Key Words for Online Safety

Year 1

Log in
Using a username and password to access a system.

Username
A name that is used by a person to access an online site.

Avatar
A digital picture to represent someone. 
Log out
Leaving a computer system.

Tools
The area on Purple mash with different learning apps.

Password
A series of letters, number and special characters entered after your username to access an online site. In Purple Mash this could also be a sequence of images.

My work
The place on Purple Mash where your work is stored. Only you and your teachers can access this.
Notification
A system that lets you know if you havesomething to look at. On Purple Mash, this is shown by a bell.
Topics
The area on Purple Mash that contains ready made reasources.
Save
Store your work as you create something so it can be accessed at a later time or date.


Year 2

Button
An objecy on the screen that can be clicked on.

Event
Something that causes a block of code to be run.

Key pressed
Pushing down a key on the device's keyboard. 

Collision detection
Detecting when two characters on the screen touch eachother.

Debug/Debugging
Looking for any problems in the code, fixing and testing them.

Action
Types of commands which are run on an object. They can be used to move an object or change a property.

Algorithm
A precise step by step set of instructions used to solve a problem or achieve an objective.
Background
The part of the program design that shows behind everything else. It sets the scene for a story or game.

Design mode
Used to create the look of a 2Code computer programme when it is running.

Nesting
When you write a command inside something else e.g. a block of commands could be nested inside a timer.


Year 3

Website
A set of related web pageslocated under a single name.

Webpage
A page that makes up one screen of a website.

PEGI rating
A rating that shows what age a game is suitable for.

Spoof website
A website that uses dishonest designs to trick users into thinking that it represents the truth.

Concept map
A diagram that shows how different objects or ideas are related and connected.
Username
An identification used by a person with access to a computer, network or online service.

Password
A secret word, phrase or combination of letters, numbers and symbols that must be used to gain access to a site or application.

Internet
A global computer network providing a variety of information and communication facilities, consisting of interconnected networks and computers.
Blog
A regularly updated website or web page typically one run by an individual or small group, that is written in an informal or conversational style.


Year 4

Email
Messages sent by electronic means from one device to one or more people.

Copyright
When the rights to something belong to a specific person.
Identity theft
When a person pretends to be someone else.
Plagiarism
When you use someone else's words or ideas and pass them off as your own.
Digital footprint
The information about a person that exists on the internet as a result of ther online activity.

Computer virus
A piece of code which can copy itself and typically has a damaging effect on the device, such as corrupting the system or destroying data.

Cookies
A small amount of data generated by a website and saved by a web browser. Its purpose is to remember information about the user. 
Malware
Software that is specifically designed to disrupt, damage or gain unathorised access to a computer system.
Spam
Messages sent over the internet, typically to many users for the purpose of advertising, phising or spreading malware.
Phishing
Practise of sending email pretending to be from reputable companies in order to pursuade individuals to reveal personal information, such as passwords and credit card details.


Year 5

Online safety
refers to staying safe when having a presence online.

Reputable
Having a good reputation.
Shared image
A picture that is shared online for other people to see.
Password
A string of characters that allows access to a computer system or service.

Bibliography
A list of all the books and articles used in a piece of work.

Reference
A mention of a source of information in a book or article including online.
Plagiarism
The practice of taking someone else's work or ideas and passing them off as your own.
Smart rules
A set of rules based around the word SMART designed to help you stay safe when online.

Encryption
The process of converting information or data into a code, especially to prevent unathorised access.

Identity theft
The practice of using another persons name and personal information in order to obtain credit, loans etc.
Citations
A quotation from or reference to a book, paper or author especially in an academic work.
 


Year 6

PEGI rating
A rating that shows what age a game is suitable for.

Password
A string of characters that allow access to a computer system or service.
Screen time
Time spent using a device such as a computer, television or games console.

Spoof website
A website that uses dishonest design to trick users into thinking that it represens the truth.

Digital footprint
The information about a person that exists on the internet as a result of their online activity.
Phishing
The practice of sending emails prentending to be from a reputable company in order to pursuade individuals to reveal personal information such as passwords and credit card information.