0
0
Intro to Computingfundamentals~20 mins

Privacy settings and data protection in Intro to Computing - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Privacy Protector
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding Data Encryption

Imagine you want to send a secret message to a friend using a locked box. Which of the following best describes how data encryption works in protecting your message?

AIt locks the message in a box that only your friend can open with a special key.
BIt hides the message by mixing it with other messages so it looks like noise.
CIt sends the message openly but asks your friend to ignore it if they don't recognize it.
DIt copies the message many times to make sure it reaches your friend safely.
Attempts:
2 left
💡 Hint

Think about how a locked box protects something from being read by others.

trace
intermediate
2:00remaining
Tracing Data Access Permissions

Consider a system where users have different access levels: Admin, Editor, and Viewer. Given the following flowchart, which user type can only view data but cannot edit or delete it?

Intro to Computing
Start -> Check User Role -> If Admin: Full Access -> If Editor: Edit Access -> If Viewer: View Only -> End
AAdmin
BGuest
CEditor
DViewer
Attempts:
2 left
💡 Hint

Think about the role that has the least permissions.

identification
advanced
2:00remaining
Identifying Privacy Risks in Data Sharing

Which of the following scenarios poses the greatest risk to personal data privacy?

ASharing your email address only with trusted friends.
BPosting your full home address on a public social media profile.
CUsing a strong password for your online accounts.
DRegularly updating your software to fix security issues.
Attempts:
2 left
💡 Hint

Consider what information is sensitive and how public it is.

Comparison
advanced
2:00remaining
Comparing Data Protection Methods

Which data protection method is more effective at preventing unauthorized access to data stored on a lost device?

ABacking up data regularly to the cloud.
BInstalling antivirus software.
CEncrypting the data stored on the device.
DUsing a strong password to log in.
Attempts:
2 left
💡 Hint

Think about what protects data even if someone gets physical access to the device.

🚀 Application
expert
2:00remaining
Applying Privacy Settings to Protect Data

You want to share photos with only a select group of friends on a social media platform. Which privacy setting should you choose to ensure only those friends can see your photos?

AUse the 'Friends Only' setting to restrict access to your friends.
BShare photos via direct messages to individual friends.
CSet your profile to 'Public' so everyone can see your photos.
DDisable all privacy settings to avoid confusion.
Attempts:
2 left
💡 Hint

Consider a setting that limits visibility to your friends but not everyone.