1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lina2011 [118]
3 years ago
5

Many 12-15 yrs hv access to the internet which cannot be supervised by an adult.i need 5 problems tht this might cause

Computers and Technology
1 answer:
vazorg [7]3 years ago
6 0
Okay, I have watched a lot of videos about this because my school wants me too, here is what I learned.

1: Stalkers, teens might go on the internet and see someone who they think looks good, they will give them there phone number or address, and a lot of times, it is some bad person that wants to harm you.

2: Cyber Bullying, there is a lot of bullying happening on the web, especially on social media sites. A lot of times, this can cause the teenager to lose confidence or something like that.

3: Learning things, teens learn a lot of things on the web these days. Violence can be limited if parents supervise their children while on the web.


4: Honesty, someone might go on the web and say to his parents, "I am studying for tomorrows Math test. I will try my best". And in reality, he is playing video games or watching videos. He can have the "essay" page opened, and on another tab, a game or video is opened.

5: Plagirism, websites like Brainly are designed to help a student learn by interacting with other students. However, some kids just go on, get the answer, answer the question, and in the final exam, they get a failing grade. This has happened a lot and it is increasing every day.

With parental supervision, this stuff can be reduced by a lot!

Hope that helps!  
You might be interested in
2. Select the things you can do when working with rows in columns in a spreadsheet:
Kay [80]
I think you can do all of those things to rows and columns when working with a spreadsheet.
5 0
3 years ago
Which part of a computer s ip address configuration indicates the portion of the address that specifies the network address?
vivado [14]
The NETWORK mask is and'ed with the IP address to get the network number.

Example:

192.168.1.1 & 255.255.255.0 = 192.168.1.0/24

It's worth the effort to do this in binary, it makes much more sense.
4 0
3 years ago
Which tool allows users to share code and also serves as a social networking
nikklg [1K]

Answer:

D. GitHub

Explanation:

A P E X

8 0
3 years ago
What is the different between ethical and legal issues?​
Bad White [126]

Answer:

Ethical issue is anything that a person believes to be right or wrong that generally comes down based on personal opinion or a persons belief or philosophy while legal issue is any act done by a person whether he/she thinks it is right or wrong, whether it conforms to the law and needs legal expertise.

Explanation:

7 0
4 years ago
Portable computer, also known as laptop computer, weighing between 4 and 10 pounds is called a. Internet b. Scanner c. Printer d
quester [9]

Explanation:

portable computer also known as laptop computer weighting between 4 to 10 pounds is called a Notebook computer.

7 0
3 years ago
Other questions:
  • What is true about music from the Romantic period?
    14·2 answers
  • The linux command _______ can be used to list the current disk devices connected to the computer.
    8·1 answer
  • How do particles move at higher temperatures compared to how they move at lower temperatures?
    10·1 answer
  • When a piston has three rings, the bottom ring will be?
    9·1 answer
  • If you omit the filename from a URL, the Apache web server displays a list of files and directories if the specified directory d
    15·1 answer
  • 19. Fair use applies to which of the following situations?
    14·1 answer
  • What if you put a flashdrive in a iphone block and plug it in an outlet
    7·2 answers
  • FREEEEEEEEEEEEE FREEEEEEEEEEEEE Pointttssss​
    6·2 answers
  • State two ways of preventing virus attack on a computer.​
    12·1 answer
  • What are some common predefined number formats used in the United States? Check all that apply.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!