0% found this document useful (0 votes)
88 views4 pages

Chapter 5 Digital Citizenship-Consolidation Gr8

Uploaded by

Putela
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views4 pages

Chapter 5 Digital Citizenship-Consolidation Gr8

Uploaded by

Putela
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Digital Citizenship Consolidation activity Gr8

https://www.bbc.com/news/technology-53425822
https://www.socialmediatoday.com/

Although this article is about celebrities and high-profile users that were targeted by hackers,
anyone using the Internet stand a chance to become a victim of an online hacker. During this
incident, high profile user accounts were used for someone else’s gain. Because of the
celebrities profile the tweets seemed legit and anyone might have fallen for this hoax.

During 2016 a group of hackers called OurMine made the news when they targeted
Facebook CEO Mark Zuckerberg’s Twitter and Pinterest accounts (his password was
“dadada”). (https://www.theguardian.com/technology/2016/jun/06/mark-zuckerberg-hacked-
on-twitter-and-pinterest).

Every type of hacker has their own motivation for doing what they do. Some of the most
common reasons for hacking include:

 Theft
 Espionage
 Spamming
 Control
 Disruption
 Vulnerability Testing
 Fun
Answer the following questions.

1. Give a short description of Internet and World Wide Web to clearly show the
difference between the two concepts.
2. Describe what a URL is.
3. A user can use an electronic device, e.g. PC; laptop; tablet; smartphone; etc. to
access the internet via ADSL cables or cellular technology that connects to an ISP.
What is an ISP? (Don’t just write out the acronym)
4. What is the main difference between a webpage and a website?
5. One way to safely surf the Net is to be careful to just click on every hyperlink you
see. Describe the action what happens when one click on a hyperlink, referring to its
purpose.
6.1 Write short definitions for Web browser and Search engine to confirm the difference
between the two applications.
6.2 Briefly discuss one example of each.
7. In Microsoft Edge, next to the Address bar you will find the following icon:

What will this be used for?


8. Give one benefit of making use of Tabbed Browsing
9. While searching for Benefits of Tabbed Browsing on the Internet making use of
Google, about 417 000 results were found. Discuss three Internet Search skills to
conduct a more efficient search
10. According to the article from The Guardian mentioned above, Mark Zuckerberg’s
password (for his Twitter and Pinterest accounts) was “dadada”.
You will also agree that this doesn’t meet the criteria of a strong password. Make use
of the knowledge you gained from studying this chapter and list five aspects of
creating a strong password that wasn’t adhered to when this password was created.
11. After those high-profile user accounts were hacked and used to promote a crypto
scam, Twitter decided to improve their account security options with two-factor
authentication. How will this improvement secure accounts?
12. Some websites make use of a Captcha that a human and not a machine is using a
computer. Which Captcha is your favourite?
13. Briefly discuss Software Piracy under the following headings:
a. What is Software Piracy?
b. Types of Software Piracy
c. Dangers
d. Financial impact
14. List three things you can do to protect your privacy while being online.
15. What is meant by the concept Cybercrime?
16. Briefly discuss the following Cybercrimes through practical examples of each crime:
a. Identity theft
b. Hacking
c. Phishing

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy