According to a recent study, more than 75 percent of teens between the ages of twelve and seventeen in the United States have a cell phone. Six percent of these teens use location services, which let users "check-in" to a location or share their locations with friends. What dangers might be associated with using these location services?

Answers

Answer 1

Answer:

Professional thieves can track your every movement and use pattern-recognition to find out where you live. This way, they would be able to raid your house when you are not there, making the entire process much easier.

Data can also be stored and sold. It been confirmed by numerous reputable sources such as CNET. There have been many different lawsuits in the last few years which were based on the fact that the defendants had sold location data from their applications to third parties

Answer 2

Answer:

People that are good at tracking and doing other crimes may be able to track teens down and kidnap them or do something worse.

Explanation:


Related Questions

Select three examples of cryptographs. Security tokens Shared-key Malware Firewalls Message authentication code Public-key

Answers

Answer:

(1) secret key, (2) public key, and (3) hash functions. Pick an algorithm for any one of these types (e.g., DES, AES, RSA, MD5) and describe how it works and where it is applied (For example SSL uses 3DES or DES) for message encryption.

Explanation:

well i only have one awnser a message authentication codes.

You have been tasked with creating a job posting for a security analyst position at your workplace. Write the job posting that best describes the position.

Answers

Answer:

making sure everything is where it needs to be. making sure everyone is doing their job & is staying on task! also making sure evrything is in order.

Explanation:

let me know if this helped!

I don’t wanna see y’all tomorrow night or not even though I’m not going to say hi and y’all

what dose AUP stand for??????????

Answers

Answer:

Acceptable Use Policy

Explanation:

A: Acceptable

U:Use

P:Policy

Acceptable Use Policy

Which of the following could be omitted from a company's AUP? A.Permissible lunchtime online activities B.Employees' home email addresses C.Rules on use of social networking D.Policy on password strengths for highly sensitive data access I hate business and computer science:( for BRAINLEAST!!!!!!!!!

Answers

Answer:

i think the answer is D

Explanation:

a , b , and c are things customers need to know . but using common sense would let you know that you need to have a strong password so i think it's D! let me know if this helped!

The statement or function that could be omitted from a company's AUP is as follows:

Policy on password strengths for highly sensitive data access.

Thus, the correct option for this question is D.

What do you mean by Company's AUP?

A company's AUP may be defined as a type of document that significantly stipulates constraints and practices that a user must agree to for access to a corporate network, the internet, or other resources.

Many businesses and educational institutions require employees or students to sign an AUP before being granted a network ID. It stands for acceptable use policy. The most important part of an AUP document is the code of conduct governing the behavior of a user whilst connected to the network/Internet.

The rest of the options require passwords for user login and other personal credentials. This makes the process more complex in terms of AUP.

Therefore, the correct option for this question is D.

To learn more about AUP, refer to the link:

https://brainly.com/question/24951641

#SPJ2

GIVING BRAINLIEST Jenna creates advertisements for companies to air on television. Which file format will best preserve the graphics? DOCX PDF MP3 MPEG

Answers

Answer:

MpEg

Explanation:

Answer:

PDf

Explanation:

brainliest please

GIVING BRAINLIEST
Explain why it’s important to know your audience when designing a web page.

Answers


Knowing your audience will help you identify the key features your site must include. You'll need to make sure you're including whatever it is that your target audience will want to be able to do on your website. You likely have grand dreams to incorporate all kinds of bells and whistles into your site.

Answer:

Hi there!

Your answer is

It is important to know your audience so you know the type of content to put in your webpage. You also must know the audience to determine what knowledge-level your content will include.

For example, if your webpage was meant for an audience of well educated professionals, you would need to use strong terminology and use higher level explanations.

I hope this makes sense! Good studying!

Where can Microsoft users browse forums by topic, search existing questions and answers, or ask their own questions? 1.Community and Forum Resources 2.Get Live Help 3.Tech Specs 4.Top Support Issues

Answers

Answer:

1. Community and forum resources

Explanation:

1. Community and Forum Resources
*Brainliest?*

Explain what mistake Miranda made in the following scenario. Situation: Miranda suspects that there may be a problem with the hardware of her computer. While providing information to her support technician online, she mentions the name and version number of the program, as well as any special settings or configurations she thinks may be relevant.

Answers

Answer: Answer below.

Explanation:

I'm not fully sure myself, so don't agree with me fully.

I believe what she may have done wrong is tell the technician about a "program." A program doesn't have to do anything with physical hardware.

Maybe what year she bought it I’m not sure

Which of the following could be omitted from a company's AUP? , Permissible lunchtime online activities , Employees' home email addresses , Rules on use of social networking , Policy on password strengths for highly sensitive data access

Answers

Answer:Which of the following is the reason the ABC company's security administrator is ... Rule #1 allows the Accounting workstation to ONLY access the web server on the ... There is a BYOD policy for the employees so that they can connect their ... Password breaches to the social media site affect the company application as well.

After I become eligible to become a mod what do I do after

Answers

Answer:

I say you do what you want to do as a Mod! What was your goal? Why did you become one? Think of that and maybe you'll get your answer

Explanation:

If I’m getting this right you are a moderator of some server or domain you should make sure there is no chaos in the server and no one is sending out any inappropriate or confidential content or information. (Do not abuse mod this could lead to your role being taken away{keep in mind})

Which type of error occurred in the following lines of code?

>>> print("Good Morning")
SyntaxError: unexpected indent

logical error

reserved word error

exception

syntax error

Answers

reserved word error.

Reserved word error is the type of error occurred in the following lines of code. Hence, option B is correct.

What is lines of code?

A line of code, independent of the number of statements or fragments of statements on the line, is any line of text in a piece of code that is neither a comment or blank line, as well as header lines.

The LOC is categorically comprised of any lines that contain a variable declaration of any kind, as well as executable and non-executable statements. Furthermore, 4000 lines is just too many apart from being impossible. The vast majority of modern development approaches would divide up important tasks in this fashion.

The volume alone would be too much to QA or unit test, and it would be a reason for concern from an architectural and organizational standpoint.

Thus, option B is correct.

For more details about lines of code, click here:

https://brainly.com/question/22366460

#SPJ2

With what information should you provide your support technician if you encounter an error message? the error text and code the configuration of the program the computer’s memory storage capacity the hardware speed and capacity

Answers

Answer:

the error text and code

Explanation:

technicians are very skilled and have likely dealt with your problem before. giving them the error text and code can help them figure out our problem and help you solve it faster and better

The error text and code I had this problem last year

Complete the statement below with the correct term. The best place to start when you are looking for information about a device or an application is the "blank" of the company that manufactured the device or programmed the software. whoever answered first will get brainleast plsssssss

Answers

Answer:

website

Explanation:

The best place to start when you are looking for information about a device or an application is the website of the company that manufactured the device or programmed the software.

Answer:

The companys help page.

       

explain the history of computing of mechanical era

Answers

Answer:The Mechanical Era

Created a machine that could add and subtract numbers. Dials were used to enter the numbers. ... Designed a machine called the Analytical Engine. The design had all the basic components of a modern day computer. In addition, it was designed to be programmable using punched cards.

Explanation:Hope this helped

Which of the following statements is true regarding input and output?

Input is the raw data that is entered into the computer for processing.

Input devices, such as a printer, are used to convey interpretations to users after processing.

Output devices, such as a keyboard, are used to enter data into a computer.

Output is data before it is processed and is not necessarily meaningful.

Answers

Answer:

Input is the raw data that is entered into the computer for processing.

The second one input devices , such as a printer , are used to convey interpretations to users after processing

Complete the statement below with the correct term. In most cases, the more "blank" your question is on a forum, the better.

Answers

Answer

I think it’s ideas maybe

Explanation:

The answer to your question is ideas because I think it is

Select four types of malicious software. Viruses, Tokens, Algorithms, Trojan horses, Spyware, Keys, Worms.

plssssssssssssssssss ill give brainleast to whoever answers first

Answers

Answer:

virus, trojan horses, spyware, worms

Explanation:

This is the thing that I don't understand why did they banned private chat like there are long-distance relationships, and friendships like they just ruined their relationship and sometimes some people got secrets they wanna tell someone else but they can't do that anymore just because the banned it!! And I'm sorry for those who lost the friends bf gf....

Answers

Answer:

lil

Explanation:

private chat for what..?

In three to five sentences, discuss the process you would use to determine whether Internet resources are suitable and reliable sources of information.

Answers

You would have to look at the end of the website. See if it had a .org .net etc. Then you would do a little more research on it an check the bottom of the page to see if it’s real.

Based on substantial evidence, Scholarly, peer-reviewed articles and books are examples of widely regarded sources. Trade publications, professional books, etc. books, newspaper pieces, and magazine articles from reputable publishers.

What are the Internet reliable sources of information?

Although we have free access to a wide range of sources, the material given may not always be trustworthy or accurate because anybody could have written it.

Peer-reviewed publications, governmental institutions, research think tanks, and professional associations are examples of reliable sources.

Due to their strict publishing guidelines, reputable information can also be found in major newspapers and periodicals. All content must be fact-checked before publication in reliable news sources.

Therefore, people from all around the world can access and add to the useful information on the Internet.

Learn more about Internet here:

https://brainly.com/question/14823958

#SPJ2

Other Questions
similar triangle question Having been discovered, Rover looked up at his owner with puppy-dog eyes. Which of the following groups of words is misplaced in the sentence above? a. his owner b. Rover looked up c. been discovered d. with puppy-dog eyes What is 75% of 140? Which is a more reactive chemical, Ca or Ga? Classify the number of seats in different classrooms in the school. a.Qualitative and Continuous b.Quantitative and Continuous c.Quantitative and Discrete d.Qualitative and Discrete how was the world divided by portugal and spain in the treaty of tordesillas? Simplify the expression: 5(2y + 2) What two countries dominated trade during the Age of Exploration? A Spain and Italy B Portugal and England C France and England D Spain and Portugal A liquid storage container is being filled at a constantrate. The container is being filled at a rate of gallonminute.How many gallons of liquid will be in the container in 4minutes?1per1. Unit rate:gallonsO 12 gallons3gallons (4) gallonsminutes (4)1 minute16gallons3O 48 gallons2. Find the equivalent rate for 4 minutes. Find the value of x and YZ if Y is between X and Z. Draw, label, set up the equation and solve each for :4. XY = 5x, YZ=x, and XY=255. XY = 12, YZ=2x, and XZ = 287. XY=2x + 1. YZ = 6x, and XZ=816. XY = 4x. YZ=3x, and XZ = 42 A high concentration of hydrogen ions means a solution is what? very basic neutral very acidic neither acidic or basic Which of these is one of the core functions of an operating system?O browsing the webO monitoring for malwareO running applicationsO sending and receiving email The digestion of food begins in where? The ancient Egyptians believed that the world consisted of the land, sky, and underworld. They saw that nature had cycles. The Nile flooded every year. Plants grew and died, but grew again. The ancient Egyptians believed that people were also part of the cycle of nature. They believed that they could travel to the lands of the gods in the afterlife. They hoped to see their families after death. Ancient Egyptians believed that, for a soul to gain the afterlife, the body had to be preserved. They developed an embalming process called mummification. The Book of the Dead contains spells that were believed to protect the dead on their journey. The spells were said to allow the dead to defeat danger on their journey to the underworld. The funeral marked the transition from the world of the living to the land of the dead. Ancient Egyptians believed that the dead would make a long journey through the underworld to the Hall of Truth. There, the dead would face a great test. Their soul would be weighed against a feather. Good deeds would make the soul as light as the feather. Bad deeds would make the soul heavy. That soul would not gain the afterlife. What did ancient Egyptians believe about the world? Choose four answers. People traveled through an underworld. The soul was weighed for good deeds. There was no afterlife. The soul was weighed for its wealth. The Book of the Dead contained spells. The dead had to pass a test to gain the afterlife. Help please Biology!! The divisions of the nervous system include the___.A. Cranial nervous system and the axial nervous system B. Central nervous system and the peripheral nervous system C. Superior nervous system and the inferior nervous system D. Central nervous system and the lateral nervous system What equation is ALWAYS TRUE? WHEREDoes government get it's power? Give definition of microeconomic and macroeconomics Please help this is the last question on my test!! What is the approximate area of a circle with a radius of 4 feet? Use 3.14