An Le

ITS 230

Week 2

Checkpoint

1.       T

2.       F. W3C only sets standards.

3.       T

4.       F. 1GB has 1 billion characters.

5.       T

6.       T

7.       F. There are considerably more mobile apps than web apps.

8.       F. Search engine is the software that finds information related to a specific topic.

9.       T

10.   T

11.   F. Tethering is the process of using your cell phone as a modem, or “hotspot” that provides Internet access for Wi-Fi usage devices.

12.   F. Remove the cookies after finish browing to protect yourself online.

Matching

1.       Catfishing – c

2.       Chat – a

3.       Curation website - i

4.       Cyberbullying – e

5.       Domain name – h

6.       Internet backbone – b

7.       Tag – d

8.       Tethering – g

9.       Web serve – j

10.   Wiki - f

Problem solving

Cyberbullying message: if I happen to receive an email message that has bullying content, I would just either delete it, or putting in the spam folder. Also consider blocking the sender of the message.

Unsolicited friend request: if I have concluded that I do not know the person at all, I would either just ignore the request, or maybe consider deleting the request. If the person happens to keep sending me the friend request after I have deleted it, I would consider blocking that person from reaching me on Facebook.

Unexpected search engine: most browsers these days do not automatically switches the search engine without the user’s modification, unless there is a malware that is causing the problem. Therefore it is possible that your device is infected and you should attempt to scan for it.

Social media password: social media is likely to offer you the “Forgot Password?” option right below the log in credentials. You can just choose the option and I would send an email an access code that would enable you to create a new password and re-access the account.

Suspicious web site visits:  most of the time a company would require you to require a work account to access the Wi-Fi. Most IT departments should have visibility on the Wi-Fi users and would be able to determine what websites you visit and how often. However, if you know for sure that you do not browse non work-related websites like they claim, there might be a possibility that your work account is being accessed by a third party. I would suggest you go talk to the IT department about the issue.

Research – Cloud Services

                Documents being share with accessibility to edit simultaneously offers flexibility and real-time decision making, potentially reduces the time require for peer-review documentation or group work on a project. Sending files through email does not have this real-time feature, and would take a significant amount of time to complete the peer-editing process.

                Office Online/Google Drive requires only your web browser and internet connection to access, and you are not required to conduct an installation. With Drive/Office Online, you only need to sign in to be able to access all the features such as Slides, Docs, Word…and they offer online real-time file sharing, as opposed to the native Office installed on my computer.