A0 Solutions - Word Matching Exercise

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

KS4 – Online safety Learner activity sheet

Lesson 1 – An introduction to online safety

Online safety word matching exercise


solutions
Introduction
Can you match the key terms about online safety to their definitions?

Big data Large data sets that are


analysed in order to identify
patterns and trends, often used
by organisations to better
understand their customers

Targeted advertising Adverts that are tailored to the


buying history, demographic
data, and behaviour of the
customer

Fake news News that contains deliberate


disinformation

Online reputation The reputation of a person,


company, or product created by
the content they produce and
the way they behave online

Data analytics Techniques used to extract


meaning from data, often with
the objective of improving a
company’s productivity

Phishing scam A scam conducted by sending


fraudulent emails disguised as
communication from reputable
companies that ask the receiver
to reveal personal information

Malware Malicious software that is


designed to break into and/or
harm a computer system

Virtual private network A network that operates using


public infrastructure but uses

Page 1 Last updated: 16-06-21


KS4 – Online safety Learner activity sheet
Lesson 1 – An introduction to online safety

security mechanisms such as


encryption to restrict access to
authorised users

The Dark Web Websites that are hosted on the


Dark Net and therefore are not
indexed by search engines and
can only be accessed through
specific software

Encryption A process of converting data


into code in order to protect
information and prevent
unauthorised access

Filter bubble A phenomenon created when


the algorithms in online spaces
such as search engines and
social media platforms
predominantly only provide
users with content that they
agree with and do not expose
them to different ideas or
opinions

Right to privacy The rights one has, under the


law, to keep data about oneself
confidential

Right to access The rights one has, under the


law, to create, share, and access
information

Digital personality The persona created from the


content you have shared online

Personally identifiable Any information that can,


information (PII) either by itself or in
combination with other data,
uniquely identify you

Censorship The suppression, prohibition,


or withholding of information
that is considered unacceptable
or dangerous, for example

Page 2 Last updated: 16-06-21


KS4 – Online safety Learner activity sheet
Lesson 1 – An introduction to online safety

because it is obscene or a threat


to national security

Online hate crime A crime that occurs online that


is motivated by hate or
prejudice towards someone
because of their race, religion,
disability, sexual orientation, or
gender identity

Obscene content Content that is considered to be


depraved or has the potential to
corrupt, potentially because it
depicts illegal acts or is
sexually explicit

Page 3 Last updated: 16-06-21


KS4 – Online safety Learner activity sheet
Lesson 1 – An introduction to online safety

Resources are updated regularly — the latest version is available at: ncce.io/tcc.

This resource is licensed under the Open Government Licence, version 3. For more information on this licence, see
ncce.io/ogl.

Page 4 Last updated: 16-06-21

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy