Archives
QTS_Unit 5_Question 1
Some of the ethical rules when using technology that I like the most:
- Information must be respected and protected, considering it as ..
QTS_Unit 4_Question 2
How to create a strong password, passcode or passphrase.
Create a strong passphrase:
- Long: Be at least 14 characters long. The lon..
QTS_Unit 3_Question 2
Here are some other examples of message encryption and decryption:
- Classical Coding
Classical coding works on an alphabetical bas..
QTS_Unit 2_Question 1
Some of the key differences between cyber security, cyber awareness and cyber safety:
– Cyber security is the practice of protecting co..
You must be logged in to post a comment.