AY Honor Digital Citizenship Answer Key

From Pathfinder Wiki
< AY Honors‎ | Digital CitizenshipAY Honors/Digital Citizenship/Answer Key
This page contains changes which are not marked for translation.
Other languages:
English
Digital Citizenship

Skill Level

2

Year

2025

Version

11.09.2025

Approval authority

Australian Union

Digital Citizenship AY Honor.png
Digital Citizenship
Regional
Skill Level
123
Approval authority
Australian Union
Year of Introduction
2025



1

What is digital citizenship?


A digital citizen is someone who, through the development of a broad range of competencies, can actively, positively and responsibly engage in both on- and offline communities, whether local, national or global. These competencies are not a one-time development but lifelong as digital technologies are disruptive and constantly evolving. Becoming a good digital citizen should ideally begin from earliest childhood at home and school, in formal, informal and non-formal educational settings. It is a lifelong development of smart and safe online habits.



2

What is a digital footprint?


A digital footprint is the data that’s left behind whenever you use a digital service, or whenever someone posts information about you onto a digital forum, such as a social network. It is normal to have a digital footprint – in fact, it is very difficult to avoid in this digital world. Since anyone’s digital footprint is publicly accessible, it is recommended that everyone should know exactly what their digital footprint looks like and how to actively manage it.



3

List some examples of everyday digital platforms where an online digital footprint is created.


  • Emailing
  • Social media
  • Messenger
  • Banking
  • Dating
  • Photo sharing
  • Gaming
  • Shopping
  • Geolocation services
  • Applications
  • Professional networking
  • Travelling using a travel card or paying with a credit/ debit card



4

What is cybersecurity and what is cyber-attack?


Cybersecurity is the protection of devices, services and networks - and the information on them - from unauthorised access, theft or damage. It is the prevention of unauthorised access to the vast amount of personal information stored on these devices, and online. Cyber-attack is an attempt to damage, disrupt or gain unauthorised access to computer systems, networks or devices.



5

What is a password? List at least FIVE best practices on each of the Do's and Don'ts for setting passwords?


A password is a sequence of characters used to verify the identity of a user, usually to gain access to an account, website or system.

DO’S:

  • Use separate passwords for your computer account, email account, and other accounts you may have such as banking & social media.
  • Make sure your password is strong – Three random words combined into one password is an effective way to create a strong password that is easy to remember.
  • Save your passwords in the browser – By storing your passwords in a browser you are allowing your browser to remember your password for you and is safer than using weak passwords.
  • Save your passwords in a password manager – In case you have trouble remembering your passwords but want your accounts to be secure, you can use a password manager (or password vault).
  • Make sure you always have Two Factor Authentication enabled.

DONT’S:

  • Never share your password with anyone (including IT support)
  • Do not perform financial transactions on public networks
  • Never write your password down and keep it on your desk or anywhere others can access it easily
  • Avoid using the same password on multiple websites, all your accounts could be compromised in one go.
  • Avoid using common passwords such as the word “password”, do not use your username, birth dates, family, or pet names.



6

What are smart devices and how can you use them safely?


Smart devices are electrical items that connect to the internet (or to your home network), usually via Wi-Fi. They include ‘hi-tech’ devices (smart speakers, fitness trackers and security cameras) and also standard household items (such as fridges, thermostats, kettles and washing machines).

Manufacturers of smart devices regularly release updates that help fix bugs or security issues in their products which - if ignored - could put your data or privacy at risk. Without these fixes, your device becomes easier to hack. Your device is not secure if a criminal can guess the password used to access your smart device. This would allow them to log into your device, and use it to access your network or to conduct cyber-attacks.



7

What is social media? How can social media be a force for both good and evil (give some examples)?


Social media are forms of digital communication through which users create online communities to share information, ideas, personal messages, and other content.

Social media use is not inherently beneficial or harmful. Social media platforms offer powerful opportunities for socialization and connection, job seeking and professional networking.

Social media may also have some negative effects, including mis- and disinformation, hate speech, and cyberbullying. At the extreme, social media use can interfere with sleep, physical activity, and in-person social interactions.

Examples of social media sites (any of these, and many more):

  1. Facebook
  2. WhatsApp
  3. YouTube
  4. Instagram
  5. TikTok
  6. WeChat
  7. Telegram
  8. Snapchat
  9. Kuaishou
  10. X (formerly Twitter)
  11. Sina Weibo
  12. QQ
  13. Pinterest
  14. Reddit
  15. LinkedIn
  16. Quora
  17. Discord
  18. Twitch
  19. Tumblr
  20. Threads
  21. Bluesky
  22. Mastodon



8

Starting with the year (1990) when the World Wide Web was invented, create a timeline of social media platforms, charting when they were introduced and what the age limits are to join each one of them?




9

Discuss the differences between misinformation and disinformation as related to the digital platforms?


Misinformation is fake news that is created and spread by a MIStake – by someone who doesn’t realise that it’s false.

On the other hand, disinformation is fake news that is created and spread deliberately – by someone who knows full well that it’s false. The purpose is often to persuade people to think a certain way, sometimes vote a certain way or even to make money from advertising when someone clicks on a story.

Children should demonstrate complete understanding by giving real-life examples of the two.



10

Discuss up to date legislation in your country which safeguards online safety for all citizens?


Australia

Online Safety Act 2021

United Kingdom

Online Safety Act 2023

USA

Kids Online Safety Act (KOSA)

Other countries

Require individualised search.



11

Demonstrate how the following scripture passages enhances digital citizenship etiquette? Philippians 4: 8; Psalm 119:11; 1 Corinthians 10:31.




12

How does each one of the ten commandments help one become a good digital citizen? Refer to Exodus 20:1-17.




13

Choose and complete any three of the following:



13a

Learn how to create a secure password and make one of your own.




13b

Map out your regular digital actions, such as searches, clicks or posts to see the information you leave behind as a result of these digital actions, and discuss whether that's OK or not.




13c

Keep a log of your online activities for one week, including what websites or social media platforms you visit and how much time you spend on each of the platform and what you are doing on them. Reflect with a senior person on your online habits.




13d

Check what your digital footprint is by searching engines and reflect on how much of your personal information is in the public domain and who shared it.




13e

Create a digital citizen etiquette card with do's and don'ts.




13f

Complete an online course on staying safe online.





References