FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Christina is on social media. She sees that many other students from her school are targeting the new foreign exchange student, who is also on the same social media. They are making fun of his clothes, haircut and accent. She decides to stand-up for the student hoping that the other students realize that they are cyberbullying. What are Christina’s actions an example of?
A
Upstander
B
Cyberbully
C
Cyber-safety
D
Netiquette
Explanation: 

Detailed explanation-1: -Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets, posts, or messages all count. So does posting personal information, pictures, or videos designed to hurt or embarrass someone else.

Detailed explanation-2: -Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user.

Detailed explanation-3: -Which statement is true about mobile devices and your personal information? Mobile devices cannot be lost or stolen so your information is secure in them. Mobile devices must be protected because they contain private information about the owner.

Detailed explanation-4: -What is one thing that James can do to be sure he is practicing cyber-safety? He should never disclose personal information.

There is 1 question to complete.