ExamCompetition Forum Question Papers Ask A Question Mock Test Learn & Earn Sign Up Login Menu



0 vote

Read the following passage carefully and answer the questions given below it. Certain words have been highlighted for your attention. Today, social networking is as routine as sending an e-mail at home or work. Employees swap updates on Facebook and Twitter, log opinions at blogs, and upload snapsh

Asked on by | Votes 0 | Views: 20 | Tags: reading comprehension     | english comprehension     | Add Bounty

Read the following passage carefully and answer the questions given below it. Certain words have been highlighted for your attention.

Today, social networking is as routine as sending an e-mail at home or work. Employees swap updates on Facebook and Twitter, log opinions at blogs, and upload snapshots to photo-sharing sites.The result for businesses? A digitally connected social world in which the line between personal and corporate lives is increasingly blurred. As this digital conversation swells, potential risks to businesses also rise. Simply said, not all data being shared is as innocent as weekend plans. Social networking sites have become very popular avenues for people to communicate with family, friends and colleagues from around the corner or across the globe. While there can be benefits from the collaborative, distributed approaches promoted by the responsible use of social networking sites, there are information security and privacy concerns. The volume and accessibility of personal information available on social networking sites have attracted malicious people who seek to exploit this information. The same technologies that invite user participation also make the sites easier to infect with malware that can shut down an organisation’s networks, or keystroke loggers that can steal credentials. Common social networking risks such as spear phishing, social engineering, spoofing, and web application attacks attempt to steal a person’s identity. Such attacks are often successful due to the assumption of being in a trusting environment social networks create.

Security and privacy related to social networking sites are fundamentally behavioural issues, not technology issues. The more information a person posts, the more information becomes available for a potential compromise by those with malicious intentions. People who provide private, sensitive or confidential information about themselves or other people, whether wittingly or unwittingly, pose a higher risk to themselves and others. Information such as a person’s social security number, street address, phone number, financial information, or confidential business information should not be published online. Similarly, posting photos, videos or audio files could lead to an organisation’s breach of confidentiality or an individual’s breach of privacy.

Businesses are embracing social networking to cultivate an internal culture of collaboration. Additionally, it is easy to see how this free flow of information can boost productivity and autonomy. Employees working on a project will have relevant, current, and customised knowledge at their fingertips, and they can tap into a ready-built group of team players at all levels of the organisation. Outside the organisation, social networking can help a business reach and engage customers, improve the customer experience, and manage its brand image. Many businesses today patrol sites such as Twitter and Facebook, for instance, to listen in on the chatter about their products and services. Their online brand ambassadors can promote new products or, if a business’s reputation is threatened, use social media to move the discussion in the right direction. Businesses also take advantage of online customer voices to create a more effective advertising campaign. Successful brands leverage customer experiences as an integral part of a product campaign and life cycle. Consider, for instance, the success of Apple. Apple customers have a tight emotional bond to the brand and track the company and its IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.6, June 2013 121 products on blogs, Twitter feeds, and Facebook. How deep is the connection? Apple retail stores in some cities have now become tourist attractions. Anyone can read about them on Twitter.


How people pose a higher risk to themselves and others?
1). By sending emails
2). By providing sensitive, private and confidential information
3). By giving unethical reviews to the posts
4). By using social networking 


Share on Facebook      Share on Whatsapp       Share on Twitter




1 answers

0 vote
Answered by on | Votes 0 |

The correct answer is Option 2, i.e. 'By providing sensitive, private and confidential information'.

In the sentence, it is clearly mentioned that 'People who provide private, sensitive or confidential information about themselves or other people, whether wittingly or unwittingly, pose a higher risk to themselves and others'.

Providing and posting sensitive, private and confidential information is the correct option as the other options make the answer idiomatically incorrect.

Join Telegram Group




Answer This Question

Name:
Email:
Answer :
Sum of (3+5)
Submit:

Other Questions

1. The sentences given with blanks are to be filled with an appropriate word(s). Four alternatives are suggested for each question. For each question, choose the correct alternative and click the button corresponding to it._____ you live long!

2. In the lowing passage there are blanks. each of which has been numbered. These numbers are printed beiow the passage and against each, live words are suggested. one of which fits the blank appropriately. Find out the appropri ate word in each case. Today experts all over the world are of the opinion

3. In each of the following sentences there are two blank spaces. Below each sentence there are five pairs of words denoted by number A, B, C, D and E. Find out which pair of words can be filled up in the blanks in the sentence in the same sequence to make the sentence grammatically correct and meaningfully complete.

4. Read the following passage carefnlly and answer the given question. Certain words have been given in bold to help you locate them while answering sonic of the questions.Once upon a time a Brahmin lived in a big city and as a result of his misdeeds in his previous birth, he became a thief. He saw fou

5. Out of the four alternatives, choose the one which can be substituted for the given words/sentences and click the button corresponding to it.The scientific study of elections

6. Instructions: In the following passage there are blanks, each of which has been numbered. These numbers are printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate word in each case.President Barack Obama?s recent stat

7. Find out the misspelt word

8. Out of the four alternatives, choose the one which can be substituted for the given words/sentences and click the button corresponding to it.The thing no longer in use

9. In the following question, some part of the sentence may have errors. Find out which part of the sentence has an error and select the appropriate option. If a sentence is free from error, select 'No Error'.We have to accept(A)/that driving vehicles(B)require expertise.(C)/No error(D)

10. In the following passage there are blanks, each of which has been numbered. These numbers are also printed below the passage and against each, five words are suggested, one of which fits the blank appropriately. Find out the appropriate words in each case.Today, twenty-two years after the bank (1),