Page 53 - TP_iPlus_V2.1_Class7
P. 53

•  Keep strong passwords for e-mail accounts or social networking websites.

                 •  Ask your children not to share their personal details and passwords with others.
                 •  Protect the computer system through the firewall so that unnecessary sites can not be accessed
                   by the children.

                 •  Keep changing the password and privacy settings of the computers.
                    Info Byte

                     Encryption is the process of transforming data into unreadable code to maintain privacy.



                  i +  DIGITAL FOOTPRINTS

                 Footprints are the impressions we leave on the ground while walking. Similarly, a Digital Footprint
                 is the trace or mark that a user leaves when interacting with the internet.

                 A digital footprint refers to the data trail left behind when a person uses the internet. This
                 can include the information shared or exchanged online through emails, attachments, social
                 media, websites visited, and content uploaded, such as videos or images. These traces of

                 personal information can be collected and analysed by others, sometimes without the user’s
                 knowledge.






























                 A digital footprint is also known as a Digital Dossier, which encompasses all the digital data
                 collected about an individual over time.
                 How to Delete Digital Footprints


                 We leave marks or footprints when we work online. These footprints could be used by others
                 in a positive or negative way. One should follow certain guidelines while being online. Some of
                 them are as follows:

                 •  Keep deleting the browsing history and cookies from your computer regularly.



                                                                                                                  51
                                                                         Ethics and Safety Measures in Computing
   48   49   50   51   52   53   54   55   56   57   58