2. False, each organization that is running their own network is responsible for maintaining networks and content.
4. False, byte
8. False, a search engine finds websites and other related materials
11. False, streaming is transmitting data in a continuous even flow.
12. False, clearing/disabling all cookies.
1. Friend Requests: I would look into who is requesting me, if they have no picture, no information, or have only been on for a very short amount of time, I would be very warry on accepting them. If you don’t know someone, you could ask them, if your able to, why they are adding you or investigate where they might have found you, i.e.: at work, school, a trip, or so on. CNN also suggests accepting with caution or just ignoring/deleting the request.
2. Unexpected Search Engine: The search bar that is being typed into might be set to Bing, so you would actually be binging “google.com” and that is why you are brought to the wrong search engine. If typed into the address bar, it may have been incorrectly spelt, but that shouldn’t bring you to a different search engine. Depending on the location, the domain may be blocked, and the search will be redirected to the allowed search engine.
3. Images Not Appearing: If you cannot view the images on a webpage, a few issues may be a problem. The internet may be down and unable to fully load the page. The internet may be slow and unable to download in a timely manner. The webpage may be down, and unable to load the pictures in usually carries, or an extension on your browser is wrongly blocking the photos. I would try a new browser to see if that is the issue with the photos, see if I have any settings that may block images, try finding the page on another search engine, or power cycling my router to reboot the internet.
4. Forgetting my password: My immediate reaction is clicking “I forgot my Password” and taking the steps to reset my password to one I would remember. Usually the process involves logging into my email that I sent the password to, implying that I remember the log in for that email, usually putting in a temporary password, and then once I am logged in I change the password to something I will remember.
5. Cyberbullying: When being cyberbullied, a few actions can be taken. Saving or screenshotting the message in question, telling the bully to stop if it is repeated, or reporting it to the police, a teacher, or anyone that could help you. Trying not to take it personal would be a good initiative, they may simply be trying to get a reaction out of you, but if it repeats, I would save the messages and report them, or block them.
A thermal imaging cell phone case costs approximately $200 to $300. The FLIR ONE phone case, depending on the generation, the price will change, and look to be primarily made for iPhones. iPhones are used for the thermal imaging, but the specific model is not specified. It looks like it has been made for multiple sizes though. A few different ways to thwart potential thieves are to touch multiple keys besides yours to add a few more numbers for them to crack and lowering the chances of them figuring out your PIN, or after you put in your PIN, place your palm over all the keys to spread heat to all the keys. Metal keys are not affected by the thermal imaging cameras since they disperse the heat quickly, but the plastic and rubber keys retain the heat longer. Researchers from the University of California, San Diego were the ones to publish a paper on thermal cameras being used to hijack PIN numbers. Researchers Keaton Mowery, Sarah Meiklejohn, and Stefan Savage created the paper, “Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks.”