FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Gale has been seeing many hurtful messages about her friend Bob on a popular social networking site. The messages have spread all over her school. What should Gale do?
A
Gale should ignore the messages.
B
Gale should speak to someone in authority.
C
Gale should tell Bob about the messages.
D
Gale should discuss the messages with her friends.
Explanation: 

Detailed explanation-1: -Gale has been seeing many hurtful messages about her friend Bob on a popular social networking site. The messages have spread all over her school. What should Gale do? Gale should speak to someone in authority.

Detailed explanation-2: -Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets, posts, or messages all count. So does posting personal information, pictures, or videos designed to hurt or embarrass someone else.

Detailed explanation-3: -Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user.

Detailed explanation-4: -Which of the following is a type of cyber security? a) Cloud Security b) Network Security c) Application Security d) All of the above View Answer Answer:d Explanation: Since technology is improving, the threat and attacks against the technology are also increasing.

Detailed explanation-5: -Answer: B) DOS attacks can be considered a class of computer threats.

There is 1 question to complete.