1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew-mc [135]
3 years ago
8

After reviewing the resources and taking notes, decide where you stand. Should the government—and schools—be able to access your

social media and cellphone information? If so, under what circumstances? Write your response below. Make sure to clearly state your position on the topic and support it with strong reasons and specific examples.
Business
2 answers:
Dafna1 [17]3 years ago
8 0

Yes, if schools have a “Monitoring Program” they have rights to check. Also Government uses “Social media monitoring” in order to protect our country from terrorism.

<u>Explanation: </u>

Schools throughout America, from Florida to California, have already been tracking their student's social media profiles over the last few years. Although there is no guarantee that students don't want educational institutions to look at their social media profiles, public information monitoring can help protect children from illegal or abusive behavior.

For Example: Monitoring software helped Florida school launch 12 criminal investigations in 2015.

Government security organizations such as the NSA also can hack the computers. This ensures that intelligence agencies will listen to your phone calls, read your tweets; record your images, monitor your videos, check your emails, and snatch your data, at any time they want. Surveillance helps authorities to keep social control, detect risks, prevent and prosecute criminal behavior.

larisa [96]3 years ago
6 0

Answer:

Yes, I think that even social media and cell phone information is personal it should be reviewed if there are enough reasons to think that you are a threat to others.  

Explanation:

Currently there are constants news of shootings in social spaces like malls, schools, bars, metro stations and so on. The persons that commit those crimes might leave leads in their social media that can become important to prevent these crimes.  

The most recent case of shooting in the Santa Clarita school in California depict how social media is always investigated to determine the motives of these crimes. Therefore, would not be better to look social media before these events occur? From this perspective I agree with the access to social media and cell phone content .

You might be interested in
The government has set a price floor on bread. Manufacturers cannot sell loaves for less than $5.00, which is a dollar above the
insens350 [35]
The most likely result of this price control would be that the <span>demand for bread will fall, which could result in an excess supply. his excess supply in the market would ultimately force the hand of the manufacturers to stop the production of bread. I hope that this is the answer that has come to your help.</span>
3 0
3 years ago
Read 2 more answers
Jeremy works as a member of a sales team. He never gets involved in conflicts at work. He seems to have the ability to deal with
I am Lyosha [343]
Diplomacy best describes Jeremy’s ability to interact with his co-workers.
3 0
3 years ago
Read 2 more answers
Which business model has traditionally been used by magazines
Andrej [43]
According to Quora dot com, US magazines are viewed as historically dependent on advertising revenue hence why subscriptions to magazines are historically very low as advertising is used to subsidise cover price or subscription cost.

With the general collapse of print publications in the US, particularly led by the drying up of physical newsstand presence, magazines have a harder time getting into consumer's hands. This means that advertisers are less likely to spend in a publication (readership decreasing) and then advertising revenues go down, making magazines less and less profitable.

I realize this is quit lengthy so I'd sum it up to saying the business model for magazines has traditionally been the selling of advertising space ... Not sure if this is what you're looking for
7 0
2 years ago
Read 2 more answers
Select the items that describe what happens at the equilibrium price. Producers supply the exact goods that consumers buy. Consu
Mekhanik [1.2K]

The items that describes what happens at the equilibrium price are:


Producers supply the exact goods that consumers buy.

Consumers have enough goods, at the given price.

Producers used their resources efficiently.

Equilibrium pricing is when the items demanded match the items supplied. When this happens, the demand and good available equal each other, hence, equilibrium. The pricing is exactly where it should be for consumers to want and purchase the good or service.

6 0
3 years ago
Read 2 more answers
What is the risk posture for each particular system as it contributes to the overall risk posture of the organization
Nutka1998 [239]

Please find attached full question Answera and Explanation:

Risk posture or cybersecurity posture is the general status or overall defense of the cybersecurity program in place in an organization to guard against cyber attacks and data breaches. For a company to maintain reasonable cyber security posture as there is no fool proof cybersecurity posture, there is need for regular continuous assessment of risk exposures and potential loopholes across the company's digital infrastructure. There are different digital and sophisticated infrastructures utilized by am organizations and most if not all are well prone to cyber attacks. These infrastructures are used by employees for work e. g-email, went servers, phones, networking devices and cloud programs etc . Therefore each employee must be educated in the need to safeguard company data by looking out for traps set by cyber attackers such as phishing in email and many other loopholes. Vulnerability tests need to be performed at regular intervals and reports monitored and analyzed to protect against a potential source of cyber attack.

7 0
2 years ago
Other questions:
  • He degree to which an organization achieves a stated goal rehttps://.com/35621172/mgt-3013-ch-2-flash-cards/
    9·1 answer
  • Prepare a statement of cash flows using the indirect method for the year ended June 30, 2019. (Amounts to be deducted should be
    6·1 answer
  • There are three key reasons for putting the customer into customer solutions in selling: (1) considerable time and effort is nec
    5·1 answer
  • If the mpc is 0.70 and investment increases by $3 billion, the equilibrium gdp will
    6·1 answer
  • Last year Susana's mother, Maria, suffered from a heart attack and is no longer capable of caring for herself. Maria made arrang
    8·1 answer
  • Marketing managers at a cosmetic company wanted to find out how resistant their product is to smudging. They hired a research fi
    7·1 answer
  • The U.S. GAAP Financial Reporting Taxonomy is an electronic dictionary of business reporting elements used to report ________.
    5·1 answer
  • Sylas is studying financial planning in one of his classes. his teacher has assigned him to create a timeline of his financial f
    13·1 answer
  • High Step Shoes had annual revenues of $202,000, expenses of $112,200, and dividends of $24,800 during the current year. The ret
    12·1 answer
  • If an economy maintains a small rate of growth for a long period of time, then the size of the economy?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!