FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
While Maria was visiting an online chatroom, she receives the following message:"Hi, I’m Holly and I’m 12 years old. I live in Cape Coral, Florida. Where do you live?"What should Maria do?
A
Maria should delete the message and not disclose any personal information.
B
Maria should be polite and introduce herself by giving her name, age and city where she lives.
C
Maria should give a fake name and say she lives in the same city as Holly, even though she doesn’t.
D
Maria should respond angrily that she thinks “Holly” is a fake, using foul language to scare the person away.
Explanation: 

Detailed explanation-1: -Spyware is a type of program that is installed with or without your permission on your personal computers to collect information about users, their computer or browsing habits tracks each and everything that you do without your knowledge and send it to remote user.

Detailed explanation-2: -Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets, posts, or messages all count. So does posting personal information, pictures, or videos designed to hurt or embarrass someone else.

Detailed explanation-3: -Why should Elsie be cautious about the messages and images she posts online? Because posts can exist forever.

Detailed explanation-4: -Which statement is true about mobile devices and your personal information? Mobile devices cannot be lost or stolen so your information is secure in them. Mobile devices must be protected because they contain private information about the owner.

There is 1 question to complete.