COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
An online predator can use your personal information to make purchases in your name, pretend to be you when communicating with others, and sign you up for online services.
A
True
B
False
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -Online predators are internet users who exploit children and teens for sexual and violent purposes. This may include child grooming, engage in sexual activities, unwanted exposure of materials and pictures, online harassment, threats to cause fear or embarrassment.

Detailed explanation-2: -The key here is power and control – online predators seek to exert control over their victims. From monopolizing the child’s time to shaming the child into providing explicit images, the predator moves the relationship from emotionally dependent to emotionally controlling and abusive.

Detailed explanation-3: -A predator will often start asking for pictures of their target and may request to video chat with their target in private. Eventually, the predator will start making sexual comments to their target. Predators will also tell their target to lie.

There is 1 question to complete.