Unit 2 – Question 1
Explain what you think are some of the key differences between cyber security, cyber awareness and cyber safety. To..
Nowadays, smartphones are popular and indispensable items for many people. This is the basic device to connect many daily essential activi..
Hello, my name is Yuri. I am studying Early Childhood Education now in ..
Hello, my name is Yuri. I am studying Early Childhood Education now in Singapore. After graduating from this course, I want to work in th..
Q: Let us know – is there a topic on cyber ethics that wasn’t covered in the course that you think is important to cover in cyber security..
Q: Create or find a classroom resource that teaches students about creating strong passwords, passcodes or passphrases.
A: I find this ..
Today, smartphones are common for many people. This is the basic means to connect many essential daily activities such as checking email, ..
Unit3. Task – Question 3
What are other ways humans can leave traces of information with the use of technologies?
Answer: Your personal information can be traced ..
Question 1: We have shared a few examples of how information can be extracted from data (such as in your images). What are other ways huma..