COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Only add ____ friends to your social media accounts and restrict access to your online profiles.
|
secret
|
|
school
|
|
respected
|
|
trusted
|
Explanation:
Detailed explanation-1: -With the large amount of data on user social media accounts, scammers can find enough information to spy on users, steal identities and attempt scams. Data protection issues and loopholes in privacy controls can put user information at risk when using social media.
Detailed explanation-2: -Tip #1 Use Strong, Unique Passwords. Tip #2 Use Two-factor Authentication. Tip #3 Beware of Phishing Scams. Tip #4 Revoke Access to Third-party Apps. Tip #5 Use Geotags Wisely. Tip #6 Take Care of Your Social Media Accounts. Check Your Facebook Privacy Settings. Let’s See How Secure Your Twitter Profile Is. Tip #7 Use a VPN. 19-May-2018
There is 1 question to complete.