FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Alejandro notices that the guys are huddled in the school courtyard. He walks over and sees that one of the guys has been sexting images via mobile phone with a girl from another school. Everyone is checking it out. He does not want to be involved in this type of exchange because:
A
he does not want to get in trouble with the law.
B
his family would not be proud.
C
he does not want to use cyber-safety.
D
he has secure passwords on his phone.
Explanation: 

Detailed explanation-1: -Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user.

Detailed explanation-2: -Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets, posts, or messages all count. So does posting personal information, pictures, or videos designed to hurt or embarrass someone else.

Detailed explanation-3: -In a detection-based strategy, a company’s security team proactively works to identify and remediate threats that have breached the organization’s defenses. Prevention-based security is the more common approach, and, in the past, it was very effective.

Detailed explanation-4: -Which statement is true about mobile devices and your personal information? Mobile devices cannot be lost or stolen so your information is secure in them. Mobile devices must be protected because they contain private information about the owner.

There is 1 question to complete.