | <!-- 5. What is a password? List at least FIVE best practices on each of the Do's and Don'ts for setting passwords? --> | ||
| + | <!--T:44--> | ||
A password is a sequence of characters used to verify the identity of a user, usually to gain access to an account, website or system. | A password is a sequence of characters used to verify the identity of a user, usually to gain access to an account, website or system. | ||
| + | <!--T:45--> | ||
'''DO’S:''' | '''DO’S:''' | ||
* Use separate passwords for your computer account, email account, and other accounts you may have such as banking & social media. | * Use separate passwords for your computer account, email account, and other accounts you may have such as banking & social media. | ||
| Line 72: | Line 78: | ||
* Make sure you always have Two Factor Authentication enabled. | * Make sure you always have Two Factor Authentication enabled. | ||
| + | <!--T:46--> | ||
'''DONT’S:''' | '''DONT’S:''' | ||
* Never share your password with anyone (including IT support) | * Never share your password with anyone (including IT support) | ||
| Line 88: | Line 95: | ||
<!-- 6. What are smart devices and how can you use them safely? --> | <!-- 6. What are smart devices and how can you use them safely? --> | ||
| + | <!--T:47--> | ||
Smart devices are electrical items that connect to the internet (or to your home network), usually via Wi-Fi. They include ‘hi-tech’ devices (smart speakers, fitness trackers and security cameras) and also standard household items (such as fridges, thermostats, kettles and washing machines). | Smart devices are electrical items that connect to the internet (or to your home network), usually via Wi-Fi. They include ‘hi-tech’ devices (smart speakers, fitness trackers and security cameras) and also standard household items (such as fridges, thermostats, kettles and washing machines). | ||
| + | <!--T:48--> | ||
Manufacturers of smart devices regularly release updates that help fix bugs or security issues in their products which - if ignored - could put your data or privacy at risk. Without these fixes, your device becomes easier to hack. Your device is not secure if a criminal can guess the password used to access your smart device. This would allow them to log into your device, and use it to access your network or to conduct cyber-attacks. | Manufacturers of smart devices regularly release updates that help fix bugs or security issues in their products which - if ignored - could put your data or privacy at risk. Without these fixes, your device becomes easier to hack. Your device is not secure if a criminal can guess the password used to access your smart device. This would allow them to log into your device, and use it to access your network or to conduct cyber-attacks. | ||
| Line 101: | Line 110: | ||
<!-- 7. What is social media? How can social media be a force for both good and evil (give some examples)? --> | <!-- 7. What is social media? How can social media be a force for both good and evil (give some examples)? --> | ||
| + | <!--T:49--> | ||
Social media are forms of digital communication through which users create online communities to share information, ideas, personal messages, and other content. | Social media are forms of digital communication through which users create online communities to share information, ideas, personal messages, and other content. | ||
| + | <!--T:50--> | ||
Social media use is not inherently beneficial or harmful. Social media platforms offer powerful opportunities for socialization and connection, job seeking and professional networking. | Social media use is not inherently beneficial or harmful. Social media platforms offer powerful opportunities for socialization and connection, job seeking and professional networking. | ||
| + | <!--T:51--> | ||
Social media may also have some negative effects, including mis- and disinformation, hate speech, and cyberbullying. At the extreme, social media use can interfere with sleep, physical activity, and in-person social interactions. | Social media may also have some negative effects, including mis- and disinformation, hate speech, and cyberbullying. At the extreme, social media use can interfere with sleep, physical activity, and in-person social interactions. | ||
| + | <!--T:52--> | ||
Examples of social media sites (any of these, and many more): | Examples of social media sites (any of these, and many more): | ||
| + | <!--T:53--> | ||
# Facebook | # Facebook | ||
# WhatsApp | # WhatsApp | ||
| Line 150: | Line 164: | ||
<!-- 9. Discuss the differences between misinformation and disinformation as related to the digital platforms? --> | <!-- 9. Discuss the differences between misinformation and disinformation as related to the digital platforms? --> | ||
| + | <!--T:54--> | ||
Misinformation is fake news that is created and spread by a MIStake – by someone who doesn’t realise that it’s false. | Misinformation is fake news that is created and spread by a MIStake – by someone who doesn’t realise that it’s false. | ||
| + | <!--T:55--> | ||
On the other hand, disinformation is fake news that is created and spread deliberately – by someone who knows full well that it’s false. The purpose is often to persuade people to think a certain way, sometimes vote a certain way or even to make money from advertising when someone clicks on a story. | On the other hand, disinformation is fake news that is created and spread deliberately – by someone who knows full well that it’s false. The purpose is often to persuade people to think a certain way, sometimes vote a certain way or even to make money from advertising when someone clicks on a story. | ||
| + | <!--T:56--> | ||
Children should demonstrate complete understanding by giving real-life examples of the two. | Children should demonstrate complete understanding by giving real-life examples of the two. | ||
| Line 165: | Line 182: | ||
<!-- 10. Discuss up to date legislation in your country which safeguards online safety for all citizens? --> | <!-- 10. Discuss up to date legislation in your country which safeguards online safety for all citizens? --> | ||
| + | <!--T:57--> | ||
'''Australia''' | '''Australia''' | ||
| + | <!--T:58--> | ||
[https://www.esafety.gov.au/newsroom/whats-on/online-safety-act Online Safety Act 2021] | [https://www.esafety.gov.au/newsroom/whats-on/online-safety-act Online Safety Act 2021] | ||
| + | <!--T:59--> | ||
'''United Kingdom''' | '''United Kingdom''' | ||
| + | <!--T:60--> | ||
[https://www.gov.uk/government/publications/online-safety-act-explainer/online-safety-act-explainer Online Safety Act 2023] | [https://www.gov.uk/government/publications/online-safety-act-explainer/online-safety-act-explainer Online Safety Act 2023] | ||
| + | <!--T:61--> | ||
'''USA''' | '''USA''' | ||
| + | <!--T:62--> | ||
[https://www.blumenthal.senate.gov/about/issues/kids-online-safety-act Kids Online Safety Act (KOSA)] | [https://www.blumenthal.senate.gov/about/issues/kids-online-safety-act Kids Online Safety Act (KOSA)] | ||
| + | <!--T:63--> | ||
'''Other countries''' | '''Other countries''' | ||
| + | <!--T:64--> | ||
Require individualised search. | Require individualised search. | ||
Latest revision as of 21:45, 1 January 2026
1
A digital citizen is someone who, through the development of a broad range of competencies, can actively, positively and responsibly engage in both on- and offline communities, whether local, national or global. These competencies are not a one-time development but lifelong as digital technologies are disruptive and constantly evolving. Becoming a good digital citizen should ideally begin from earliest childhood at home and school, in formal, informal and non-formal educational settings. It is a lifelong development of smart and safe online habits.
2
A digital footprint is the data that’s left behind whenever you use a digital service, or whenever someone posts information about you onto a digital forum, such as a social network. It is normal to have a digital footprint – in fact, it is very difficult to avoid in this digital world. Since anyone’s digital footprint is publicly accessible, it is recommended that everyone should know exactly what their digital footprint looks like and how to actively manage it.
3
- Emailing
- Social media
- Messenger
- Banking
- Dating
- Photo sharing
- Gaming
- Shopping
- Geolocation services
- Applications
- Professional networking
- Travelling using a travel card or paying with a credit/ debit card
4
Cybersecurity is the protection of devices, services and networks - and the information on them - from unauthorised access, theft or damage. It is the prevention of unauthorised access to the vast amount of personal information stored on these devices, and online. Cyber-attack is an attempt to damage, disrupt or gain unauthorised access to computer systems, networks or devices.
5
A password is a sequence of characters used to verify the identity of a user, usually to gain access to an account, website or system.
DO’S:
- Use separate passwords for your computer account, email account, and other accounts you may have such as banking & social media.
- Make sure your password is strong – Three random words combined into one password is an effective way to create a strong password that is easy to remember.
- Save your passwords in the browser – By storing your passwords in a browser you are allowing your browser to remember your password for you and is safer than using weak passwords.
- Save your passwords in a password manager – In case you have trouble remembering your passwords but want your accounts to be secure, you can use a password manager (or password vault).
- Make sure you always have Two Factor Authentication enabled.
DONT’S:
- Never share your password with anyone (including IT support)
- Do not perform financial transactions on public networks
- Never write your password down and keep it on your desk or anywhere others can access it easily
- Avoid using the same password on multiple websites, all your accounts could be compromised in one go.
- Avoid using common passwords such as the word “password”, do not use your username, birth dates, family, or pet names.
6
Smart devices are electrical items that connect to the internet (or to your home network), usually via Wi-Fi. They include ‘hi-tech’ devices (smart speakers, fitness trackers and security cameras) and also standard household items (such as fridges, thermostats, kettles and washing machines).
Manufacturers of smart devices regularly release updates that help fix bugs or security issues in their products which - if ignored - could put your data or privacy at risk. Without these fixes, your device becomes easier to hack. Your device is not secure if a criminal can guess the password used to access your smart device. This would allow them to log into your device, and use it to access your network or to conduct cyber-attacks.
7
Social media are forms of digital communication through which users create online communities to share information, ideas, personal messages, and other content.
Social media use is not inherently beneficial or harmful. Social media platforms offer powerful opportunities for socialization and connection, job seeking and professional networking.
Social media may also have some negative effects, including mis- and disinformation, hate speech, and cyberbullying. At the extreme, social media use can interfere with sleep, physical activity, and in-person social interactions.
Examples of social media sites (any of these, and many more):
- YouTube
- TikTok
- Telegram
- Snapchat
- Kuaishou
- X (formerly Twitter)
- Sina Weibo
- Quora
- Discord
- Twitch
- Tumblr
- Threads
- Bluesky
- Mastodon
8
9
Misinformation is fake news that is created and spread by a MIStake – by someone who doesn’t realise that it’s false.
On the other hand, disinformation is fake news that is created and spread deliberately – by someone who knows full well that it’s false. The purpose is often to persuade people to think a certain way, sometimes vote a certain way or even to make money from advertising when someone clicks on a story.
Children should demonstrate complete understanding by giving real-life examples of the two.
10
Australia
United Kingdom
USA
Other countries
Require individualised search.
11
12
13
13a
13b
13c
13d
13e
13f

