Unit 3
CategoryUnit 3 – Task
I choose:
* We have shared a few examples of how information can be extracted from data (such as in your images). What are other ways h..
Unit 3- Question 1
As the information in the lesson’s content has been provided, we may be collected personal information through activities on the internet ..
Unit 3
Through social media, there are feeds which has been catered based on your likes or the accounts you follow. Humans can leave their digita..
Unit 3 – Question 1
We use the internet every day. And we don’t know that every activity that all of us engage in the digital environment can leave footprints..
Unit 3
I choose: Find and share a resource to support teaching students in secondary years about security in apps
Information System Secu..
Unit 3 – Question 1
The following is an example of Information Extraction (an excerpt from a news article about Valencia MotoGP and Marc Marques): Marc Marque..
Hoàng Hoan_unit3_task
Some examples of codes from history or the modern day that are:
– binary code
– encoding and decoding words (letter-sound relationships ..
Unit3
Information systems, apps and data, social media and data, cryptography, decryption, application security, security of blockchain, etc are..
unit 3 question 1
Some example of how data can be excavated for information include our website history, emails, and anything we publish online. Specially, ..
Unit3 – Question 1
Unit 3- question 1
Currently, the security of personal information transmitted on the Internet is very important. Leaking phone numbers i..
You must be logged in to post a comment.