You notice that your phone keeps slipping out of your pocket during workouts. You decide to design a new type of pocket. Which step of the EDP are you starting with?
What is identifying the problem?
To create strong and secure passwords, it is recommended to include these three types of characters.
What are letters, numbers, and special symbols?
You build a prototype of a chair that can fold into a backpack. Which step of the EDP are you demonstrating?
What is developing and testing a solution?
This action helps protect your accounts by requiring both a password and a secondary form of verification, like a code sent to your phone
What is enabling two-factor authentication?
After testing your solar-powered toy car, you find it moves too slowly. You decide to add a stronger motor. What EDP step are you performing?
What is improving the design?
Clicking on suspicious links or opening unexpected attachments in emails can expose your device to this type of malicious software.
What is a virus or malware?
Your group compares designs to see which one is the most cost-effective and easiest to build. What EDP step is this?
What is selecting the best solution?
This term refers to limiting the personal information you share online to reduce risks like identity theft or cyberstalking.
What is practicing data privacy?
You research existing bridges to gather inspiration for creating a safer and stronger design. What EDP step does this represent?
What is conducting research?
This is the term for using technology to harass, embarrass, or harm someone repeatedly online.
What is cyberbullying?