technology for success
How is a worm different from a Trojan
A worm spreads through a network whereas a Trojan hides inside another program
which is the first step to deter thieves from accessing your financial information?
DO NOT provide personal info over the phone or through email.
Ransomware to unlock her computer
Isabelle received a message on her computer that appeared to be from the FBI. it stated that she had been locked out of her computer, and needed to pay a fee to retrieve her data. what is happening?
How does encryption work?
It scrambles data as it travels over the internet so hackers cannot access it
what is a digital certificate?
Technology used to verify a user identity.
Ergonomics
The study of workplace equipment design or how to arrange and design devices, machines, or workspace so that people and things interact safely and most efficiently.
Cyberbullying
after penny broke up with her boyfriend, he text some teammates from the track team about private intimate moments they shared.
What would a password manager allow you to do?
create and store strong passwords
in which real life situation would it be useful to use digital certificate?
if you were signing a rental lease.
you can configure your wireless router to protect your device in all of the following ways EXCEPT
name your router something you'll remember like your street address
with more and more people using technology, what physical health diagnosis on the rise?
repetitive strain jnjury
you can monitor and protect your financial data in all of the following ways EXCEPT
requesting a credit report and freezing your credit.
Phising
the activity of defrauding an online account holder of financial information by posing as a legitimate company. (if a attacker convince you to enter personal information on a imposter website like a employee or bank.)
How can you protect a computer from electric spikes and surges
use a surge protector
Trojan
A program disguised as a harmless application that actually produces harmful results. (Emma downloaded a new game from an unfamiliar website. a few days later Emma realized her system had been hacked & her credit card # was stolen . malware