click below
click below
Normal Size Small Size show me how
FBI SOS Vocabulary
| Term | Definition |
|---|---|
| Bluetooth | A way to connect electronic devices such as keyboards, mice, and headphones using wireless technology |
| Copyright | The legal right to copy, publish, or sell an original piece of work, like a book, song, or photograph. It’s illegal to use copyright information without permission. |
| Cyberbullying | Sending or posting messages, pictures, or videos online to hurt or embarrass another person. Cyberbullying can happen on any electronic device or online system. |
| Cyberstalking | Using online technologies over and over to harass or scare someone. Cyberstalking is against the law and can happen on any digital device. |
| Digital Distraction | Using electronic devices in an unsafe or unhealthy way so that you are not paying attention to the people or situation around you (for example, texting while riding a bicycle) |
| Digital Footprint | - Information about you that is left behind on the Internet after you go online and can be used by people and companies to track your Internet activities. This information can stay online for a very long time. |
| File-Sharing Sites | Sites or services that let you share music, videos, and other files online with other people. Be careful—many of these sites contain copyrighted media. |
| Firewall | A security tool that helps protect your computer by only allowing trusted connections. Make sure to turn the firewall on for your computer or laptop. |
| Grooming | - The way predators build trust and become friends with children so they can harm them later. Predators often pretend to like what you like, take your side in any disagreements with your parents and others, and support you and your goals in life. |
| IP Address | Short for Internet protocol address, a unique number that identifies a specific computer using the Internet. Every device connected to the Internet has an IP address. |
| Identity Theft | When someone steals your personal information, pretends to be you, and commits a crime in your name. Identity theft can happen to young people, too. |
| Internet History | - A list of webpages you have visited online that is stored in your web browser. Deleting your Internet history on a regular basis makes it harder for companies to track you. |
| Malware | Short for malicious software, it can damage or disable your electronic devices and steal your personal information. |
| Netiquette | Short for Internet etiquette or network etiquette, it means good computer and Internet manners |
| Online Predator | - An adult who goes online looking for kids to harm. |
| Personal Information | Revealing details like your name, address, telephone number, and age that can be used by others to figure out who you are and where to find you. |
| Phishing | A tricky way of trying to steal your password and other sensitive information through electronic messages that appear to come from a site you trust |
| Plagiarism | Using someone else’s words or ideas as your own without giving credit to that person |
| Privacy | The ability to control what information you reveal about yourself over the Internet and who can access that information |
| Reporting | Telling a parent, trusted adult, and/or website owner about something you saw online that you didn’t think was appropriate. |
| Reputable Site | - A website that contains trusted and reliable content from a respected source. |
| Upstander | Someone who supports and speaks up for a person being bullied online. |
| Web Browser | A computer application like Google Chrome, Mozilla Firefox, and Internet Explorer that lets you find and visit websites |