FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Cecilia has been told that anything she posts online is traceable. Her teacher explains that the information about herself that she posts for anyone to obtain could be damaging to her:
A
social media.
B
digital footprint.
C
cyberbullies.
D
log-in information.
Explanation: 

Detailed explanation-1: -Why should Elsie be cautious about the messages and images she posts online? Because posts can exist forever.

Detailed explanation-2: -Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user.

Detailed explanation-3: -Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets, posts, or messages all count. So does posting personal information, pictures, or videos designed to hurt or embarrass someone else.

Detailed explanation-4: -With Windows 10 and 11, Microsoft Defender Offline is built in to the operating system and can run from Windows Security. It is provided as a separate download for previous versions of Windows.

There is 1 question to complete.