Computing's Impact on Society
How can you practice safe computing when receiving emails?
Download email attachments without verification
Avoid opening links from unknown senders
Immediately respond to strange messages from friends
Disable antivirus software for better email access
Which Internet technology most significantly hampers anonymous browsing while interacting with web services?
VPNs (Virtual Private Networks)
Incognito browser modes
End-to-end encryption protocols
Persistent cookies
What should you regularly update to ensure your computer stays protected against threats?
Wallpaper and screen saver settings
Software and operating system patches
Icons arrangement on desktop
Location where files are saved on disk
Which protocol provides the most secure method to manage network devices remotely when considering impact on system functionality and user experience?
FTP (File Transfer Protocol)
SNMP (Simple Network Management Protocol)
SSH (Secure Shell)
HTTP (Hypertext Transfer Protocol)
Which programming paradigm is particularly useful for managing complex systems with numerous interacting objects by focusing on the objects themselves and their interactions?
Object-oriented programming
Procedural programming
Functional programming
Logic programming
How can the introduction of automation in workplaces potentially impact employment?
It guarantees higher wages for all employees due to increased productivity.
It always creates more jobs than it replaces because of new technologies involved.
It may result in job displacement for workers whose tasks can be automated.
It ensures lifelong job security for current employees due to technology reliance.
What is a strong password policy likely to include?
A requirement for long passwords with a mix of characters.
Use of common words and dates related to the user.
Sharing passwords with trusted friends or family members.
Reuse of old passwords after a certain period.

How are we doing?
Give us your feedback and let us know how we can improve
Which action can help create a strong password?
Mixing letters, numbers, and symbols.
Using a common phrase or word.
Keeping it short and simple to remember easily.
Reusing passwords across different sites.
What benefit does two-factor authentication (or 'multi-step verification') provide when securing online accounts?
Reducing server load since multi-step processes require fewer simultaneous connections than single-step logins, potentially improving website performance.
Adding an additional layer of security beyond just knowing the password, thereby reducing chances someone else can gain unauthorized access.
Compiling more extensive logs of account activity history, which could assist in investigating breaches after they occur.
Ensuring rapid account recovery processes in case users forget their login credentials, thus minimizing downtime due to lost credentials.
To prevent unauthorized reading or tampering with sensitive data during transmission over an insecure network, what must be implemented?
Character encoding schemes like UTF-8.
Encryption protocols like SSL/TLS.
Compression algorithms like ZIP.
Syntax highlighting rules for code editors.