1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elixir [45]
3 years ago
14

Which is an example of oversharing using GPS?

Computers and Technology
2 answers:
sergij07 [2.7K]3 years ago
7 0
I believe it is D


Social media networks make it easy to help share what’s going on in your life. The problem is when the wrong people get hold of that information. Criminals are smart. They’re connected, and they know how to use the Internet to their advantage. Stalking a victim, getting to know their routines and the times they’re home (and when they’re not) is as easy as opening a web browser and checking an open account. This excellent infographic from Credit Sesame helps illustrate exactly how your social media info can be misused. Last week, Cult of Mac ran a story that went viral about an app called Girls Around Me which aggregated public profiles of women in an area. Everything from check-ins, status updates, profiles and photo albums were aggregated for app users to see. As a result of the article, Foursquare has since revoked the app’s API access, disabling many of the app’s features. Scary stuff. While the app is hopefully mothballed, it highlighted a lot of security risks that are associated with being on social media. The safest option is to simply not use social media. But I’ll be honest: I can’t imagine deleting my social profile. Luckily, you don’t have to. Being vigilant about safeguarding your profile – and being selective about what you share and who you share it with – can help reduce the risk of using social media.


If you need more info LMK. If this is incorrect please comment that it is, along with the correct answer so I can figure out my error, have a great day TPWK
lidiya [134]3 years ago
4 0

Answer:

It’s B

Explanation:

You might be interested in
Which term describes encryption that protects the entire original ip packet's header and payload?
mario62 [17]
The answer is <span> tunnel mode encryption.   This</span><span> describes encryption that protects the entire original ip packet's header and payload.  A tunnel mode encryption </span><span>protects the internal routing information by encrypting the IP header of the original packet. The original packet is encapsulated by a another set of IP headers. .<span>Additional headers are added to the packet; so the payload MSS is less.</span></span>
7 0
3 years ago
Read 2 more answers
How to disappear completely from the internet pc magazine
GREYUIT [131]

In order to disappear completely from the internet, one needs to delete their social media accounts, delete their emails, etc.

The internet is a network of interconnected computer systems. Despite its numerous advantages, it also has several disadvantages and there are some moments when we want to disappear from the internet.

The steps that are needed to disappear from the internet include:

  • Delete your social network accounts.
  • Delete your email accounts.
  • Use search engines to track your old activities online and delete them.
  • Falsify the accounts that can't be deleted.
  • Unsubscribe from mailing lists.

Read related link on:

brainly.com/question/24902823

4 0
3 years ago
Which term best describes a network connection that uses the Internet to give mobile users or branch offices secure access to a
NNADVOKAT [17]

Answer:

Virtual Private Network (VPN)

Explanation:

A VPN can extend a private network over the internet securely to a mobile user or branch office. The traffic is encrypted between the private network and branch office or mobile users. VPN enables users to access and share resources like they were directly connected to the main network.

6 0
3 years ago
1) Only analog signals can be used to transmit information.<br><br> a) True b) False
Contact [7]

Answer: False

Explanation:

Digital signal is used for transmission of information over a dedicated line wheres for using analog signal for transmission of information it is first converted to digital to be able to transfer it across long distances./

3 0
3 years ago
The high-latitude climate is _____________ the equator.<br><br> closest to<br> farthest from
BARSIC [14]
I believe it’s farthest from
5 0
3 years ago
Other questions:
  • Which connector is most commonly used to connect printers to desktop pc systems?
    10·1 answer
  • 1. Of which of the following is a box an example?
    10·2 answers
  • EVERYONE PLS JOIN MY GOOGLE CLASSROOM<br> CODE: clmvjbd
    13·2 answers
  • Sami is creating a web page for her dog walking business. Which item will set the theme for her page? Background color Heading c
    11·2 answers
  • Word processing software programs can run on smartphones.<br> True<br> Or <br> False
    6·1 answer
  • Microsoft PowerPoint is popular software that allows you tocreate slides, handouts, notes, and outlines.
    12·1 answer
  • Which devices are most likely to communicate with the internet? Select 3 options.
    13·1 answer
  • Write 5 things that can be done to avoid computer vision syndrome
    8·2 answers
  • Which slideshows design can not be use?
    12·1 answer
  • if the input message is omitted when creating a data validation rule for a cell, no message will appear when the user selects th
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!