click below
click below
Normal Size Small Size show me how
Digital Citizenship
Term | Definition |
---|---|
Bully | Someone who acts in an aggressive, hostile, or hurtful manner toward others. Perpetrator is another word for bully. |
Bystander | People who witness the actions of the bully and the reactions of the victim(s), without taking action. |
Grooming | Techniques used by predators to try to gain your trust; this could be against children, older people or others. |
Netiquette | Courtesy, honetsy, and polite behavior practiced on the Internet - key component of digital citizenship! |
Upstander | Someone who takes action to stop bullying or other inappropriate behaviors. |
Anti-virus software | Software blocking malicious programs, such as viruses or malware, from harming your computer. This software has to be kept up to date so that the latest threatening programs are guarded against. |
Digital footprint | All of the information online about a person either posted by that person either posted by that person or others, intentionally or unintentionally. |
Encryption | The process of converting information or data into a code, especially to prevent unauthorized access. |
Firewall | Hardware or software that blocks or filters certain types of network traffic from reaching your computer. |
Identity Theft | A crime that happens when someone gets the person information of another person, usually to impersonate that person electronically for the purpose of stealing money. |
Malware | Stands for malicious software or code, which includes any harmful code - trojans, worms, spyware, adware, etc. - that is designed to damage the computer or collect information. |
Certifications | Non-degree awards made to those who have achieved qualifications specified by a certifying authority. |
Career Clusters | The state of Georgia recognizes these in the state. Ex. Agriculture, Food |
User/Interest Groups | These are made up of people who work or are interested in particular areas of technology. They meet on a regular basis and discuss new advances, common problems, trends and experiences in the field. |
Workshops/Conferences | These are one day to a week long gathering of workers and experts in a particular field of technology. |
Professional Social Media Presence | This is an account on a particular social platform held by an individual that reflects their interest in a particular field of technology. The platform is usually a popular one that other professionals in that field frequent. |
Interpersonal Job Skills | These include ~Active listening-hearing others and being aware of their needs ~Teamwork-helping a group to achieve a goal. ~Taking Initiative-knowing something that needs to be done and finding a way to get started. |
Technical Skill Development | Clubs like these hold meetings, conferences, create workshops and hold competitions that help develop awareness about and expertise in various skills. These all relate to career areas that students will be involved with in their near futures. |
Charitable Work | When you help someone else you help yourself; these types of groups usually pick an organization doing good work in an area they care about and hold some sort of activity to produce something that can be given to the charity or that assists in their goals |
Benchmarking | The process of measuring the organization's products, services, cost, procedures, etc. against competitors or other organizations that display a "best in class" record. |
Leadership Practice | These clubs elect officers, hold meeting and appoint other leaders to organize and direct projects. These activities give students opportunities to exercise skills in interpersonal relationships, dealing with adults and accomplishing goals. |
AUP | Some companies and organizations have this that governs what kind of use members of that group can make of the INternet and media available to them. Our school system has one that you have consented to by being here. |
Copyright | The owner's legal right to reproduce, display, transmit, and modify a work as well as the right to publicly perform a sound recording by digital transmission. |
Creative Commons | A license that lets you decide how others may use your work. This license allows you to keep your copyright but also allow other to copy and distribute you work provided they give you credit and only on the conditions you specify. |
Fair use | The idea that copyright material may be quoted without the need for permission from a payment to the original source, provided that a citation is clearly given and that the material quoted is reasonably brief. |
Intellectual Property | Includes are, books, inventions, magazines, movies, music, performances, reports, software, stories created by you or by others. |
Open Source | Programming code with limited or no copyright restrictions, allowing you to legally modify and share the software program. The GIMP and Inkscape are open source graphical software tools. Notepad++, which is a web page code editor, is also an ex. of this. |
Plagiarism | Using someone else's words or ideas and passing them off as your own. |
Cookies | Small computer text files placed in your computer by the sites you visit that collect info about your computer system and the web pages you view. |
Flame | A deliberately mean-spirited message sent to others on the Internet. |
Harassment | To annoy someone repeatedly. For example, cursing at, following, or mocking someone online for negative purposes. |
Predator | One who stalks or uses lies, secrecy, or stealth, to get close enough to another person in order to easily hurt or harm them. Usually an adult. |
Phishing | A con game that scammers use to collect personal information from unsuspecting users without them realizing it. |
Piracy | Theft of intellectual property-in other words, stealing what does not belong to you. |
Software Patch | Can be an upgrade(adding more features), a bug fix, a new hardware driver or update to address new issues such as security or stability problems. |
Spyware | Software that goes on you computer without your knowledge and steals private information. Typically it will get some information about you like where you live and use it to feed advertisements to you. |
Trojan Horse | Software programs that hide inside regular programs, such as games, disk utilities, and even antivirus programs. But if they are run, these programs can do great harm to your computer. |
UPS-Uninterrupted Power Supply | A large battery that is plugged into an outlet and that computer equipment is then plugged into. It sits between the outside power supply and the computer. It will instantly switch over to the battery back-up if the outside power supply goes down. |
Virus | A program that duplicate itself and spreads throughout your computer destroying files, changing data, hogging all your memory, or doing anything that is possible with a computer program. Viruses only damage software, not hardware. |
Worm | A type of virus that replicates itself, but does not change any files on your machine. However, worms can multiply so many times that they take up all your computer's available memory or hard disk space. |
Authoritarian leadership | A style of leadership in which the leader tells the employees what needs to be done and how to perform it without getting their advice or ideas. |
Delegative Leadership | A style of leadership in which the leader entrusts decision making to an employee or a group of employees. The leader is still responsible for their decisions. |
Horizontal Leadership | Viewing leadership as a system so that information becomes networked. Information now flows horizontally. Differs from traditional leadership in which we view information running vertically or in a hierarchical manner. |
Participative Leadership | A style of leadership in which the leader involves one or more employees in determining what to do and how to do it. The leader maintains final decision making authority. |