LS 6 Diana DIGITAL LITERACY

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 6

LEARNING STRAND 6 - DIGITAL LITERACY features that predators could use.

Therefore, don't assume that


This has been made possible by cyber cafés and the seemingly innocent game that you allow your child to play
easy accessibility of communication gadgets to isn't also capable of connecting your kids to complete
our children. strangers.
According to the survey which was conducted in How to minimize the Risk to your Kids
February, there are estimated 750,000 online There are a number of proactive steps to take with your kids.
individuals looking to connect with kids at any We suggest you think about the following in your family:
moment. Talk to your kids about online strangers and predators. It's a
Have access to their gadgets: As a parent, be very scary topic, but don't ignore pretend that online dangers
sure to have access to your child(ren) gadgets are non-existent. When you talk to your kids about strangers
and monitor their activities online. Be make sure they understand that strangers exist both in the real
conversant with the applications (apps) they use world and the online world.
and interact with. Secure your devices and home network with parental controls.
Be open with your kids: Never delegate the role Use parental control solutions for computers, mobile phones,
of parenting to anyone. Do not assume that and other devices.
teachers in schools will talk to your kids about If your kid isn't of age to use a certain site, then they shouldn't
pornography and its effects. Talk to your kids use it. Parents should never help their children create accounts
and be open about it. Let them give you their if they are not of age.
views on the same. That way, your kid is able to Don't allow young kids to use chat rooms and message boards.
learn the dangers of such content. When kids are older and they are interacting with others
Limit/manage use of internet: As a parent, you online, monitor what they are doing, what they are talking
should be able to dictate what time your kids about, and who they are talking with. Make sure you know
access the internet. You should also dictate the what message boards, social networks, groups, and chat rooms
kind of content they consume. your kids are involved with. 
Talk to your kids about technology: Being the Kids should use public chat rooms and message boards. Kids
digital era, your kids are well versed with should not be engaging in private, one-on-one conversations
technology and the dangers that lurk. Tailor your online in private chat rooms that cannot be monitored.
points towards how technology has made it easy Keep and use computers and Internet-enabled devices in a
for people in different parts of the world to public area. This simple yet powerful step helps you know and
communicate. Caution them about the people monitor what's happening in your family's digital world. It's
they talk to through the internet. more difficult for your child to talk to a stranger online if the
It is not a one size fits all approach but it’s computer, gaming device, or mobile phone is used in a public
important to keep tabs on your children’s space in your home. Guide them by making it a habit to be
activities in order to know how to tackle the with your child when they are online.
issue. Protecting Kids from Internet Stranger Danger
Meeting online strangers Internet Stranger Danger For decades, “stranger danger” has
Patterns of Online Predators been a term parents of school-aged kids used to warn their
Online predators tend to follow certain children. Before the rise of the internet, stranger danger
behavioral patterns to find kids. As parents, you referred to the dangers associated with strangers physically
need to know some of these tendencies. In preying on innocent victims enticing with candy, knocking on
general, online predators will tend to: the door or approaching a wandering child at a grocery store.
Find places where kids are. With today's While stranger danger is still a reality, it has a new dimension:
technology, this means social networks, chat threats from dangerous strangers can present themselves both
rooms, blogs, email, message boards and in the flesh and online. Indeed, internet stranger danger is a
forums, IM, and any place where they can real and growing problem.
interact with kids. When you send your child out into the world, you try to keep
Search Profiles. Kids profiles on social network him or her safe from predators. The same is true online: just as
sites often include photos of themselves, their a child can fall prey to a real-life predator, he or she can be
gender, age, and where they live. Kids who victimized by an online stranger looking to prey on
make it a point to provide detailed profiles are unsuspecting youths.
providing predators with the information they Although the threat of online social stranger danger is real and
are looking for. worrisome to any parent, there are many things you can do to
Places where kids can meet strangers online protect your children. Here are 10 tips for ensuring that when
There are some "places" in the digital world your child uses the internet, he or she is able to enjoy the
where kids are more likely to come into contact benefits of social media and the web without being victimized.
with strangers and predators. The online services Tips to Prevent Internet Stranger Danger
parents need to be most careful with are chat 1. Don’t give out personal information. No one – especially a
rooms, message boards and forums, social minor – should give out his or her name, age, address, school
networking sites, instant messaging, and email. name, phone number or photos of him or herself online, in chat
These aren't the only services, however.  rooms, by email, by instant message or clubs online.
Mobile phone and computer apps and games 2. Don’t talk to strangers. This age-old advice is especially
have multiplayer capabilities over the Internet. important online. Tell your children they should avoid
It's easy and common for kids to invite a befriending strangers online in almost all circumstances. If
complete stranger to be an opponent (or on the they don’t know the person they should “unfriend” them on
same team) with them. Networked apps and Facebook, don’t let them follow or be a follower on Instagram.
games oftentimes have chat rooms and other 3. Never meet with an online “friend” in person. Children
should be reminded to never meet in real life messaging session or plan a conference on a Linked In forum.
with someone they meet on the internet without Employers and schools are increasingly using social media to
a parent accompanying them. Dangerous reach out to potential employees and students as well.
strangers can easily pretend online to be Here are several ways to keep your personal information
someone they are not. safe while still enjoying the benefits of making social media
4. Do not accept online messages from strangers. connections:
Don’t let your child open or accept emails, links, 1. Treat the “about me” fields as optional.
attachments, URLs or anything else from Facebook gives you the option to fill in a great deal of
someone he or she doesn’t know and trust in real information about yourself, from your date of birth to where
life. you went to high school. Just because these fields are offered,
5. Never share your password. Remind your however, doesn’t mean you must fill them out. Consider
children – and remind them again and again – offering a general version of the information requested or
that they should never, under any circumstances, simply leaving the field blank. For instance, listing only your
share a password with anyone other than their state of residence, instead of both city and state, can make it
parents. Even close friends should not know a harder for others to figure out exactly where you live.
child’s passwords. 2. Become a master of privacy settings.
6. Communicate. Have conversations about your All social media sites give you the option to limit post viewing
child’s online life and share yours. Who does she to specific audiences. Take the time to explore these settings,
talk to? What does he like to do? Has she try different options, and become a master of their use. For
watched any funny or interesting videos lately? instance, both Facebook and Twitter let you create custom lists
Open and honest communication is one of the of people who are allowed to view specific posts.As you get
best defenses against online predators. Let your better at using the privacy settings, bear in mind that not all
child know that he or she can talk to you privacy settings “translate” between websites. For instance,
honestly about anything that happens in his or some Facebook users have reported that photographs they set
her online life, and that if a stranger approaches to “private” on Facebook were still indexed publicly in Google
your child with sexual advances, you as a parent Image Search—and could be found by searching for their
need to know. names. If you don’t want it found publicly, don’t post it!
Stranger danger – whether in real life or online – 3. Know the people you friend.
is something all parents worry about. By taking Once upon a time, social media users competed with one
some precautions, staying aware and another to have the largest number of connections. Today,
communicating with your children, you’ll be however, smart social media users know that the more people
able to put your mind at ease and allow your you’re connected to, the harder it is to control what happens to
kids the freedom they need to grow, explore, the information you post. Make sure you know the people you
learn and have fun. add on social media, in real life if possible. Don’t hesitate to
Online gambling use the “block” feature when the situation seems to call for it.
How to reduce the risks of playing online casino 4. Create and use an “off-limits” list.
gambling? There are certain pieces of personal information you should
So you are the one who wants to play gambling never, ever post. These include items like your Social Security
online but are confused that either you should go and driver’s license numbers and your specific location.
for it or not. If it is so then don’t worry because Tagging your specific location can seem fun, but announcing
here in the post, we will share some of the things to your friends that you are at the beach for the day also
with you which you should consider before announces to strangers that you are fifty miles from home.
selecting any site to play. When you consider Don’t make it easier for ill-meaning people to take advantage
them, then it will help you to choose the best of you by giving them a map to your whereabouts.
site. It is obvious that the best and reliable site 5. Always log out when you’re done.
will never provide you with bad service; they If you’re using a public computer, make it a ritual to log out—
will always try to satisfy their customers. The but log out of private devices from time to time as well.
main and final thing to do to reduce the risks is Logging out helps ensure that other people won’t
to find the one platform which is reliable and has “commandeer” your social media profile and use it to attack
a name among people for their working. your friends, change your personal information to
These points will help you to pick the one which embarrassing or slanderous comments, or worse, change your
will provide you proper playing and by this password and lock you out of your own account entirely.
means it will reduce the risk factors. So follow 6. Create strong, private passwords.
these points and bring the best for you. A strong password uses a combination of words, numbers,
Unwanted sharing of personal info upper- and lowercase letters, and special characters that is easy
How to keep your personal information safe on for you to remember, but tough for other people to guess. Skip
social media common password elements like birthdates, anniversaries, and
Social media runs a significant portion of the names of your children or pets. Keep passwords private by
people’s social lives. We use it to connect with memorizing them—and never write them on the device
far-flung friends and family, send quick Keeping Your Devices Secure
messages to co-workers, and announce major Use Security Software
(and minor) events in our lives. Many businesses Install anti-virus software, anti-spyware software, and a
use social media sites to collaborate or share firewall. Set your preference to update these protections often.
information—for instance, you might discuss a Protect against intrusions and infections that can compromise
project with co-workers via a Facebook your computer files or passwords by installing security patches
for your operating system and other software with someone with whom you have a problem rather than
programs. complaining behind this individual’s back. Or, if this doesn’t
Avoid Phishing Emails work, let them know that you will go in person to someone
Don’t open files, click on links, or download who is in a position to do something about the issue. Let them
programs sent by strangers. Opening a file from see you state disagreements objectively and politely, without
someone you don’t know could expose your name-calling or sarcasm. Let them see you choosing NOT to
system to a computer virus or spyware that “like” or share a post or photo that is hurtful or disrespectful,
captures your passwords or other information even if it seems amusing. If you make a mistake, say so – and
you type. show how you are going to make amends.
Be Wise About Wi-Fi State your disapproval when people in positions of power and
Before you send personal information over your prestige act in harmful or disrespectful ways, even if you
laptop or smartphone on a public wireless appreciate their winning a game, enjoy their music or films, or
network in a coffee shop, library, airport, hotel, agree with their politics. Model balance by turning your
or other public place, see if your information technology off and doing something together out in nature or
will be protected. If you use an encrypted with other people without being connected electronically.
website, it protects only the information you 2. Stay connected with your children's world online and
send to and from that site. If you use a secure everywhere else - Make SURE kids know you care!
wireless network, all the information you send 3. Teach kids how to be good digital citizens as an antidote to
on that network is protected. cyberbullying.
Lock Up Your Laptop 4. Discuss what makes it hard to NOT go along with peer
Keep financial information on your laptop only pressure. Discuss the suffering caused by cyberbullying. Let
when necessary. Don’t use an automatic login kids tell you what they know.
feature that saves your user name and password, 5. Have clear consequences for misusing technology in
and always log off when you’re finished. That harmful ways.
way, if your laptop is stolen, it will be harder for 6. Teach kids, "Don't put anything online that you wouldn't
a thief to get at your personal information. want the world to see!"
Read Privacy Policies 7. Practice skills for noticing trouble, moving away, setting
Yes, they can be long and complex, but they tell boundaries, and getting help.
you how the site maintains accuracy, access, 8. If a child is cyberbullied, provide support, not blame or
security, and control of the personal information lectures.
it collects; how it uses the information, and 9. Practice saying to friends, "Stop! That's not safe!" and
whether it provides information to third parties. "Stop! That's unkind!"
If you don’t see or understand a site’s privacy 10. Teach kids how to get adult help, even if they'd prefer to
policy, consider doing business elsewhere. solve it themselves!
Cyber bully
Here are 10 actions we can take to protect young How to Stop Cyberbullying
people from cyberbullying. In the wake of cyberbullying incidents, here are some tips to
1. Set a good example - What we DO matters help you prevent cyberbullying from taking place:
more than what we SAY! 1. Educate Yourself
Remember that the actions of young people’s To stop cyberbullying from taking place, understand exactly
close adults have a powerful influence on what what it is. You must research what leads to the initiation of
they will do. As one teacher told me, “At our cyberbullying, as well as how and where it is most likely to
small private school, parents were gossiping, occur. Speak with your friends about what they are seeing and
online and offline, about the troubles of one experiencing online to paint a better picture.
family. It is not surprising that their children 2. Secure your Online Passwords
started posting insults about a boy in that family Protect your online passwords and other sensitive information
who was having a hard time.” from prying eyes. Make sure that you don’t use light
Let the children and teens in your life see you passwords and never write them down somewhere. Moreover,
choosing to stay respectful even when you are trust no one when it comes to passwords, not even your best
upset. Let them see you reaching out to friend. If anyone other than you knows the password, it’s’s
communicate in person directly and respectfully highly advised to change it now.
3.Think Twice Before Sharing
Before sharing any intimate pictures of yourself, viruses that robotically infect your device once opened.
give a second thought if it’s’s something you 5. Sign out of Online Accounts
would want your family members such as While saving passwords is convenient, it is highly
parents, family members, and the rest of the recommended that you don’t save passwords on your web
world to see. Cyberbullies will take every browser, and don’t stay logged in when you walk away from
advantage to use these images against you and the computer or cell phone. If you sign out after doing your
make your life miserable. online activities, you elude any chances of intrusion.
4. Don’t Open Spammy Messages 6. Share and Aware Others
Ignore any emails, text messages, Facebook If you come across facts and stories that are worth a thought,
messages, etc. from people you don’t know, or share it with your friends and family. You can participate in a
from individuals who are known to be bullies. movement, join a group, initiate a campaign, or take part in an
The best thing to do is to delete such messages event to raise awareness for cyberbullying. While you may
without even reading them as they may contain understand what cyberbullying is, it is not until others are
entirely aware of it too that we can genuinely
prevent cyberbullying.
7. Don’t be a Cyberbully Yourself
This is an essential matter which you must take
seriously. If you’re the one who participates in
the same menace, then preventing it is far from
reality. Understand that you must treat others the
way you would want to be treated.
Prevention takes the initiative from both adults
and teens. Parents, being the adults, should
monitor their children’s activities and get in
touch with them daily regarding how their
children conduct their online activities and if
they are facing any backlash from people online.
On the other hand, teens should consult their
parents or any other adult if they feel they are
being cyberbullied.

Name:__________________________ Date:______________
Grade level: ____________ Score: __________

I. Write T if the statement is TRUE and F if the statement is FALSE.

_____1. Anything you say in an open chat room becomes public knowledge.
_____2. whenever you visit a blog, web pages, and other sites you cannot be detected as long as you are just
looking.
_____3. The best passwords include your name, age, or birthday.
_____4. Online conversations that you have can be used as evidence to put you in jail, if you do something
illegal.
_____5. No matter the circumstances: piracy is a crime.
_____6. It is okay to create a fake account of someone else, and pretend to be them.
_____7. Anything you say or type online becomes public knowledge and stays online forever… even if you
THINK you deleted it.
_____8. The best passwords include your name, age, or birthday.
_____9. I shouldn’t tell my parents or teacher if I find something online inappropriate.
_____10. Kids who are being cyber bullied are often being bullied in person too.
_____11. Cyber bullying is not as bad as bullying in real life because you usually forget about it easily.
_____12. Technology like social media sites can only be used to hurt people.
_____13. You will go to jail if you download illegal stuff from the internet.
_____14. It is okay to copy and paste information from the internet into your report then organize it.
_____15. It is okay to share what state you live in online.
_____16. Since there are over 400 students at our school, it is safe to share the name of the school online.
_____17. Is it okay to steal your neighbors Wi-Fi.

II. Choose the letter of the correct answer. Fill in the blank.
_____18. Being Ethical means:
A. Being a good person and doing the right thing C. Being very hungry
B. Being a bad person and doing the bad thing D. Acting like a potato
____19. How can you avoid getting unwanted online friends?
A. Have privacy setting high C. Avoid using public states
B. Limit who you accept as a “Friend” D. All of these are correct
____20. Is it right to have a site remember your password?
A. Yes C. Yes, if it is your private computer
B. No D. No, it can always be a a risk
____21. The informal code of positive conduct used whenever someone is connected to the internet is the
definition of:
A. Cyber security C. Cyber safety
B. Cyber ethics D. Cyber space
____22. The protection of information and computer systems and networks while connected to the internet. Is
the definition of:
A. Cyber security C. Cyber safety
B. Cyber ethics D. Cyber space
____23. Sending personal information like your mom’s credit card number or full name by emails is okay if….
A. It is to a well-known company C. It is to my family
B. It is to my school D. None of these
____24. Sending personal information like a what state you live in or your birth date by text message is okay
if…
A. It is to a good company C. It is to your bag
B. It is to your parents D. None of these
____25. Which username tells too much about the person?
A. Joebrown2008 C. Paperbag2222
B. Goldfish23 D. Happyzebra8
____26. Jules has walked away from a computer without logging off. Trish sits down and, still logged in as
Jules, sends bad e-mail messages out to her contacts. Which rule is she violating?
A. Thou shall not use a computer to harm other people
B. Thou shall not use other people’s computer resources without authorization
C. Thou shall use a computer in ways that show consideration and respect.
D. Thou shall not use a computer to steal
____27. What should you do if you feel uncomfortable online?
A. Tell a teacher or parent
B. Use online strategies to handle the situation
C. Tell the other person to leave you alone
D. Use social media to make them stop
____28. When it is okay to share your full name online?
A. Never C. Never
B. If someone asks you
____29. What would you do it if someone you don’t know sent you an email or an instant message asking for
your address or phone number?
A. Give them a fake address C. Delete the email
B. Respond and tell them no. D. Tell an adult
____30. If someone is getting cyber bullied what should you do?
A. Tell an adult C. Walk away
B. Laugh D. Join in
____31. You can share your password with the following people:
A. Your best friend C. Your teacher or parents
B. Your neighbor D. Your mailman
____32. What should you do to create a positive digital foot print?
A. Create a username that does not reveal your identity
B. Share your full name and private information like your birth date
C. Post photos and comments about every funny thing you do
D. Lie in your profile to make yourself sound more impressive
____33. When you meet people online, what should you watch out for?
A. They are rude C. They talk about inappropriate things
B. They ask personal questions D. All of the above
____34. Why should you be careful about what you open and download on the internet?
A. It could be something inappropriate
B. It could have a virus that harms your computer
C. It could steal information from your computer
D. All of the above
____35. What do you do if you see of hear about someone getting cyberbullied?
A. Be a bystander C. Just watch
B. Go to a adult or teacher and seek help D. Be a person that’s doing it
____36. Which of these is NOT correct way to end cyberbullying?
A. Block people C. Reach out for help
B. Don’t do anything about it. D. Protect your accounts
____37. What are some good things you can do if you are being cyber bullied?
A. Become a cyber bully yourself C. Go outside and start yelling
B. Keep the information to yourself D. Tell a trusted adult (could be a teacher a parent or an adult friend)
____38. What sites can be used for cyber bullying?
A. Snapchat C. Facebook
B. Instagram D. All of answers
____39. Is cyber bullying a big problem all around the world?
A. NO B. YES
____40. What percentage of teens around the world have been cyber bullied?
A. 43% C. 16 %
B. 22% D. 84%
____41. Kids who are cyber bullied are more likely too:
A. Skip school C. Have health problems
B. Get bad grades D. All of the above
____42. Which of the following is NOT a good way to handle cyber bullying ?
A. Ignore or block the person C. Get in a fight with the person at school
B. Tell your parents or a teacher D. Save the messages as evidence
____43. Which of the following text messages would most likely be an example of cyber bullying?
A. Party at tim’s house tonight! 8pm C. Don’t tell Rita about Tim’s Party!
B. I disagree.I like math! D. Wear the red sweater. A looks best!
____44. Which of the following is a factual statement about cyber bullying?
A. Cyber bullying is the biggest problem that young people face.
B. Cyber bullying should be outlawed.
C. Cyber bullies are mean people.
D. Cyber bullying can make people feel bad.
____45. Why should you never send emails, texts, or IMs when you’re angry or upset?
A. You may not have the best judgement when your emotions are running high.
B. The person you’re communicating with won’t respect you if you’re not calm.
C. It isn’t easy for people to tell your emotional state online.
D. Nobody really cares about how you feel.
____46. Mark figured out his teacher’s password to find a way to change his grades to 100’s. What is the
ethically correct thing for him to do?
A. Tell the teacher so she may change it.
B. Give the password to all the other students.
C. Use the password to all the other students
D. Keep it to himself, if someone else figures out the password it is not his problem.
____47. John figure out his teacher’s password to her email account. What is the ethically correct thing for him
to do?
A. Tell the teacher so she may change it.
B. Give the password to all the other students.
C. Use the password to change his grades.
D. Keep it to himself, if someone else figures out the password it is not his problem.
____48. Is it alright to have a site remember your password?
A. No C. Yes, if its your private computer
B. Yes D. No, it can always be a risk
____49. It is okay to do which of these:
A. Use someone else computer far harm C. Download illegal music and movies
B. Use a computer to steal D. All are bad
____50. Julie just figured out her best friend downloads illegal movies. As a friend, what should you do?
A. Tell her its a bad idea and she could get into trouble, and do not get involved.
B. Help her download illegal movies, the odds are shall that you will get caught.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy