Online Presence/Online Security
Friends and Followers
Online You
Managing Personal Digital Devices
Time Online/Time Out
100

What forms your Online Presence?

Your online presence is formed by your use of digital devices and your online activity. Your online presence is formed by others when they post information about you online.

100

What is a follower? (Social media)

Users that have subscribed to certain content, other users, interests, or companies.

100

What is Cyberbullying?

The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.

100

What are the benefits of using a personal digital device?

Communication, Real-time info, Decrease in print media, Ability to learn new skills, Educational or work purposes etc
100

What is the recommended hours of sleep every night?

9-10 hours

200

What are 2 ways we can tell if a website is secure?

Checking the URL - .gov.au, .com.au etc.

The padlock displayed next to the URL

Using security tools to explore the website

Check the SSL certificate - https:// instead of http://

200

Is it safe for you to follow someone that you don't know?

No.

200

Anti social behaviour is referred to as...

Antisocial is a word to describe behaviour that is disrespectful to others and to the laws and customs of society. Antisocial behaviour in an online world includes trolling, stalking, harassment and bullying.

200

Identify 5 legitimate stores where you can safely download films, TV shows, games, apps or ringtones

YouTube, App store, Google Play store, Playstation Store, Disney+, Netflix, Binge, Stan etc

200

What are the warning signs of excessive time spent online?

Emotional Symptoms of Online Addiction

  • Feelings of guilt
  • Anxiety
  • Depression
  • Dishonesty
  • Euphoric feelings when in front of the computer
  • Unable to keep schedules
  • No sense of time
  • Isolation
  • Defensiveness
  • Avoiding doing work
  • Agitation

Physical Symptoms of Online Addiction

  • Backache
  • Headaches
  • Weight gain or loss
  • Disturbances in sleep
  • Carpal tunnel syndrome
  • Blurred or strained vision
300

What makes a strong password?

A strong password contains a mixture of upper and lower case letters, numbers and keyboard symbols.

300

What is a con of having your profile public with a large following base? (large amount of followers)

Lots of random people have easy access to your content, where they can share, post or send your content to others without you knowing. 

Prone to online abuse, such as cyberbullying, cyberstalking, trolling, and cyberharassment

300

Define the term consume/consumer (digital) 

The term consume refers to the way we interact with online content. We view videos and download films. We listen to music, podcasts and audiobooks. We retweet, regram and repost. We share someone else’s status. We catch up on television programs via television networks on demand websites. We play games on our smartphones while we wait. We read blogs and newsfeeds.

300

If you download an app online. How do you know it is from a trustworthy site?

Some characteristics of a safe marketplace are:

  • Terms of service that are well developed.
  • Clear contact information and a troubleshooting FAQ.
  • Strict app developer criteria.
  • A history of removing vendors with poor content.

Know the Numbers, Read Reviews, Inspect Permissions, Learn About the Vendor or Developer

300

How would you intervene if you thought a friend was spending too much time online?

Accept an sensible response that is respectful, clear, and assertive

400

What is the importance of online privacy?

Internet privacy is important because it gives you control over your identity and personal information. Without that control, anyone with the intention and means can manipulate your identity to serve their goals, whether it is selling you a more expensive vacation or stealing your savings.


400

What is the difference between online friends and in-person friends

Online friends are people you don’t really really know but you met them once at a conference, on a social networking site, on Twitter, or maybe you added them to your Facebook because they’re friends with someone you know. 

Real life friends keep you company when they can, when they’re not busy with something else or watching a favourite television show.You know them personally and emotionally either from school, sport clubs etc.

400

Outline a response if you were a victim of online anti social behaviour 

Accept an sensible response that is respectful, clear, and assertive

400

What are the 5 types of Malware?

Adware, Spyware, Worm, Virus, Trojan

400

What are 3 ways to improve your sleep?

Stick to a routine of setting your alarm for the same time each morning and going to bed at the same time each night.

Lay off caffeine before bed, as they can make it harder to get to sleep or may disrupt your sleep.

Keep calm, turn off your television, mobile phone and laptop or tablet at least 30 minutes before bed. The light from these devices can trick your brain into thinking it’s still daytime.

Try not to nap during the day.

Exercise first thing in the morning, outdoors. Sunlight can help reset your body clock.

Create a sleep playlist with soft, gentle music to slow your heart rate and help you unwind.

Check the room temp – is it too cold or too hot? Open a window, get an extra blankie, or change the air-con setting so that the environment is comfortable.

Keep light and noise to a minimum. Wear an eye-mask, or just put a T-shirt over your eyes, to block excess light. If outside noise is disturbing you, wear ear-plugs or grab some headphones and play gentle music.

Other reasons that are related can be accepted 

500

What is the difference between Hacking and Cracking in terms of someone accessing your account?

Hacked is when someone accesses your account using a script or code to bypass the usual security measures and accesses your private information.

Cracked is when someone accesses your account because they have figured out our password.

500

Etiquette is a set of rules that define polite behaviour in social situation. What are five rules for online polite behaviour?

While you're writing - Watch Your Tone, UPPER CASE LETTERS = SHOUTING, Be Careful With Swearing, Check The Scene

Before you send it - Check Before You Hit Send, Don’t Hit Send When You Are Angry Or Upset, Make Sure Your Message Is Going To The Right Person, Think About Whether It’s Worth Sending

Do unto others - Respect People’s Privacy, Don’t Forward Emails Without Asking First, Remember There’s A Person At The Other End, Person-To-Person Is Still Safest

500

What is the difference between Cyberstalking and Trolling?

Cyberstalking is the repeated use of electronic communications to harass or frighten someone, for example by sending threatening emails.


Trolling is to antagonize (others) online by deliberately posting inflammatory, irrelevant, or offensive comments or other disruptive content

500

Describe the types of malware (Trojan and Adware) that affect technology?

Trojan - disguises itself as desirable code

Adware - serves unwanted advertisements

500

What are some negative effects of sleep deprivation (lack of sleep) in terms of learning, emotional and physical health?

  • Lack of alertness. Even missing as little as 1.5 hours can have an impact on how you feel.
  • Excessive daytime sleepiness. It can make you very sleepy and tired during the day.
  • Impaired memory. Lack of sleep can affect your ability to think, remember and process information.
  • Relationship stress. It can make you feel moody and you can become more likely to have conflicts with others.
  • Quality of life. You may become less likely to participate in normal daily activities or to exercise.
  • Greater likelihood for car accidents. Drowsy driving accounts for thousands of crashes, injuries and fatalities each year, according to the National Highway Traffic Safety Administration.
M
e
n
u