0% found this document useful (0 votes)
82 views

Steps On How To Create A Google Account

Uploaded by

joeljulius204
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views

Steps On How To Create A Google Account

Uploaded by

joeljulius204
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

NTA LEVEL 7

Course:
BHRM -2023/2024
Date Issued:
13rd December, 2023
Deadline:
13rd December, 2023 at 23:59 PM
General Instructions
1. Account Creation:
i.
Create a Gmail account using a fictional institute registration number
as the name (e.g., BHR00122023).
ii.
Ensure that the registration number used is entirely fictional and
doesn't correspond to any real person or institute.
2. Report Submission:
i.
Submit the assignment report through the newly created Gmail
account.
3. Report Content:
i.
Draft a report detailing the procedures used to create the email
account and submit the report through the new Gmail account.
4. Guidelines:
i.
Emphasize the importance of using strong passwords.
ii.
Discuss enabling two-factor authentication.
iii.
Address the significance of respecting privacy and ethical
considerations throughout the assignment
steps on how to create a google account

Here are the steps to create a Google account:

1. Visit the Google Account Creation Page:


Open your web browser and go to the Google account creation page: Google Account Creation.

2. Fill in the Required Information:

Enter your first and last name in the provided fields.


Choose a username, which will be your email address. Google will suggest some options, or you can
create your own.
Create a strong password. Google will evaluate and show the strength of your password.

3. Provide Additional Information:

Enter your date of birth and gender.


Optionally, you can add a recovery email address and phone number. These are helpful if you ever need
to recover your account.

4. Complete the CAPTCHA:

Complete the CAPTCHA challenge to verify that you are not a robot.

Review and Agree to the Terms of Service and Privacy Policy:

Click on the "I agree" or "Next" button after reviewing Google's Terms of Service and Privacy Policy.
5. Set Up Your Google Profile:

You may be prompted to set up your Google profile. You can add a profile picture and provide additional
information about yourself. This step is optional, and you can skip it if you prefer.

6. Verify Your Email Address:

After completing the registration, Google may ask you to verify your email address. This typically
involves clicking on a link sent to the email address you provided during registration.

7. Access Your Google Account:

Once your account is created and verified, you can log in to your Google account using your new
username (email address) and password.

Congratulations! You have successfully created a Google account. You can now access various Google
services such as Gmail, Google Drive, Google Calendar, and more using this account.

ANSWERS
SIGNIFICANT REASONS WHY RESPECTING PRIVACY AND ETHICAL CONSIDERATION
Respecting privacy and ethical considerations is of paramount importance in numerous aspects of modern
society, particularly in the context of technology, healthcare, business, and personal relationships. Here
are some of the significant reasons why respecting privacy and ethical considerations is crucial:
1. Trust and Relationships: Respecting privacy fosters trust between individuals, organizations, and
society at large. When people feel that their privacy is respected, they are more likely to engage in open
and honest communication and develop trusting relationships.

2. Individual Autonomy: Respecting privacy acknowledges and upholds the right of individuals to control
their personal information and make decisions about how it is collected, used, and shared. This autonomy
is fundamental to personal freedom and dignity.

3. Data Protection and Security: Respecting privacy is essential for safeguarding sensitive information,
such as personal data, financial details, and medical records. Ethical considerations in data handling and
sharing help prevent data breaches and protect individuals from identity theft and other forms of
cybercrime.

4. Psychological Well-being: Respecting privacy contributes to individuals' psychological well-being by


providing them with the space and freedom to maintain boundaries and control the dissemination of their
personal information. This is particularly relevant in the digital age, where personal data can be easily
accessed and exploited.

5. Legal and Regulatory Compliance: Respecting privacy is often mandated by laws and regulations, such
as the General Data Protection Regulation (GDPR) in the European Union and the Health Insurance
Portability and Accountability Act (HIPAA) in the United States. Adhering to ethical principles and legal
requirements helps organizations avoid penalties and maintain their reputations.

6. Corporate Responsibility: Ethical considerations regarding privacy are integral to corporate social
responsibility. Organizations that prioritize privacy and ethical data practices demonstrate their
commitment to protecting the rights and well-being of their customers, employees, and stakeholders.

7. Research and Innovation: Respecting privacy and ethical considerations is crucial in research and
innovation. Ethical data collection and use practices ensure that research is conducted responsibly and
that the potential benefits of new technologies are balanced with the protection of individuals' rights and
well-being.

In conclusion, respecting privacy and understanding ethical considerations is essential for promoting trust,
protecting individuals' rights, ensuring data security, and upholding the principles of autonomy and
responsibility in various domains of human interaction. By embracing these values, individuals,
organizations, and societies can create environments that prioritize respect, integrity, and accountability.
IMPORTANCES OF USING STRONG PASSWORDS
Using a strong password is crucial for enhancing the security of your online accounts. Here are several
advantages of using a strong password:

• Reduced Risk of Unauthorized Access: Strong passwords make it more difficult for hackers to
guess or crack them, reducing the risk of unauthorized access to your accounts.

• Enhanced Account Security. A strong password adds an extra layer of security to your accounts,
protecting sensitive information and personal data.

• Prevention of Account TakeoverStrong passwords help prevent unauthorized individuals from


taking over your accounts and using them for malicious purposes.

• Protection Against Brute Force Attacks: Brute force attacks involve attempting to guess a
password by systematically trying all possible combinations. A strong password with a mix of
characters makes it much more challenging for attackers to succeed in such attacks.

• TWO FACTOR AUTHENTICATION


Two-Factor Authentication (2FA) is an additional layer of security designed to ensure that people trying
to gain access to an online account are who they say they are. It adds a second step to the standard
username and password login process. The idea is that even if someone obtains your password, they
would still need another piece of information to successfully access your account.
The two factors typically fall into one of the following categories:
Knowledge Factor (Something you know):
This is the traditional username and password combination. It's information that only the account owner
should know.
Possession Factor (Something you have):
This involves having a physical device, often a mobile phone or a hardware token, that can generate or
receive a temporary code. This code is required in addition to the password for authentication.
Here's how Two-Factor Authentication generally works:
Step 1: Username and Password:
Enter your username and password as the first factor to initiate the login process.
Step 2: Second Factor Verification:
After successfully entering your username and password, you are prompted to provide a second piece of
information.
This second factor could be a temporary code sent to your mobile device via SMS or generated by an
authentication app, or it could involve using a hardware token.
Step 3: Access Granted:
If both factors are correct, you gain access to your account. The temporary code from the second factor is
time-sensitive and typically valid for only a short period, adding an additional layer of security.
Two-Factor Authentication provides a higher level of security compared to relying solely on passwords.
Even if someone manages to obtain your password, they would still need the second factor (which is
typically more difficult to obtain) to access your account. Many online services and websites, including
email providers, social media platforms, and banking institutions, offer Two-Factor Authentication as an
optional security feature that users can enable for their accounts.

You might also like