Multitasking, it allows you to do more than one thing at once. 
 
        
             
        
        
        
so is it all about codes and codes and codes and codes and codes lol
 
        
             
        
        
        
We must be careful of when retrieving messages/data from mobile devices in public because of Bluebugging.    It is a form of attack through the use of Bluetooth.  It is more than just Bluesnarling and Bluejacking.  It goes beyond, allowing the thieves to take control of a device.
 
        
             
        
        
        
Answer:
a. Checksum
Explanation:
Based on the information provided within the question it can be said that the field that represents this information is called the Checksum. Like mentioned in the question this refers to a value that represents the amount of bits in a certain transmission message. This is done in order to make sure that the amount of bits that were sent match the amount that were received in order to make sure that no data was lost in transit that would cause high-level errors.
 
        
             
        
        
        
Answer:
Crisis-Mapping
Explanation:
Social networks are characterized by the immediacy of the content that users produce, and that same feature can be transferred to the online mapping of crises and conflicts.
Characteristics Crisis-Mapping:
- Real-time information processing.
- Immediacy;
- Visualization of the aggregated information can allow the detection of patterns that cause new analyzes to be undertaken or work hypothesis to verify.
- Continuity in the tasks, the maps record activity without interruption during the twenty-four hours of the day and seven days per week.
- 
Flexibility in the protocols, since the tasks are distributed and evolve according to the dynamics (the crisis maps evolve with the crisis itself).