Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Assessment task 6:

1.
For me platform is too useful of ours in the time of pandemic before and is it because. Since
people can now access official information, sign up for online courses, apply for jobs online,
send mobile money, and even receive telemedicine—regardless of where they live—digital
platforms aid in the construction of more pandemic-resistant societies. Technology has made
education easy and today we have multiple options to clear our doubts. Easy access to the
internet and other helping apps has made education easy as well as interesting. These
gadgets also save time and energy. Any device which is helpful in educating self is a student-
friendly technology. Prior to the pandemic, having access to computers and the internet was
crucial for education, serving as a resource for word processing, research, and communication
after school hours or even as the main method of instruction. However, during the 2020–21
school year, these resources became crucial for students to stay engaged. Students may now
find information more quickly and correctly thanks to technology. Traditional textbooks are being
partially replaced by search engines and electronic texts. Instead of private tutors, students can
receive one-on-one assistance anytime, anywhere, and through MOOCs (massive open online
courses).

2.

Artificial intelligence, or AI, and machine learning refer to the ability of machines to learn and act
intelligently, meaning they can make decisions, carry out tasks, and even predict future outcomes based
on what they learn from data. So much so that implementing faster connections in “mobility,
healthcare, manufacturing and retail could increase global GDP by $1.2 trillion to $2 trillion by 2030.” 5G
and IoT will be one of the most-watched tech trends for the next decade. Over the next ten years,
virtual reality might take the role of textbooks. By 2025, smartphones will be outdated. Within the next
ten years, self-driving cars may be commonplace. In 20 years, 3D printing might be utilized to build more
homes.

Assessment task:

1.

1.Keep personal info personal.

2.Keep personal info personal. Choose a “strong,” secure password/use different passwords on all your
different social media accounts.

3.Avoid logging into public computers or using friends' phones to log in to your social media accounts.

 Limit the personal information you share on social media.


 Browse in incognito or private mode.
 Use a different search engine.
 Use a virtual private network.
 Be careful where you click.
 Secure your mobile devices, too.
 Use quality antivirus software.

Good privacy settings help ensure that you have control over who you
'friend'. ... Not sharing the password, setting your profile to private and not
accepting friend requests from random people are good standard practices.

2. What information should you not post on a social networking site? Give at
least three examples.

Example 1: You should therefore avoid sharing information that's used to


verify your identity, such as your full date of birth.

Ex 2: Never share photos of your driver's license, passport, or credit card,


which contain personal information that you don't want to make public.

Example 3: Keep private details like your home address, credit card number,
and phone number to yourself. Your identity being stolen is made easier the
more posts you make.

Learn the terms of service for the social media platforms you use to regulate
your privacy, then personalize it to restrict who may view what. Therefore, you
should refrain from disclosing details that can be used to confirm your identity,
such as your complete date of birth. Never share pictures of your credit card,
passport, or driver's license because they contain private information that you
don't want to be made public. And because If cybercriminals have access to
your personal information, they can pretend to be you. In order to obtain
private and sensitive information for malicious purposes, they target people's
social media accounts. You'll encourage these online criminals to commit
business fraud in your name if you share too much personal information
online.

3. answer:

Ex 1: Read the article you're sharing from someone else.

Example 2: Research proper posting etiquette for each platform.

Example 3: Research your hashtags. Know your audience.

And also, in order to prevent the spread of false information and its negative
effects, it is essential to consider your actions before posting and to be aware
of the supporting documentation for the content you are sharing. If you notice
someone posting false information, you can assist them as well.

Assessment task

AT 7 scenario

Scenario 1: answer

Decline the request and remind your supervisor that it is against UC policy. And because user-ID’s and
passwords must not be shared. If pressured further, report the situation to management, the ITS
support Center or the Whistleblower Office.

Scenario 2: answer

This email is example of “phishing” – trying to trick you into “bitting”. They want your information. Don’t
respond to email, instant message (IM), text, phone calls, etc.., asking you for your password or other
personal information. You should never disclose your password to anyone, even of they say they work
for UCSC, ITS< or other campus organizations.

Scenario 3: answer

D - Delete the message:


This one has four big risks:

1. Some attachments contain viruses or other malicious programs, so just in general, it’s risky to open
unknown or unsolicited attachments.

2. Also, in some cases just clicking on a malicious link can infect a computer, so unless you are sure a link
is safe, don’t click on it.

3. Email addresses can be faked, so just because the email says it is from someone you know, you can’t
be certain of this without checking with the person.

4. Finally, some websites and links look legitimate, but they're really hoaxes designed to steal your
information.

You might also like