Page 59 - CodePilot V5.0 C8
P. 59
Ethics
Follow laws, give credit for others’ work and avoid plagiarism or cheating.
Act with honesty and fairness in all digital interactions.
Awareness
Understand how a digital footprint can affect your reputation and future.
Think before posting or sharing anything.
21 st
EXPERIENTIAL LEARNING Century #Productivity & Accountability
Skills
Students track their online activities for a week and analyse the data they leave behind and discuss
with each other how it affects their digital reputation.
HACKING
1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
0
1
1
1
1
1
0
1
0
0
0
1
1
0
0
1
0
1
0
1
0
0
0
1
1
0
0
0
1
0
0
1
1
1
0
1
1
1
0
0
1
0
1
0
1
1
0
0
0
0
1
1
0
1
0
1
0
0
0
0
1
0
1
1
1
0
1
1
1
1
1
0
0
1
1
1
0
1
1
Hacking is when someone tries to access a computer, 1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 0
0
0
0
0
1
1
1
1
0
1
1
101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
0 11
0
1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
100101
network or online account by bypassing security 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 10 111
1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
0010
1
11
1
101
0
010
101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 1 10 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
00
1
010
11
10
11
1
00
10
111
0 PASSWORD
LOGIN
1
1
0
1
0 00 11 11 11 11 0
1
1 111000101010 10 100101 0101 01 1 0 1 0 1 0 0 1 1 0 1 1 0 0 1 0 1 0 1 0 111 11 1 000 00 0 1 1 1 0 1 1 0 00 0 0 0 1 1 1 1 1 1 1 1 0
0
1
0
1010 1001101100 10 101010 1010
0
00
1
1
1
1
1
1
0
0
10
111
1
00
010
00
11
measures. Sometimes hacking is done to identify and 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 001 010 10 111 11 1 0 0 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
100101
0
0
0110
1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
00111
01
00
0101
10
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
1
1
1
1
0
0
1
1
0
0
0
0
1
1
0
0
1
0
1
1
0
1
1
1
1
1
0
0
1
1
1
1
1
1
1
1
1
1
1
1
0
0
1
1
0
0
1
1
1
1
1
1
1
1
1
0
0
1 1 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0 0 0 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0 0 0
1
1
1
0
0
1
0
0
11
01
010
0
1
1
1
0
1
10
11
1
1
1
1
1
1
1
0
1
0
0
0
0
1
1
110
0
1
0
0
0
0
0
fix security problems; this is called ethical hacking. 1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
0
0
1
1
1
1
1
0
1
0
1
1
1
1
0
1
1
0
1
0
1
1
0
1
0
0
1
0
0
0
1
1
1
1
0
1
1
0
0
0
1
0
0
1
1
0
1
1 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 1 1010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0 0
0
1
0
0
0
1
0
0
0
1
0
1
1
1
1
0
0
1
1
1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
0
1
1
0
1
1
1
0
1
0
0
0
0
1
1
0
0
0
0
1
1
1
1
1
1
0
1
1
1
1
1
0
1
1
0
1
0
0
1
1
0
0
0
0
1
1
0
0
0
1
1
1
1
1
1 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 1 11 11 11 0 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0 0
1
1
0
0
0
1
1
1
0
0
1
0
1
1
0
1
0
1
0
0
1
0
1
1
1
1
1
1
Other times, it is used to steal data or cause harm, 1110001010100 10 100101 0101 01010 100110110 1 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 0
0
1
0
1
1
0
0
0
0
1
1
1
1
1
0
1
0
0
1
0
0
1
1
1
0
1
0
1
1
0
0
0
0
0
0
1
1
0
1
0
0
1
1
1
0
0
1
1
1
1
1
1
0
1
0
1
1
1
0
0
1
0
0
0
0
101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 01010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
which is illegal. 1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 0
0
1
0
0
0
0
0
0
0
1
1
1
1
1
1
1
1
0
0
1
1
1
1
0
0
1
0
1
0
0
1
1
0
1
0
0
1
1
1
0
1
1
1
0
1
1
0
0
0
1
1
0
1
0 0 00 00 11 11 11 11 0
1
0
0
0
1
0 010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
1
0
1
0
1
1
0
1
1 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0
1
0
1
0
0
1
1
1
1
0
1
1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
As a digital citizen, always act responsibly, respect 1110001010100 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 0
CONFIDENTIAL
101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0
1110001010100
00000
0000000 10 100101 0101 01010 1001101100 10 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 00 00 11 11 11 11 0
0
00 00 0
0 00 00 0 000 00
000 000 0 000 00
0
0
11
1
1
1
1
1
0
11
1
0
0
0
1
1
1
1
0
1 101010 1010 101 010 10 111 11 1 00 00 1 1 1 0 1 1 0 00 00 11 11 11 11 0 101010 1010 101 010 10 111 11 1 00 00 0 1 1 1 0 1 1 0 0 0
0
0
1
0
1
1
1
1
0
1
0
10
0
1
0
1
010
1
1
0
1
1
11
1
1
1
11
0
1
1
1
00
0
0
1
11
1
0
0
1
1
0
1
0
1
1
0
0
1
1
0
1
1
0
0
1
1
0
00
0
0
1
1
1
1
0
00
0
1
0
00
0
0
1
1
0
0
1
0
1
1
1
1
0
1
0
privacy, follow rules and keep your information secure.
TYPES OF HACKING
Hacking can be done in different ways depending on the hacker’s purpose and methods.
Understanding these types helps you learn how hacking affects online safety and security.
Black-hat Hacking (Malicious Hacking)
Black-hat hackers break into computer systems or networks without permission
for harmful or illegal purposes, such as to steal data, money or damage
websites and systems. For example, a hacker stealing credit card information
from an online store.
Update apps, devices and
The Dark Web hosts 70% of illegal activities linked to software to avoid security risks
black-hat hacking. and prevent hacker access.
57
AI, Ethics and Online Awareness

