Things that a computer user can do to maintain their privacy online
I am doing topic number 6. What are some things that a computer user can do to maximize their chances of maintaining online privacy?
Word Project – Computers
Research and write a paper on your choice of one of the following topics. Note: With the exception of the last topic, each topic may only be presented by one student. You will claim a topic as your own by posting your choice in the discussion board. Before you post, be sure no one else has claimed the topic you wish. When you post, please include both the topic number and description, and to make it easier for your classmates see which topics are claimed, make sure the subject of your post includes your topic number and a brief phrase describing your topic.
Be sure to complete your first draft by its due date, since we will be working with the draft in class that day.
Describe different types of malware (including viruses, worms, rootkits, Trojan horses, and spyware) and what a user can do to try to keep safe from malware.Describe what can be done to configure a wireless network to make it as secure as possible.Describe what social engineering is. Provide some examples and describe some ways that people can avoid falling victim to social engineering.Define biometrics and discuss how they are being used as alternatives to passwords. Describe the advantages and disadvantages to using particular biometrics.What are some things that a computer user can do to maximize their chances of having a safe online buying experience?What are some things that a computer user can do to maximize their chances of maintaining online privacy?What are some things that a computer user can do to minimize their chances of becoming victims of identity theft?What are some things that a computer user can do to minimize their chances of becoming victims of online fraud?One does not have to spend any money to have good antivirus protection. What are two free, highly-rated antivirus programs? What are their features?You must use a password for a particular account. What are things you should (or should not) do in regard to password creation and management to keep the account as strong as possible?What are cookies (in the contexts of the World Wide Web)? How are they used? What are their benefits and disadvantages? How can you control what cookies are left on your computer? What are some ways you can browse the web anonymously?How much information about you is publicly available online? Pretend you were a detective and a client asked you to research your-name-here. Pretend you know nothing about yourself. What can you find? Of course you should Google yourself and look at all of the publicly available information on your social media, but also see what you can find out about yourself on pipl.com, yasni.com, spokeo.com, and any other information gathering sites you may know about. Where you surprise by how much (or how little) information was available? Was all of it accurate? In your paper, summarize the types of information you found. (For example, you should indicate that such-and-such a site had your correct address, but you don’t need to spell out the address.)Suppose you were the person who completed topic #11 and you discovered that there was a lot more information publicly available about you than you felt comfortable with. What could you do to make it less likely that someone investigating you would get a clear picture of your life?Not everyone has the physical abilities necessary to use standard input and output devices. What are some alternative I/O devices currently on the market? Discuss products that would help people who have special needs such deafness, blindness, or limited or no functional use of their limbs.Not everyone has the physical or cognitive abilities necessary to hold a spoken or signed conversation. What are some software and hardware products that have been developed to assist people who rely on alternative or augmentative communication strategies?How can you use online resources to pursue a job? What are some available sites for posting your resume online? How should an online resume differ from a traditional resume? How can you use online resources to improve your performance in the interview and negotiation process?What contributions did the following people make to the development of computer technology? Provide a brief biography of each one. Konrad Zuse, John Presper Eckert and John W. Mauchly, Grace HopperWhat contributions did the following people make to the development of computer technology? Provide a brief biography of each one. John Von Neumann, Jack Kilby and Robert NoyceWhat contributions did the following people make to the development of computer technology? Provide a brief biography of each one. Tim Paterson, Linus Torvalds, Bill GatesWhat contributions did the following people make to the development of computer technology? Provide a brief biography of each one. Douglas Engelbart, Steve Jobs and Steve WozniakWhat contributions did the following people make to the development of computer technology? Provide a brief biography of each one. Alan Turing, Bob Kahn and Vint Cerf, and Timothy Berners-LeeCome up with your own topic. If you do this, you must have it approved by me. If the topic is of sufficient relevance and importance and if it is not already being used by another student, I will approve it.Your paper should have an introduction, a body, and a conclusion, and must not contain any spelling or grammar errors.
The first draft of your paper should include the following:
Two to three pages of text, using Times New Roman point 12-point font, default line and paragraph spacing, and normal margin widthsAt least one verbatim quote of a sourceA bulleted or numbered listThe use of at least three references as source materialThe final version of your paper should also include:
A cover page (in addition to the 2-3 pages of text mentioned above) with a paper title, your name and the course and section number. Use one of the cover pages that comes with Word.A proper in-text citation for each quote or paraphrase, using APA style. (There must be at least one in-text citation.)A header on all pages except the cover page containing the phrase “Running Head:” followed by the paper’s title left-aligned and the page number right-aligned.A footnote or a commentA list of at least three references using the Source Manager and APA styleYou may add anything else to the document that you see fit.
Submit the completed document via BlackBoard.
The post Things that computer user do to maintain privacy online appeared first on My Assignment Online.