1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lukranit [14]
3 years ago
6

The FaceSnap app has permission to use many devices on your smartphone, including the camera. A data privacy concern that arises

from this is that the company could access the camera to see what you're doing without your knowledge. In the space provided below explain: Why the student would not be awarded either row based on the scoring guidelines. Make a suggestion(s) for how to modify the response so the student would get the point.
Computers and Technology
1 answer:
Mazyrski [523]3 years ago
5 0

Answer & Explanation:

The understudy portrays the processing advancement. They likewise don't make reference to how the information is expended from the application. For push 7, they don't give a particular information security concern which is the reason they don't procure the point for that.

So as to improve the reaction, the understudy ought to depict what FaceSnap does, alongside what they do with the information got just as how it is worried that the application utilizes the camera application of the telephone.

You might be interested in
HELP ME PLEASE
MAXImum [283]

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

4 0
2 years ago
The creation of MySpace pages by candidates in the 2008 Presidential Election is an example of the use of ___________________ to
jarptica [38.1K]
This is descriptive of the use of mass media.
7 0
4 years ago
What does the term, World Wide Web refer to? the Internet a selection of documents from zoos and universities related to web-spi
kupik [55]

Answer:

all hyperlinked web pages on the internet

Explanation:

The term 'world wide web (WWW)' refers that, it is web of pages on the internet that hyperlinked. These pages are from all over the word that's why called world wide, and word web means that all the pages are interlink with each other as like web.

7 0
3 years ago
You can expect to see ________. it's for drivers ed.
Ierofanga [76]

Answer:

D

Explanation:

6 0
3 years ago
Here’s the revenue and expenses for the month. Calculate whether Mia had a profit or loss?
Usimov [2.4K]

Answer:

ikr????

bruh.

Explanation:

3 0
3 years ago
Other questions:
  • What's the risk or effect of software piracy?
    12·2 answers
  • Press the _______ key to move to the next cell in a row.
    12·2 answers
  • Windows 1.0 was not considered to be a "true" operating system but rather an operating environment because _____.
    13·1 answer
  • im in honors comupter science and one of my questions is evaluate 18% 7 does anyone know how to answer that
    6·1 answer
  • How can you tell that a spreadsheet was saved as a 2007 Excel file?
    7·1 answer
  • A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed throu
    5·1 answer
  • During which geologic era was nearly all of Earth's land concentrated into one giant mass called Pangaea?
    6·1 answer
  • Anyone has any ideas for a gaming setup i can buy for christmas. Something with high framing rates (monitor included) for about
    15·1 answer
  • What is a best practice when approaching an automation effort?
    6·1 answer
  • Write two sentences but each one having either computer in it or technology in it. You can use a word more than once in a senten
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!