I think the answer to that is /var/log hope this helps
We must be careful of when retrieving messages/data from mobile devices in public because of Bluebugging. It is a form of attack through the use of Bluetooth. It is more than just Bluesnarling and Bluejacking. It goes beyond, allowing the thieves to take control of a device.
Answer:
d. involves analyzing end-user business requirements in order to refine project goals
Explanation:
In the software development life cycle, the implementation stage is the stage where the computer programmers begin the actual coding of the application required by the end-user. At this stage, the developer takes into account the needs and specifications of the customer.
For example, if the end-user wants a software application that can track payment records, the researcher at this stage begins using the right software to code programs that can effect this function.
A. yield to the car on your right