Activity 1. Given the different scenarios below, provide your solutions. Support your answers.
Scenario 1: No Browsing History
While using the browser on your tablet, you realize that it is not keeping a history of websites you have visited. Why might this be happening, and what is the first step you will take to correct this problem? When the browser is not keeping history, it is seemingly set to the incognito mode or private browsing because incognito mode allows you to keep your temporary browsing data hidden. To resolve this issue, switch to a regular browsing tab and exit incognito mode. Moreover, it is also possible that the number of days to store the browser's history is set to zero, which may be adjusted and changed in the browser settings.
Scenario 2: Phishing Scam
You just received an email message from someone requesting personal identification information. Believing the message was legitimate, you provided the requested information to the original sender. You now realize, however, that you might have fallen victim to a phishing scam. What are your next steps? I will immediately change the credentials and passwords that I have disclosed and search for any viruses installed in my device. Next, I will promptly contact the bank if I also give my bank details to the scammer so that I can able to request to freeze it. Then I will get help from the officials and provide the email or the number of the scam. After resolving the issue, I will report spam and block the unprotected emails on my devices to avoid being scammed again.
Scenario 3: Antivirus Software Outdated
After starting your computer and signing in to the operating system, a message is displayed stating that your virus definitions are out of date and need to be updated. What are your next steps? To start with, I will check if the message or notification is from the trusted anti- virus software I am currently using. If then it is proven trusted, I will update it right away. Scenario 4: Keywords for Job Search After taking your third computer class, you realize that you would like to train people how to use computers and software. You look for a job online and are asked to enter some keywords for your job search. What keywords will you enter to find a job that allows you to train others how to use computers and software? Some keywords to look for when looking for employment online that involve teaching others how to use computers and software are the following: computer science educator, an IT instructor, a software trainer, or just input the words trainer, instructor, software, and computer.
Scenario 5: Contemplating a Job Offer
After graduating from college with a degree in computer science, you send your resume to several companies. Almost immediately, you receive a job offer as a technical support representative in a midsized organization. Will you accept this job offer or wait for additional offers? Why? Having a job offer right away may sound tempting. I will not immediately turn the job down; however, I will still wait for another job offer and take some time because maybe many choices and vacant positions are still available. Moreover, when it comes to a point where I receive several job offers, I will think carefully and compare the companies and jobs I will be working for.
Scenario 6: Appropriate Certification
Because you hope to pursue a career as a system administrator, you would like to obtain a certification. Many certifications are available, but you want to choose the one(s) that will best prepare you for your future career. Which certification(s) will you consider?
Certifications certainly have an impact on showing employers you are an expert
in your field. The top 10 certifications that are best to consider is the Network 5 Certification by EC-Council, Microsoft Certified Systems Engineer (MCSE), Cisco Certified Network Associate (CCNA), Pro: Windows Server 2008, Enterprise Administrator (MCITP), Certified System Administrator (CSA), Certified Information Systems Security Professional - Architecture (CISSP), CCNP Service Provider Operations (CCNP), Certified Information Security Manager (CISM), Red Hat Certified System Administrator (RHCSA), and the Microsoft Certified Systems Administrator (MCSA).