Compare and contrast among the Observation method and the method used by Kim for information collection. b. What made it possible for Tom to store information in the digital form? Explain its benefit and demerits. c. Identify and explain the malwares that attacked Kim and Tom’s devices.
Kim is working on a project on the health of young mothers among poor people. Since she had little time, she only collected data from the experts who work with these women. Just before the deadline, Kim found that all her project files were locked and wouldn’t open without an access key. She then received an email from her friend Tom that told her to transfer 500 dollars unless she wanted all the project files deleted forever. She immediately called Tom and was baffled to know that all passwords and data saved inside Tom’s laptop were somehow leaked and he could not access any of his accounts. Apparently both Kim and Tom downloaded some files from a third party website and faced these problems afterwards. Sadly, Kim had to pay 500 dollars to retrieve her project and Tom had to reset his entire laptop and delete all his digital information to get rid of the malware.
a. Compare and contrast among the Observation method and the method used by Kim for information collection.
b. What made it possible for Tom to store information in the digital form? Explain its benefit and demerits.
c. Identify and explain the malwares that attacked Kim and Tom’s devices.
Step by step
Solved in 3 steps