0
0
Intro to Computingfundamentals~10 mins

Privacy settings and data protection in Intro to Computing - Draw & Build Visually

Choose your learning style9 modes available
Draw This - beginner

Draw a flowchart that shows the steps a user should take to adjust privacy settings and protect their personal data on a social media platform.

10 minutes
Hint 1
Hint 2
Hint 3
Hint 4
Grading Criteria
Start and End symbols present
Decision diamonds used for choices
Steps for setting data visibility included
Step for enabling two-factor authentication included
Flow leads logically from login to logout
All decision paths lead to saving changes
Solution
  +---------------------+
  | Start: User logs in |
  +----------+----------+
             |
             v
  +-------------------------+
  | Open Privacy Settings   |
  +-----------+-------------+
              |
              v
  +-------------------------+
  | Choose data to share?   |
  +-----------+-------------+
              |
       +------+------+
       |             |
      Yes           No
       |             |
       v             v
+--------------+ +--------------+
| Set data as  | | Hide data    |
| public       | | from others  |
+------+-------+ +------+-------+
       |                |
       +--------+-------+
                |
                v
  +-------------------------+
  | Enable two-factor auth?  |
  +-----------+-------------+
              |
       +------+------+
       |             |
      Yes           No
       |             |
       v             v
+--------------+ +--------------+
| Set up 2FA   | | Skip 2FA     |
+------+-------+ +------+-------+
       |                |
       +--------+-------+
                |
                v
  +-------------------------+
  | Save changes and logout |
  +-----------+-------------+
              |
              v
         +---------+
         |  End    |
         +---------+

This flowchart starts with the user logging into their social media account. Then the user opens the privacy settings page. The first decision is whether to choose data to share publicly or hide it from others. Depending on the choice, the user sets the data visibility accordingly. Next, the user decides whether to enable two-factor authentication (2FA) for extra security. If yes, they set up 2FA; if no, they skip this step. Finally, the user saves all changes and logs out, completing the process of protecting their personal data.

Variations - 2 Challenges
[intermediate] Draw a flowchart for adjusting privacy settings on a smartphone app, including permissions for location, camera, and microphone.
[advanced] Draw a detailed flowchart showing how a user can protect their data by adjusting privacy settings, enabling encryption, and regularly updating passwords.