0% found this document useful (0 votes)
25 views3 pages

Module 3 Class 5. Lyashova

This document contains three parts about digital safety tips. Part 1 lists actions using past tense verbs. Part 2 describes how to leave a digital footprint online and social media safety tips like logging off websites. Part 3 discusses how social media collects user data, how it is used by companies, and potential dangers like profiling and data access by employers and authorities. It also lists justifications for social media safety tips like not oversharing information, limiting data access since quizzes can access passwords, being wary of spam content which can contain viruses, understanding privacy settings to review who can see posts, and using unique passwords for all accounts to prevent hacking. The respondent found limiting data access the most important since many people give companies and hackers access without realizing
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views3 pages

Module 3 Class 5. Lyashova

This document contains three parts about digital safety tips. Part 1 lists actions using past tense verbs. Part 2 describes how to leave a digital footprint online and social media safety tips like logging off websites. Part 3 discusses how social media collects user data, how it is used by companies, and potential dangers like profiling and data access by employers and authorities. It also lists justifications for social media safety tips like not oversharing information, limiting data access since quizzes can access passwords, being wary of spam content which can contain viruses, understanding privacy settings to review who can see posts, and using unique passwords for all accounts to prevent hacking. The respondent found limiting data access the most important since many people give companies and hackers access without realizing
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Part 1

1. Had you beenlearning;


2. Had;
3. Was being painted;
4. Had improved;
5. Was sleeping;
6. Had been posted;
7. Had been offered;
8. Was, studying;
9. Had you been driving;
10.Had made;
11.Didn't buy;
12.Hadn't been cleaned;
13.Arrived;
14.Traveled;
15.Had been explaining.
Part 2
Task 2
1. Leave a trail showing where you've been and what you've been doing;
2. Digital footprint;
3. Abandoning a site;
4. Making them complex;
5. Web managers usually react immediately;
6. If you think they are really serious;
7. Bookmark function.
Task 3
Do Don't
Log off when Forget to erase
you leave your browser
website, use a history, keep
picture instead quiet about
of your photo, inappropriate
use punctuation content that you
marks in your come across,
password. write your
password in a
place where you
can find it
easily, use your
name when you
post comments
online, use the
history button to
find a favourite
website.

Part 3
Task 1
1. How social media collect information about you?
— Even before you were conscious of it, you start existing on the Internet and data
starts being complied about you, to be used sometime later. For example, the
Internet knows where you studied, even before you had the chance to enter that
information in the online space.
Social media platforms, websites and mobile applications collect, process and
profile your data into statistics that are ready to be sold.
By agreeing to the terms and conditions of a social media network websites and
mobile applications, you grant permission to their owners to collect, process and
sell personal details;
2. How do the social media use your personal information?
— Information you provide, uploaded data containing information anbout your geo
location, information that other people provide, information about your devices,
from which you have logged on to social media, information about you visiting
other websites — this data about you and millions of others users is utilised by
companies.
Actually, your “likes”, “shares” and posts reveal a lot about your personality.
Companies modify their goods and services considering your preferences revealed
to them through an analysis of your online behaviour.
3. What is the dangerous side of your digital life?
— Corporations use models for profiling, as to extract information about your
habits that you even didn't notice (preferences, financial situation, social circle,
political affiliation and religious believes). They even try to judge what your IQ is.
Moreover, your next employer may have access to such information and may
already know more about you then you know about yourself. Under certain
circumstances, this data may be used by public authorities for deciding whether
you are a threat to national security.
Task 2
1. Write out the Social Media Safety tips. Supply answers with justifications:
— Don't overshare your personal information with others.
This information can have personal data that can consist answers to security
questions that will help hackers steal and sell your account;
— Limit you access to data.
When you play a game or take a quiz on social media site you give and access to
your data. This may seem harmless, but it can gain an access to your passwords,
emails and personal informations. The best thing to do when you see a request to
have an access your data is to deny it;
— Be wary of spam content.
Spam contant can be hard to distinguish. It can consist a virus and dangerous
things, that's why you should escape spam content;
— Understand your privacy settings.
It is an essential stage to stay on the Internet. Review a privacy settings and lock
down every account. If we wants to see your personal posts, they will have to send
you a request. This ensure that you allow to see your content only to people who
you know;
— Have unique passwords.
You need to have a password that consist special character, numbers, and
lowercase/uppercase character. It will really protect your account from getting
hacked. Don't use the same password for all your accounts, because if you use it,
the hacker will have an access to all your accounts.
Make sure that every account, especially, your business account has a unique
password.
2. Which ones did you find the most actual for you and why?
I consider, that the limiting of our access to data is the most actual safety tip,
because a great number of people didn't even notice how they give “cookies” to
some companies and hackers that can steal their accounts.

You might also like