How can we help?

You can also find more resources in our Help Center.

Study sets matching "internet safety"

Study sets
Classes
Users

Study sets matching "internet safety"

10 terms
Internet Safety
Internet Safety
Cyber bullying
Hacker
Online predator
Knowing personal safety and security risks of private informa…
Using electronic devices to bully a person.
A person who uses computers to gain unauthorized access to in…
People who commit child sexual abuse that begins and takes pl…
Internet Safety
Knowing personal safety and security risks of private informa…
Cyber bullying
Using electronic devices to bully a person.
8 terms
Internet Safety
Internet
Piracy
Hacking
Plagiarism
The worldwide electronic network including Web pages, chat ro…
The stealing of software by copying it and giving or selling…
breaking into computers, servers, or networks to steal data s…
a piece of writing that has been copied from someone else and…
Internet
The worldwide electronic network including Web pages, chat ro…
Piracy
The stealing of software by copying it and giving or selling…
10 terms
Internet Safety
Internet
email
search engine
social networking
a vast computer network linking smaller computer networks wor…
a system for sending messages from one individual to another…
a computer program that searches documents, especially on the…
the development of social and professional contacts; the shar…
Internet
a vast computer network linking smaller computer networks wor…
email
a system for sending messages from one individual to another…
11 terms
Internet Safety
Who should you give your password to?
What settings should you have your Fac…
Do you always know who you are talking…
When is it unsafe to meet someone that…
No-one
Privacy settings - Friends Only
NO
If you don't know who they are in real life.... (even if introdu…
Who should you give your password to?
No-one
What settings should you have your Fac…
Privacy settings - Friends Only
8 terms
Internet Safety
Cyberbullying
Phishing
Identity theft
Cyberstalking
Bullying through Internet applications and technologies such…
A form of Internet Fraud that aims to steal valuable informat…
A crime that involves someone pretending to be another person…
committing the crime of stalking through electronic communica…
Cyberbullying
Bullying through Internet applications and technologies such…
Phishing
A form of Internet Fraud that aims to steal valuable informat…
11 terms
Internet Safety
Who should you give your password to?
What settings should you have your Fac…
Do you always know who you are talking…
When is it unsafe to meet someone that…
No-one
Privacy settings - Friends Only
NO
If you don't know who they are in real life.... (even if introdu…
Who should you give your password to?
No-one
What settings should you have your Fac…
Privacy settings - Friends Only
12 terms
Internet Safety
Grooming
Cyberbullying
Sexting
Netiquette
When a stranger tries to start a relationship with a child fo…
Bullying behaviour which takes places through the use of elec…
Cell phone, computer and other mobile device users—often teen…
Good manners online
Grooming
When a stranger tries to start a relationship with a child fo…
Cyberbullying
Bullying behaviour which takes places through the use of elec…
17 terms
Internet Safety
Clickjacking
Browser Hijacking
Pharming
Phishing
technique that tricks users into clicking on a malicious link…
occurs when malware or spyware replaces your browser's home p…
technique used to redirect a legitimate website's traffic to…
mail or instant message scams that are disguised to look like…
Clickjacking
technique that tricks users into clicking on a malicious link…
Browser Hijacking
occurs when malware or spyware replaces your browser's home p…
10 terms
Internet Safety
internet
e-mail
search engines
social networking
The global communication network that allows almost all compu…
Messages distributed by electronic means from one computer us…
A program that searches for and identifies items in a databas…
The use of dedicated websites and applications to interact wi…
internet
The global communication network that allows almost all compu…
e-mail
Messages distributed by electronic means from one computer us…
14 terms
Internet safety
Photo sharing
Communication
Digital citizenship
Digital footprint
Photo sharing is the publishing or transfer of a users digita…
The exchange of information or news
A digital citizenship refers to a person utilizing info or te…
A digital footprint is a trail of data you create while using…
Photo sharing
Photo sharing is the publishing or transfer of a users digita…
Communication
The exchange of information or news
10 terms
Internet Safety
Who should you give your password to?
What settings should you have your Fac…
Do you always know who you are talking…
When is it unsafe to meet someone that…
No-one
Privacy settings - Friends Only
NO
If you don't know who they are in real life.... (even if introdu…
Who should you give your password to?
No-one
What settings should you have your Fac…
Privacy settings - Friends Only
10 terms
Internet Safety
E-mail
Download
Filter
Privacy Policy
A service that allows people to send text messages, pictures,…
Storing information from the web to a computer
Restricted internet access for only school purposes
The policy that a company or organization operating a Web sit…
E-mail
A service that allows people to send text messages, pictures,…
Download
Storing information from the web to a computer
19 terms
Internet Safety
kind
unkind
polite
impolite
אדיב
לא אדיב
מנומס
חסר נימוס
kind
אדיב
unkind
לא אדיב
22 terms
Internet Safety
Pharming
Virus
Phishing
Malware
a technique used to redirect a legitimate website's traffic t…
a self-replicating program that is designed to infect a compu…
mail or instant message scams that are disguised to look like…
intentionally malicious software or code that is designed to…
Pharming
a technique used to redirect a legitimate website's traffic t…
Virus
a self-replicating program that is designed to infect a compu…
14 terms
Internet Safety
Blog
Chat
Chat rooms
Cookie
A web log is a person's personal opinion about topics.
real time communication over the internet.
chat rooms are established so that people can discuss common…
A small file that is downloaded by some websites to store you…
Blog
A web log is a person's personal opinion about topics.
Chat
real time communication over the internet.
25 terms
Internet Safety
Phishing
Piracy
Cyber-stalking
Malware
Type of scam where the scammer tries to trick you into reveal…
Refers to illegally sharing copyrighted materials.
Any kind of harassment or threatening behavior that occurs on…
A malicious software that is designed to damage your computer…
Phishing
Type of scam where the scammer tries to trick you into reveal…
Piracy
Refers to illegally sharing copyrighted materials.
10 terms
Internet Safety
Internet Safety
Cyber bullying
Hacked
Online predator
Learning how to be safe with your private & personal informat…
Picking on a person online, making the person feel scared or…
Your information has been stolen by someone using a computer.
People who commit child sexual abuse that begins and takes pl…
Internet Safety
Learning how to be safe with your private & personal informat…
Cyber bullying
Picking on a person online, making the person feel scared or…
10 terms
Internet Safety
Workstation
Food and Drink
Settings
Downloads
Keep it neat!
Don't have it.
Don't change them.
Not without teacher permission.
Workstation
Keep it neat!
Food and Drink
Don't have it.
12 terms
Internet Safety
Address
Bookmark
Email
Internet
An address on the Internet helps you find people or informati…
A bookmark helps you mark a favorite place on the Internet an…
Mail you send to someone using a computer.
Connects computers all over the world. You can look for infor…
Address
An address on the Internet helps you find people or informati…
Bookmark
A bookmark helps you mark a favorite place on the Internet an…
10 terms
Internet Safety
Acceptable Use Policy
Confidential
Copyright
public domain
a document that clearly outlines what is and what is not acce…
private information
the exclusive right to make copies, license, and otherwise ex…
creative works or information that are not owned by an indivi…
Acceptable Use Policy
a document that clearly outlines what is and what is not acce…
Confidential
private information
12 terms
Internet Safety
World Wide Web (www)
Address
Bookmark
Instant Message
Part of the internet. On the web, information is linked toget…
An address on the Internet helps you find people or informati…
A bookmark helps you mark a favorite place on the Internet. A…
A quick way to send messages back and forth over the Internet…
World Wide Web (www)
Part of the internet. On the web, information is linked toget…
Address
An address on the Internet helps you find people or informati…
20 terms
Internet Safety
phishing
pharming
clickjacking
malware
A technique to gain personal information for the purpose of i…
A technique used to redirect a legitimate website's traffic t…
A technique that tricks users into clicking on a malicious li…
A broad term that describes any program that is intended to c…
phishing
A technique to gain personal information for the purpose of i…
pharming
A technique used to redirect a legitimate website's traffic t…
10 terms
internet safety
Internet safety
cyber bullying
cyber crime
download
knowing personal safety,security risks to private information…
using the internet or social media on an electronic device to…
illegal use of internet like stealing money from people ,etc.
sending data to your computert
Internet safety
knowing personal safety,security risks to private information…
cyber bullying
using the internet or social media on an electronic device to…
14 terms
Internet Safety
photo sharing
communication
digital citizenship
digital footprint
publishing or transfer of a user's digital photos online.
means of connection between people or places.
refers to a person utilizing information technology (IT) in o…
a trail of data you create while using the Internet.
photo sharing
publishing or transfer of a user's digital photos online.
communication
means of connection between people or places.
Internet and Internet Safety
browser
network
online bullying
Internet safety
application software that lets the computer access the worldw…
computers connected together so they can share resources such…
when being harassed online, you should always tell a trusted…
Do not put personal information on the Internet
browser
application software that lets the computer access the worldw…
network
computers connected together so they can share resources such…
13 terms
INTERNET SAFETY
internet
internet safety
stranger
chat
A global network connecting millions of computers, making it…
Rules for the safe use of the Internet for children
someone that you don't know
talk in a friendly and informal way.
internet
A global network connecting millions of computers, making it…
internet safety
Rules for the safe use of the Internet for children
12 terms
Internet Safety
Address
Bookmark
Email
Internet
An address on the Internet helps you find people or informati…
A bookmark helps you mark a favorite place on the Internet an…
Mail you send to someone using a computer.
Connects computers all over the world. You can look for infor…
Address
An address on the Internet helps you find people or informati…
Bookmark
A bookmark helps you mark a favorite place on the Internet an…
11 terms
Internet Safety
Who should you give your password to?
What settings should you have your Fac…
Do you always know who you are talking…
When is it unsafe to meet someone that…
No-one
Privacy settings - Friends Only
NO
If you don't know who they are in real life.... (even if introdu…
Who should you give your password to?
No-one
What settings should you have your Fac…
Privacy settings - Friends Only
12 terms
Internet Safety
Who should you give your password to?
What settings should you have your Fac…
Do you always know who you are talking…
When is it unsafe to meet someone that…
No-one
Privacy settings - Friends Only
NO
If you don't know who they are in real life.... (even if introdu…
Who should you give your password to?
No-one
What settings should you have your Fac…
Privacy settings - Friends Only
12 terms
Internet Safety
DOWNLOAD
EMAIL
CHAT ROOM
PASSWORD
Information transferred from the internet to your computer
A written means to communicate through the internet
A place where people can connect on the internet to talk abou…
Your specific code to your computer, documents, accounts, etc.
DOWNLOAD
Information transferred from the internet to your computer
EMAIL
A written means to communicate through the internet
11 terms
Internet Safety
Who should you give your password to?
What settings should you have your Fac…
Do you always know who you are talking…
When is it unsafe to meet someone that…
No one
Privacy settings - Friends Only
NO
If you don't know who they are in real life.... (even if introdu…
Who should you give your password to?
No one
What settings should you have your Fac…
Privacy settings - Friends Only
24 terms
Internet Safety Vocabulary
Cyberbullying
Hacker
Netiquette
Online Profile
When a person is tormented, threatened, harassed, humiliated,…
A person who uses the Internet to access personal or business…
Rules or manners for interacting with others online. An examp…
Your online reputation. It is created from public and private…
Cyberbullying
When a person is tormented, threatened, harassed, humiliated,…
Hacker
A person who uses the Internet to access personal or business…
15 terms
Internet Safety Vocabulary Terms
Internet Predator
Cyberbullying
Sexting
Grooming
People who intentionally access sites that children or teens…
when a teen is tormented, threatened, harassed, humiliated, e…
Act of sending sexually explicit materials through mobile pho…
The process used by predators to gain the trust of victims an…
Internet Predator
People who intentionally access sites that children or teens…
Cyberbullying
when a teen is tormented, threatened, harassed, humiliated, e…
19 terms
Internet Safety
Internet
Cyberspace
URL
Internet Address
world wide system of computers connected in a network
the world that connects computers to the Internet
Uniform Resource Locator
A group of letters and numbers that take you to a specific pl…
Internet
world wide system of computers connected in a network
Cyberspace
the world that connects computers to the Internet
10 terms
Internet Safety
Hacker
Cybercrime
Firewall
Malware
Hacker
Cybercrime
17 terms
Internet Safety
bookmark
web browser
upload
download
a link set up by the user to a particular web page
A program that allows a user to view and interact with web pa…
The process of transferring a file from a local computer or d…
to transfer a file from the Internet or other computer to you…
bookmark
a link set up by the user to a particular web page
web browser
A program that allows a user to view and interact with web pa…
12 terms
Internet Safety
Cyberbullying
Victim
Perpetraitor
Malware
Bullying through Internet applications and technologies such…
a person harmed, injured, or killed as a result of a crime, a…
a person who perpetrates, or commits, an illegal, criminal, o…
malicious software created specifically for the purpose of in…
Cyberbullying
Bullying through Internet applications and technologies such…
Victim
a person harmed, injured, or killed as a result of a crime, a…
Internet Safety
Blog
Chat
Chat rooms
Cookie
A web log is a person's personal opinion about topics.
real time communication over the internet.
chat rooms are established so that people can discuss common…
A small file that is downloaded by some websites to store you…
Blog
A web log is a person's personal opinion about topics.
Chat
real time communication over the internet.
10 terms
Internet Safety
Electronic Communications Privacy Act…
Children's Online Privacy Protection A…
COPPA
CIPA
Addresses security and confidentiality issues of electronical…
Websites targeting children under 13 must follow specific gui…
Children's Online Privacy Protection Act (1998)
Children's Internet Protection Act (2000)
Electronic Communications Privacy Act…
Addresses security and confidentiality issues of electronical…
Children's Online Privacy Protection A…
Websites targeting children under 13 must follow specific gui…
10 terms
Internet Safety
Blocking
Restriction
Warning
Suggestion
prevents a child from being exposed to material that has been…
gives a child access to material that is explicitly judged to…
leaves the child with an explicit choice to accept or decline…
provides direction but does not foreclose the exercise of cho…
Blocking
prevents a child from being exposed to material that has been…
Restriction
gives a child access to material that is explicitly judged to…
10 terms
Internet Safety
Identity
Anonymous
Personal
Screen Name
who you are, your personal information.
Identity unknown
your own information that you do not want people to know
a name used online
Identity
who you are, your personal information.
Anonymous
Identity unknown
14 terms
Internet Safety
Photo Sharing
Communication
Digital Citizenship
Digital Footprint
Allows users to share photos and minimal text, as well as int…
A process through which you send messages to and receive mess…
Navigating the digital world safely, responsibly, and ethical…
All of the information about a person that can be found online
Photo Sharing
Allows users to share photos and minimal text, as well as int…
Communication
A process through which you send messages to and receive mess…
10 terms
Internet Safety
Electronic Communications Privacy Act
Children's Online Privacy Protection A…
Children's Internet Protection Act (CI…
spam
addresses security and confidentiality issues of electronical…
designed to help children as they use the internet
requires schools and libraries to incorporate technology base…
unwanted messages that are received through email, instant me…
Electronic Communications Privacy Act
addresses security and confidentiality issues of electronical…
Children's Online Privacy Protection A…
designed to help children as they use the internet
10 terms
Internet Safety
spam
phishing
malware
virus
Unwanted messages and content that occur on various technolog…
A form of spam that seems legitimate but is not and typically…
Malicious software contained in spam
Software program that requires a person to take action in ord…
spam
Unwanted messages and content that occur on various technolog…
phishing
A form of spam that seems legitimate but is not and typically…
14 terms
internet safety
photo sharing
password
privacy settings
link
Allows users to share photos and minimal text, as well as int…
Which of the following is a private combination of characters…
An interface where a user is given partial control of what da…
Connect
photo sharing
Allows users to share photos and minimal text, as well as int…
password
Which of the following is a private combination of characters…
14 terms
Internet safety
Photo sharing
Communication
Digital citizenship
Digital footprint
Allows users to share photos and minimal text, as well as int…
A process through which you send messages to and receive mess…
Person utilizing IT in order to engage in society, politics,…
All of the information about a person that can be found online
Photo sharing
Allows users to share photos and minimal text, as well as int…
Communication
A process through which you send messages to and receive mess…
14 terms
internet safety
photo sharing
communications
digital citizenship
digital footprint
Uploading images to a website like Flickr or Picasa, adding t…
a process through which you send messages to and recieve mess…
ability to participate in society and politics onlin
All of the information about a person that can be found online
photo sharing
Uploading images to a website like Flickr or Picasa, adding t…
communications
a process through which you send messages to and recieve mess…
14 terms
Internet safety
Photo sharing
Communication
digital citizenship
Digital footprint
The publishing or transfer of a user's digital photos online.
The imparting or exchanging of information or news.
A person utilizing information technology in order to engage…
A trail of data you create while using the Internet.
Photo sharing
The publishing or transfer of a user's digital photos online.
Communication
The imparting or exchanging of information or news.
22 terms
Internet Safety
Pharming
Virus
Phishing
Malware
a technique used to redirect a legitimate website's traffic t…
a self-replicating program that is designed to infect a compu…
mail or instant message scams that are disguised to look like…
intentionally malicious software or code that is designed to…
Pharming
a technique used to redirect a legitimate website's traffic t…
Virus
a self-replicating program that is designed to infect a compu…
10 terms
Internet Safety
Personal Information
Meeting people
Posting pictures
inappropriate post
Never share personal information online such as: Cell phone n…
If someone asks to meet you that you have only met online mak…
Check with your parent/guardian before you post any pictures…
Never post inappropriate things on social media.
Personal Information
Never share personal information online such as: Cell phone n…
Meeting people
If someone asks to meet you that you have only met online mak…
1 of 10