Unit 3: Quession 1

In this section, I have shared some examples of how information can be extracted from data.
While the information provided may be beneficial, users should be aware of the potential risks and how to manage and protect their personal data.
In fact, there are thousands of ways in which people can leave information traces using technology. Let’s take the example of online shopping. you must provide your personal information such as name, residential address, phone number…when you make a purchase. Or when you withdraw money at an ATM, you use the card to withdraw money. You must enter your PIN.
Summary, we must know how to manage and secure our information, to avoid letting others take advantage

+ There are no comments

Add yours