QTS – Unit 3 – Question 1


  1. We have shared a few examples of how information can be extracted from data (such as in your images). What are other ways humans can leave traces of information with the use of technologies?

 

In our digital society, almost every daily activity relates to the use of technology. While using technology we can leave traces of information which can be used for bad purposes. For example, when we post some of our photos on social networks like Facebook, Instagram, Twitter or Zalo, other people can easily download or save these photos for their own uses. Or, when we visit a wesite to see a product we would like to buy, we leave traces about what we are interested in. When we turn on our location on smart phones, we also leave traces of our routes. So, we should learn how to keep our personal information safe by learning cyber awareness, cyber safety and cyber security.

+ There are no comments

Add yours