CIS 105 MENTOR Career Begins/cis105mentor.com CIS 105 MENTOR Career Begins/cis105mentor.com | Page 6

· Post the CheckPoint as an attachment --------------------------------------------------------------------------------------- CIS 105 CheckPoint : Data Versus Information FOR MORE CLASSES VISIT www . cis105mentor . com
· Think about how you would feel if James were parked outside your home , using your
wireless network .
· Refer to Ch . 12 in Computing Fundamentals
· Explain the following in 350 to 700 words : Before this class , what means , if any , were
you employing to protect yourself in the cyber world ? What security measures are
available to the average computer user ? What is missing from the system James
“ borrowed ?” Which do you think are most important ? How might you change your
approach to online security in the future ?
· Cite any resources used in APA format .

· Post the CheckPoint as an attachment --------------------------------------------------------------------------------------- CIS 105 CheckPoint : Data Versus Information FOR MORE CLASSES VISIT www . cis105mentor . com

CheckPoint : Data Versus Information
· Resource : Ch . 5 in Computing Fundamentals