1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
3 years ago
11

According to a recent study, more than 75 percent of teens between the ages of twelve and seventeen in the United States have a

cell phone. Six percent of these teens use location services, which let users "check-in" to a location or share their locations with friends. What dangers might be associated with using these location services?
Computers and Technology
2 answers:
Murrr4er [49]3 years ago
6 0

Answer:

Professional thieves can track your every movement and use pattern-recognition to find out where you live. This way, they would be able to raid your house when you are not there, making the entire process much easier.

Data can also be stored and sold. It been confirmed by numerous reputable sources such as CNET. There have been many different lawsuits in the last few years which were based on the fact that the defendants had sold location data from their applications to third parties

KonstantinChe [14]3 years ago
4 0

Answer:

People that are good at tracking and doing other crimes may be able to track teens down and kidnap them or do something worse.

Explanation:

You might be interested in
Richard wants to create a cloud-based system that will be a centralized repository of log files from various servers in the orga
jeyben [28]

Answer:

CAD ( d )

Explanation:

Richard should use CAD to create a cloud-based system, since he wants it to be a centralized repository of log files to be taken from the different servers associated with the organization

CAD ; Computer aided design software is the best software to be used because files created using CAD can be easily stored in cloud and it is easily accessible.

4 0
3 years ago
Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces
Cloud [144]

Watchdog Program

This program becomes the number one security mechanism for file access.

Pros:

  1. A benefit of using watchdog program is that you have a centralized mechanism for controlling access to a file
  2. You are assured of having secure access to your file

Cons:

  1. It becomes a bottleneck.
  2. If this program has a security hole, there are no other guaranteed backup mechanisms for file protection.

COPS

COPS is a collection of a dozen programs that attempt to tackle problems in UNIX security. It checks for a number things like poor passwords, device permissions, files run in /etc/rc*, existence of root SUID, and many other things.

Pros:

  1. This program provides methods of checking for common procedural errors.
  2. COPS collect outputs and either mails the information to the admin or logs it in.

Cons:

  1. It could be modified by an intruder or even take advantage of its features.
  2. It is meant to tighten the security, not a tool to be used to find security flaws. It does not directly correct errors found.

5 0
4 years ago
I WOULD REALLY APPRECIATE IT IF YOU ANSWER THIS QUESTION: Which of the following devices transforms electrical energy into mecha
sammy [17]

Answer:

Pencil shapener

Explanation:

7 0
3 years ago
Why do computers make mistakes​
zysi [14]

Answer:

because maybe it is have a virus...

7 0
3 years ago
Read 2 more answers
Worms and trojan horses are examples of
Elanso [62]
The correct answer is malware
7 0
3 years ago
Read 2 more answers
Other questions:
  • What is the special feature of the view side by side command?
    11·2 answers
  • 11. The golden rule of safe driving is: A. Always drive at the posted speed limit B. Never drive while physically or mentally im
    15·1 answer
  • A(n) _______ is text or a graphic you can click to jump to another file or to somewhere else in the same file. quizle
    12·1 answer
  • It is safe to stand on the top step of a ladder provided it is braced property
    10·1 answer
  • For a class project, Jerome builds a simple circuit with a battery and three light bulbs. On his way to school, Jerome drops his
    9·1 answer
  • Write a function to sum the following series:
    8·1 answer
  • What is the name of the process of checking the client's production environment to ensure software and hardware compatibility wi
    5·2 answers
  • I want to make apps but I don't know how and which things I have to learn first ,so if you know mention from starting to ending​
    11·1 answer
  • True or False? Voice recognition is the process of determining the meaning of the words spoken by a human.
    7·1 answer
  • I will give brainyest
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!