Provide at least five different suggestions for how to protect your privacy online.
What will be an ideal response?
Do not publish or post personal information, such as your home address, passwords, Social Security number, phone number, or account numbers.
Do not submit data to a social networking site until you've read its privacy policy and have made sure that you can remove your data when you no longer want to participate.
If asked for personal information, verify the Web site is legitimate, or make a phone call to confirm that you have to submit the information, and then confirm that the information will be securely transmitted and stored.
Avoid financial transactions when using a public computer. Never click the save my password box and make sure you log out from password-protected sites.
Be wary of contacts you make in public chat rooms and on social networking sites.
Never use a password-protected Web site on a public computer that doesn't give you the option to save the password.
You might also like to view...
To access the element in row r and column c, C++ uses the formula (COLS and ROWS are constant integers):
a) ROWS * c + r b) COLS * c + r c) ROWS * r + c d) COLS * r + c
b) The process of instructing the computer to solve a problem is called _________.
Fill in the blank(s) with the appropriate word(s).
The MID function returns a specified number of ________ starting from a specified position in the data
Fill in the blank(s) with the appropriate word(s).
Most attacks can be recognized as one of the following three broad categories: intrusion, denial of service, and malware
Indicate whether the statement is true or false.