In this unit, I have been shared some examples of how information can be extracted from data.
Although the information provided can bring back benefits, users should be aware of potential risks and how to manage and protect their personal data.
in reality, there are thousands of ways that humans can leave traces of information with the use of technologies. Let’s take the example of money transfer. you have to supply your personal information like your name, date of birth, e-mail address, password…to carry out the activity when you are at the bank. Another case takes place when you use your credit cards to withdraw money from ATMs. You have to enter your PIN.
In short, we must know how to manage and secure our information, to avoid other people taking advantage of it.
You must log in to post a comment.