Using Cell Phones for Cheating



therestartpage.com

Do mobile phones make you suspicious? Do texters have something to hide?

‘That’s what a couple of recent studies suggest. College students trust text messages less than phone calls, video chats and face-to-face conversation when communicating with their peers. And it may be a case of guilty consciences — 35% of teens admit to having used their mobile devices to cheat on a test. Nearly one-fifth say they use their phones to take photos of test questions and send them to others, 20% say they search the Internet via cellphone and 26% say they use their devices to store information.

‘This all comes from Online-Education.net, which pulled together separate studies by the University of British Columbia and Common Sense Media to create the below infographic. Check it out to get the full picture of how mobile devices relate to mistrust…’
infographic here:
http://mashable.com/2012/04/15/mobile-texters-cheaters/

Where and When Do Most People Lose Their Phones? [INFOGRAPHIC]
http://mashable.com/2012/04/15/lost-phone-infographic/

How to Remotely Disable Your Lost Phone
‘Though it varies by platform, the remote wipe solutions listed below—or any for that matter—aren’t fail-safe. If someone finds the phone before the remote wipe occurs—which could happen if the battery dies, or there’s no signal to receive the command—a thief or corporate spy could disable the network connections and then hack away. Your best insurance, therefore, is to disable the handset as quickly as possible, the same way you would call your credit card company the moment you noticed a credit card was missing…’
http://www.pcmag.com/article2/0,2817,2352755,00.asp

Isn’t It Time Mac Allows Personal Anti-virus?
There is a new Mac OS X backdoor Trojan

‘More malware for the Mac OS X platform has been discovered, hot on the heels of the revelation that some 600,000 Macs had been infected in the Flashback attack.

‘And just like Flashback, the new Trojan doesn’t require any user interaction to infect your Apple Mac.

‘The Sabpab Trojan horse exploits the same drive-by Java vulnerability used to create the Flashback botnet…’
http://nakedsecurity.sophos.com/2012/04/13/sabpab-new-mac-os-x-backdoor-trojan-horse-discovered/

About these ads

About DigitalPlato

Poch is a Bookrix author and a freelance writer. He is a frequent contributor to TED Conversations.
This entry was posted in art, computer, computer safety, TECHNOLOGY and tagged , . Bookmark the permalink.

3 Responses to Using Cell Phones for Cheating

  1. souldipper says:

    Seems they didn’t pick up my friend’s experience. She dropped hers in the toilet. I asked her if that was a ploy to discourage people from borrowing it. :D

    Like

What do you think?

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s