Computer Science  >  QUESTIONS & ANSWERS  >  Code-HS Unit 1-12 Questions and Answers Already Passed (All)

Code-HS Unit 1-12 Questions and Answers Already Passed

Document Content and Description Below

Code-HS Unit 1-12 Questions and Answers Already Passed Cyber-security ✔✔the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achiev ... e this. Why is it important to learn about Cyber-security? ✔✔So we learn how to protect our information/data from being leaks. What is not true about Cyber-Security? ✔✔Cyber attacks can devastate large organizations, but individuals are largely unaffected. Cyber ✔✔Meaning dealing with computers or computer network. Security ✔✔Measure taken to guard against spying or destructive actions. CIA triad? ✔✔Confidentiality, integrity, and availability. Which are the elements of the information system that each organization is trying to protect. Confidentiality? ✔✔Protection of online information. Ex. Financial information, health records,and government documents. Integrity? ✔✔ensuring that information is protected from unauthorized or unintentional alterations. Availability ✔✔the assurance that systems and data are accessible by authorized users when and where needed. Read the following scenario. Using complete sentences, explain which part of the CIA triad has been broken. Make sure to explain your answer. Cynthia is working on her college applications online, when the admissions website crashes. She is unable to turn in her college application on time. ✔✔Availability, (Your Reasons) Read the following scenario. Using complete sentences, explain which part of the CIA triad has been broken. Make sure to explain your answer. Tony gets his phone bill in the mail. The bill was supposed to be for $80, but the mail person spilled water on the bill, smearing the ink. The bill now asks for $8. ✔✔Integrity, (Your Reasons) Read the following scenario. Using complete sentences, explain which part of the CIA triad has been broken. Make sure to explain your answer. Kim takes her college admissions test and is waiting to get her results by email. By accident, Kim's results are sent to Karen ✔✔Confidentiality, (Your Reasons) Read the following scenario. Using complete sentences, explain which part of the CIA triad has been broken. Make sure to explain your answer. Rob opens his fitness tracking app to start logging a workout. The app crashes, and he is unable to log his workout. ✔✔Availability, (Your Reasons) "Digital Footprint?" ✔✔the information about a particular person that exists on the Internet as a result of their online activity. What should you do to limited your Digital Footprint? ✔✔Think before you post and Turn on Privacy settings. (True or False.)The information about a particular person that exists on the Internet is a result of only a portion of their online activity. Some things don't matter or are not part of a person's digital footprint. ✔✔False, (Your Reasons) "Right to be forgotten"? ✔✔To exercise the right to be forgotten and request removal from a search engine What can Victim experience from cyberbullying ✔✔Isolation low self esteem, and depression cyberbullying? ✔✔the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. What should you do when you're being cyberbullied? ✔✔Don't Respond to them Keep record of what he says to you Reach out to an trusted adult Block the bully How to be an Upstander ✔✔Reach out to the victim of Cyberbully and Don't bully the person who is being bullied (Consider the following) Andrea starts receiving messages and public posts on social media from a group of students. These posts accuse her of spreading rumors about another student, which she knows she didn't do. Everyday, she receives more messages and posts. (How should Andrea respond to this situation?) ✔✔Tell an adult or talk to them upfront What should you do online? (On the internet/social media) ✔✔Be wary when communicating with people you don't know in real life. Don't disclose personal information--even if it doesn't seem important. block/report if you are being harassed. Asked a trusted adult if you need more help. True or false: The internet is a great place to socialize, and because it is completely online, everyone is safe. ✔✔False You begin to receive direct messages on Instagram from a person you don't recognize. They claim to go to your school, and they know a lot of information about your classes and teachers. They also follow a lot of your classmates, so you believe them. After a bit, they start asking questions about you and your friends. What steps should you take to respond to this situation? ✔✔Talk to a friend to see if the same thing is happening to them too .After that if they don't know him then report him and block him/her. How do I keep my personal data secure and private? ✔✔Create a Strong Password containing 8- 20 characters (With symbols) and a "2 factor authentication" which is basically extra security. (True or False) By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no matter what. ✔✔False. It depends if the privacy policy allows you to opt in or out of sharing data. Information Literacy? ✔✔Is having the ability to find information, evaluate information credibility, and use information effectively. Felipe is trying to find information on wind power in Germany. Which of the following would be the most effective search query for this? (Search Engine) ✔✔"wind power" +Germany visualization data? ✔✔Using charts, Graph, or images to visualize complex data (Ex. A graph for students) (Consider the following) Suppose you want to make a visualization that shows how many students bought certain quantities of candy from the vending machine during the month of September. Of the choices below, which chart would best convey this information to the person looking at the graph? ✔✔Histogram What are some ways to collect data? ✔✔-Naturalistic Observation - Surveys/ questionnaires - Systematic observation -Archival Data data limitations? ✔✔are what we can conclude from examining data and data visualizations. copyright? ✔✔the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same. 3 types of copyrights? ✔✔All right Reserved Some rights reserved Public Domain "Rights Reserved"? ✔✔Creator Reserved all Rights (most strictest right/rules) "Rights Reserved"? ✔✔Creator May allow for things like reuse or modifications as long as they are cited as the creator "Public Domain"? ✔✔Creator has dedicated the work to the public domain and waived all rights. Why is it important to follow copyright license rules? ✔✔So that people dont steal your creative ideas "White Hat" hacker? ✔✔It basically a person who has permissions to hack a system hired to penetration testing (A legal job under government supervisions) "Black Hat" hacker? ✔✔Hacker that break into security network to destroy, modify, or steal data, ( It not legal and so their basically criminal ) "Gray Hat" hacker? ✔✔Hack Without permission--oftentimes illegally Once Vulnerabilities are found they will request payment. penetration testing? (For Hacking?) ✔✔Their testing your software to see what you need to protect your software before someone actually hacks in. (This is a legal "White Hat" Hackers who does this job.) What does your Data Privacy need in a transparent society? ✔✔Need for security Personal security Organizational security Consider things that you feel are best kept secret. If you really want to keep something secret, how do you about doing that? (In society) ✔✔Make sure you don't have an online present or by putting you social media to private. "OWASP" stand for? ✔✔Open Web Application Security Project [Show More]

Last updated: 2 years ago

Preview 1 out of 10 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of Code-HS Unit 1-12 Questions and Answers Already Passed document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Also available in bundle (1)

Click Below to Access Bundle(s)

Code HS Bundled Exams Questions and Answers with Complete Solutions

Code HS Bundled Exams Questions and Answers with Complete Solutions

By Nutmegs 2 years ago

$25

18  

Reviews( 0 )

$10.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

150
0

Document information


Connected school, study & course


About the document


Uploaded On

Apr 13, 2023

Number of pages

10

Written in

All

Seller


Profile illustration for Nutmegs
Nutmegs

Member since 4 years

607 Documents Sold

Reviews Received
77
14
8
2
21
Additional information

This document has been written for:

Uploaded

Apr 13, 2023

Downloads

 0

Views

 150

Document Keyword Tags


$10.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·