Page 50 - Trackpad_ipro 4.1_Class7
P. 50

How to Delete Digital Footprints

                  Since digital footprints can be used in both positive and negative ways, it is essential to manage
                  them carefully. Follow these guidelines to minimise your digital footprint:
                     Keep deleting the browsing history and cookies from your computer regularly.

                     Turn on your privacy settings in such a way that only your family or friends can see your posts.
                     Always upload appropriate content online.

                     Choose secure passwords that are unique to each login and be sure to change them regularly.
                     Remember that anything posted is public (even if your social network settings are private), as
                     the information is stored on a server.


                     Reb            t


                         Internet is also called as "the NET" or Network of Networks which means International
                        Network.
                         Computer ethics are common guidelines that we need to follow while using a computer.
                         Internet ethics are the good practices that one should follow while using the Internet.

                         Unethical practices are actions that are morally wrong or unacceptable.






                    OneOne Touch           Learn                                             Section A (Objective)



                  A.  Tick (3) the correct option.

                      1.  What is an illegal usage of software called?
                         a. Software piracy                                b. Spam

                         c. Hacking                                        d. Cookie

                      2.  Which of the following is also known as a ”digital footprint“?

                         a. Digital Diary                                  b. Database
                         c. Digital Dossier                                d. None of these


                      3.  Which of the following is the purpose of a hacker?
                         a. To steal important data

                         b. To destroy the system

                         c. Both a and b
                         d. None of these








                    48     iPro (Ver. 4.1)-VII
   45   46   47   48   49   50   51   52   53   54   55