Unit 3 – Question 1

  1. We have shared a few examples of how information can be extracted from data (such as in your images). What are other ways humans can leave traces of information with the use of technologies?

When access to any social network sites as gmail, facebook, instagram, messenger, etc, we need to give some personal information at least phone number, email, pictures, ID number. And when we use those, we often share our personal information as pictures, location, or bank accounts. So we can leave the traces of information on the internet and hackers can use that to steal our information for bad purposes.

+ There are no comments

Add yours