FUNDAMENTALS OF COMPUTER

WEB BROWSERS TECHNOLOGY

THE INTERNET

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following would pose the greatest threat to a user’s personal privacy if it were to be leaked to the public?
A
The IP address of the user’s computer
B
The user’s browser cookies
C
The user’s email address
D
The user’s public key used for encryption
Explanation: 

Detailed explanation-1: -Which of the following best explains what happens when a new device is connected to the Internet? An Internet Protocol (IP) address is assigned to the device.

Detailed explanation-2: -Which of the following best describes whether these two computers can communicate with each other across the Internet? The computers can communicate directly because Internet communication uses standard protocols that are used by all computers on the Internet.

Detailed explanation-3: -An Internet Protocol (IP) address is a unique number assigned to every device on a network. Just as a street address determines where a letter should be delivered, an IP address identifies computers on the Internet.

Detailed explanation-4: -Unethical use of computers can be defined as downloading songs, movies, software’s and etc from the internet illegally. This also includes violating copyright and plagiarism; using someone else’s work as your own without giving any credit to the original author.

There is 1 question to complete.