1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lina2011 [118]
3 years ago
5

Many 12-15 yrs hv access to the internet which cannot be supervised by an adult.i need 5 problems tht this might cause

Computers and Technology
1 answer:
vazorg [7]3 years ago
6 0
Okay, I have watched a lot of videos about this because my school wants me too, here is what I learned.

1: Stalkers, teens might go on the internet and see someone who they think looks good, they will give them there phone number or address, and a lot of times, it is some bad person that wants to harm you.

2: Cyber Bullying, there is a lot of bullying happening on the web, especially on social media sites. A lot of times, this can cause the teenager to lose confidence or something like that.

3: Learning things, teens learn a lot of things on the web these days. Violence can be limited if parents supervise their children while on the web.


4: Honesty, someone might go on the web and say to his parents, "I am studying for tomorrows Math test. I will try my best". And in reality, he is playing video games or watching videos. He can have the "essay" page opened, and on another tab, a game or video is opened.

5: Plagirism, websites like Brainly are designed to help a student learn by interacting with other students. However, some kids just go on, get the answer, answer the question, and in the final exam, they get a failing grade. This has happened a lot and it is increasing every day.

With parental supervision, this stuff can be reduced by a lot!

Hope that helps!  
You might be interested in
The _______ "represents a set of features that enables the user to inform himself whether a security feature is in operation or
quester [9]

Answer:

Visibility and configuration of security.

Explanation:

The visibility and configuration of security represents a set of features that enables the user to inform himself whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.

4 0
3 years ago
To specify your preferred colors, fonts, and effects for a document, which of the following should be done?
Irina-Kira [14]

Answer: crest custom theme

Explanation:

8 0
2 years ago
Read 2 more answers
Write c program to check character is alphabate or not?​
Elan Coil [88]

Lookup the isalpha() function in the C standard library, this function will check and return non-zero for alphabetic characters.

8 0
3 years ago
Which type of workplace culture emphasizes the development of new skills?
Archy [21]
Involvement is the answer just took it. thank you

6 0
3 years ago
Read 2 more answers
What was most monumental decision in making a trip to Oregon?
White raven [17]

Answer:

A. The amount of food to take on the journey

Explanation:

Hope you get it right!!

3 0
2 years ago
Read 2 more answers
Other questions:
  • Which of the following code segments could be used to skip the first two characters of an input line (they may or may not be whi
    13·1 answer
  • ________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared po
    9·1 answer
  • A corporation needs an operating system that allows the various teams in its office to network and collaborate on projects. Whic
    10·1 answer
  • The best place to start when you are looking for information about a device or an application is the ____ of the company that ma
    14·1 answer
  • We are sending a 30 Mbit MP3 file from a source host to a destination host. All links in the path between source and destination
    12·1 answer
  • Being able to express your thoughts in an email is a primary technology skill. true or false.
    9·2 answers
  • Can anybody do Algorithm 2 for me (with Python).<br> Answer = 25 points.
    13·1 answer
  • Write a public static method named evens that takes in 1 argument int a, and returns a String containing all positive even numbe
    8·1 answer
  • Explain briefly why it is sometimes necessary to roll software back to a previous version, a procedure called "software
    9·1 answer
  • Which job qualifications are typical for someone who wants to work in Information Support and Services?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!