With the advancement of technology, many people are taking advantage of it in many ways. In this case the talk about social cybersecurity which tends to be the control and spread of certain information that can have an impact on the people. As it is said in the...
I answered yes to 3/9 questions on the social disorder scale. I believe that the items in the scale could maybe be more simplified and specific. They seem to target more of like a person who is addicted to social media. It gave me the sense that I do not really let...
For the most part after watching the video on the 12 different hacking scenes, I would say that although they use a lot of real-world scenarios most of it is kind of portrayed in a bad way. In one of them, they are like going through a computer and just plugging...
I would personally say that with all of the ten images presented had one thing in common. That is the use of technology presented in many different forms, places, and different uses. Some in a place of work some in a place of comfort like home or with loved ones and...
For this, I looked up “examples of fake websites for students” on Google and found a website that displayed four different fake websites. What stuck out to me about the sites was that they did not look very well made as this may not be for all but in appearance, most...
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept