Page 25 - Knowledge Organiser Yr9 24-25
P. 25

 Knowledge Base: Computing Digital Resilience Year 9 | SpringYTeearm9
  1. Using computers safely, effectively and responsibly
    1.1
  social media
 Age recommendation for a range of popular apps. How to behave when using social media. Consider what constitutes cyberbullying, how to prevent it and when to report it.
 1.2
  online safety
  Staying safe online. Making sure that people are protected from harm of using any electronic device for online purposes.
 1.3
   harassment
   Using text messaging, instant messaging and email to harass, threaten or embarrass the target.
   1.4
 impersonating someone
 Developing a screen name that is similar to the victim’s screen name and then posting rude or hurtful remarks while pretending to be the victim.
 1.5
   inappropriate content
   Content images online that contains personal information about others, hateful or malicious content and/or sexually explicit material.
   2. Key Vocabulary
    2.1
  sexting
 Sending sexually explicit photographs or messages via mobile phone.
 2.2
  sad fishing
  Social media users seek for sympathetic reactions and comments by posting sad stories.
 2.3
   cat fishing
   The process of luring someone into a relationship by means of a fictional online persona.
 1.6 peer pressure
1.8 digital footprint
Influence from members of one’s peer group.
The trail of data you leave when using the internet.
3. If you experience anything inappropriate online
3.1 Block, delete and report.
3.4 Report to CEOP using the report button.
2.4 social networking Apps that allow the sharing of digital content.
2.6 portray Describe something in a particular way.
 2.5
   consent
   Permission for something to happen or agreement to do something.
  2.7
   bystander
   A person who is present at an event or incident but does not take part.
   2.8
  fake news
  False or misleading information presented as news. Often the aim is to damage the reputation of
a person.
  1.7
   cyberbullying
   Use of phones, instant messaging, e-mail, chat rooms or social networking sites to harass, threaten or intimidate someone.
       3.2
   The process to do this will be different depending on which social network you are using – make sure you know how when you first sign up.
   3.3
  Viewing inappropriate content can be very upsetting but you don’t need to go through it alone, speak to a trusted adult. Support can also be sought with Child Line – 0800 1111.
  1.9
  grooming
  Is when someone builds a relationship, trust and emotional connection with a child or young person so that they can manipulate, exploit and abuse them.
 1.11
   trolling
   To antagonise (others) online by deliberately posting inflammatory, irrelevant, or offensive comments or other disruptive content.
   1.12 social engineering
1.13 PEGI rating
Tricking someone into giving away their personal details. Provides age classifications for video games.
     25




































   23   24   25   26   27