You are on page 1of 2

Let’s Analyze.

Activity 1. Given the different scenarios below, provide your solutions. Support your
answers.

Scenario 1: No Browsing History


While using the browser on your tablet, you realize that it is not keeping a history of
websites you have visited. Why might this be happening, and what is the first step you
will take to correct this problem?
When the browser is not keeping history, it is seemingly set to the incognito
mode or private browsing because incognito mode allows you to keep your temporary
browsing data hidden. To resolve this issue, switch to a regular browsing tab and exit
incognito mode. Moreover, it is also possible that the number of days to store the
browser's history is set to zero, which may be adjusted and changed in the browser
settings.

Scenario 2: Phishing Scam


You just received an email message from someone requesting personal identification
information. Believing the message was legitimate, you provided the requested
information to the original sender. You now realize, however, that you might have fallen
victim to a phishing scam. What are your next steps?
I will immediately change the credentials and passwords that I have disclosed
and search for any viruses installed in my device. Next, I will promptly contact the bank
if I also give my bank details to the scammer so that I can able to request to freeze it.
Then I will get help from the officials and provide the email or the number of the scam.
After resolving the issue, I will report spam and block the unprotected emails on my
devices to avoid being scammed again.

Scenario 3: Antivirus Software Outdated


After starting your computer and signing in to the operating system, a message is
displayed stating that your virus definitions are out of date and need to be updated.
What are your next steps?
To start with, I will check if the message or notification is from the trusted anti-
virus software I am currently using. If then it is proven trusted, I will update it right away.
Scenario 4: Keywords for Job Search
After taking your third computer class, you realize that you would like to train people
how to use computers and software. You look for a job online and are asked to enter
some keywords for your job search. What keywords will you enter to find a job that
allows you to train others how to use computers and software?
Some keywords to look for when looking for employment online that involve
teaching others how to use computers and software are the following: computer science
educator, an IT instructor, a software trainer, or just input the words trainer, instructor,
software, and computer.

Scenario 5: Contemplating a Job Offer


After graduating from college with a degree in computer science, you send your resume
to several companies. Almost immediately, you receive a job offer as a technical
support representative in a midsized organization. Will you accept this job offer or wait
for additional offers? Why?
Having a job offer right away may sound tempting. I will not immediately turn the
job down; however, I will still wait for another job offer and take some time because
maybe many choices and vacant positions are still available. Moreover, when it comes
to a point where I receive several job offers, I will think carefully and compare the
companies and jobs I will be working for.

Scenario 6: Appropriate Certification


Because you hope to pursue a career as a system administrator, you would like to
obtain a certification. Many certifications are available, but you want to choose the
one(s) that will best prepare you for your future career. Which certification(s) will you
consider?

Certifications certainly have an impact on showing employers you are an expert


in your field. The top 10 certifications that are best to consider is the Network 5
Certification by EC-Council, Microsoft Certified Systems Engineer (MCSE), Cisco
Certified Network Associate (CCNA), Pro: Windows Server 2008, Enterprise
Administrator (MCITP), Certified System Administrator (CSA), Certified Information
Systems Security Professional - Architecture (CISSP), CCNP Service Provider
Operations (CCNP), Certified Information Security Manager (CISM), Red Hat Certified
System Administrator (RHCSA), and the Microsoft Certified Systems Administrator
(MCSA).

You might also like