Page 23 - Knowledge Organiser Yr7 24-25
P. 23

            1. Using computers safely, effectively and responsibly
2. Key Vocabulary
2.1 evaluate
     1.1 malware
Software that causes harm to your computer.
Finding out about the quality of something.
 1.2
  inappropriate content
  The WWW contains inappropriate content which may not be age appropriate.
 1.3
  social media
  Websites and applications that enable users to create and share content or to participate in social networking.
 1.4
   online safety
   Making sure that people are protected from harm when using any electronic device for online purposes.
   1.5
  email
  Short for electronic mail. An email is sent from one computer to multiple computers through the use of email addresses.
   1.6
 cookies
 Text files with small pieces of data (like a username and password) that are used to identify your computer as you use a computer network.
 1.7
   cyberbullying
   Use of phones, instant messaging, e-mail, chat rooms or social networking sites to harass, threaten or intimidate someone.
  2.2
  trustworthiness
  How sure we are that the information is correct.
 2.3
  bias
  Being unfairly in favour of one thing over another.
 2.4
   reliability
   The level to which we can depend on the information.
 1.8 digital footprint
The trail of data you leave when using the internet.
2.5 index
2.8 copyright
Another name for a database of website.
A law to protect people’s ideas/work.
 2.6
  Boolean
  'AND' 'OR'NOT' logic statements used to improve database searches.
 2.7
   relevance
   How close the information matches what you were looking at.
  2.9
   plagiarism
   Using other people’s ideas/work and pretending it is yours.
   2.11
 hacking
 Gaining access to a computer without being allowed.
 2.12
   forum trolls
   People who hang around chat rooms and forums posting abuse.
  1.9
   grooming
   When someone builds a relationship, trust and emotional connection with a child or young person so they can manipulate, exploit and abuse them.
   1.10
 trolling
 To antagonise (others) online by deliberately posting inflammatory, irrelevant, or offensive comments or other disruptive content.
 1.11
  virus
  A computer program that replicates itself by modifying other computer programs and inserting its own code.
 1.12
   addiction
   Social media and gaming can be addictive and prevent you from having a happy balanced life.
 2.13 pseudonym
2.15 print-screen
An online name different from a real name.
A way to capture what is onscreen.
 2.14
   cyber- abuse
   Being tormented, threatened, harassed, humiliated, embarrassed or targeted by another person using the internet.
  23
        Knowledge Base: Computing My Digital World Year 7 | Autumn Term 1
                   























   21   22   23   24   25