1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lina2011 [118]
3 years ago
5

Many 12-15 yrs hv access to the internet which cannot be supervised by an adult.i need 5 problems tht this might cause

Computers and Technology
1 answer:
vazorg [7]3 years ago
6 0
Okay, I have watched a lot of videos about this because my school wants me too, here is what I learned.

1: Stalkers, teens might go on the internet and see someone who they think looks good, they will give them there phone number or address, and a lot of times, it is some bad person that wants to harm you.

2: Cyber Bullying, there is a lot of bullying happening on the web, especially on social media sites. A lot of times, this can cause the teenager to lose confidence or something like that.

3: Learning things, teens learn a lot of things on the web these days. Violence can be limited if parents supervise their children while on the web.


4: Honesty, someone might go on the web and say to his parents, "I am studying for tomorrows Math test. I will try my best". And in reality, he is playing video games or watching videos. He can have the "essay" page opened, and on another tab, a game or video is opened.

5: Plagirism, websites like Brainly are designed to help a student learn by interacting with other students. However, some kids just go on, get the answer, answer the question, and in the final exam, they get a failing grade. This has happened a lot and it is increasing every day.

With parental supervision, this stuff can be reduced by a lot!

Hope that helps!  
You might be interested in
A small company has a web server in the office that is accessible from the internet. the ip address 192.168.10.15 is assigned to
vaieri [72.5K]
the ip nat inside source command to link the inside local and inside global addresses

I hope this helps! :)
5 0
3 years ago
Why are hardline Ethernet connections always faster than WiFi?
Bumek [7]
Because Ethernet uses cables, it tends to work slightly faster than a wireless connection. Wireless connections are a bit slower, but provide the convenience of using it within range. Today, WiFi hotspots can easily be found in many places. Thus, the choice lies between speed and convenience.
Wi-Fi vs. Ethernet: Which Connection to Use?
by Allen Jame
3 0
3 years ago
The picture that graphically represents the items you use in windows is called a/an
Marizza181 [45]
The picture that represents the items or programs is called a icon, you can change the icon or delete it
4 0
3 years ago
Read 2 more answers
Help me with ic3!!!!!!!
Scilla [17]

1. Locally 2. Codec 3. Analog, Digital 4. ISP 5.

4 0
3 years ago
John Sgromolo works for the 20th-largest accounting firm in the United States, but he's not an accountant. He works with hard dr
pishuonlain [190]

Answer:

Sgromolo engages in data mirroring

Explanation:

The end goal of data mirroring is to increase data protection by providing shields to a computer system thereby preventing it from data loss and other possible losses due to data failures.

The technique used in data mirroring is that, it uses realtime protection of data by taking a data and replicating the exact copy without adding to or removing from it, to another storage location.

In this technique, Sgromolo picks up these data people think are n longer usable, and duplicated by being written to two or more identical hard drives, all of which are connected to one disk controller card.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Because health and safety are important in all workplaces, not just hazardous ones, what working conditions must ALL employers p
    10·2 answers
  • Using Word, Maureen is writing an outline of a presentation she plans to give to her company. She will be showing a video during
    12·2 answers
  • #include
    9·1 answer
  • The mobile nodes (devices) add or leave a Mobile Ad-hoc Network, changing the _____ of this network over time. a) infrastructure
    14·1 answer
  • In excel, a number can contain the characters__
    8·1 answer
  • Chang investigates ways to improve the interactivity of computer hardware. His job title is best described as ✓ Computer and Inf
    14·1 answer
  • Place the steps in order for creating a filter in Outlook 2016.
    9·1 answer
  • (10 LC)
    5·1 answer
  • Becca is working on a program that will store data. The program will need quick access to data and data persistence is not impor
    15·1 answer
  • Please solve this in JAVA<br><br> Please see the attachment
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!