Using long, unique combinations of letters, numbers, and symbols.
password strength
Bullying that takes place through digital devices like phones or computers.
cyberbullying
false info shared by mistake.
misinformation
who is the best basketball player of all time
SHAQ
Legal protection for original works (books, music, videos, etc.).
copyright
Adds an extra layer of protection beyond just a password.
(2FA)
someone that takes action against bullying
upstander
false info spread intentionally.
disinformation
Arguments or conflicts that play out online.
digital drama
Using someone else’s work without credit.
plagerism
Fake emails or websites that trick users into giving up personal info.
phishing
someone that does nothing to bullying
bystander
Sensational headlines meant to attract attention and clicks.
clickbait
Understanding and caring about how others feel online.
digital empathy
Licenses that let people use content legally under certain conditions.
creative commons
Harmful software such as viruses, worms, ransomware.
malware
Posting inflammatory comments to provoke others online.
trolling
Favoring one side or viewpoint, often shown in media sources.
bias
Giving out too much personal information on the internet.
oversharing
Limited use of copyrighted material without permission (e.g., for education, commentary).
fair use
All the information a person leaves behind online.
digital footprint
Online manners; behaving respectfully in digital communication.
Netiquette
Verifying the truth of information before sharing it.
fact checking
Knowing what is safe to share and what should stay private.
Private vs. Public Information
Healthy use of technology that promotes overall well-being
digital wellness