1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Georgia [21]
3 years ago
7

What is a privacy concern with using modern technology?

Social Studies
1 answer:
Andreas93 [3]3 years ago
8 0
A privacy concern with using modern technology is the use of sharing of data from multiple sources. This is because, this policy gathers all the information and data from each person, and steals it.
You might be interested in
PLEASE HELP!!!!!!
butalik [34]
It would be A. Punic Wars
6 0
3 years ago
How did the Toleration Act of 1649 show that religious attitudes in the middle colonies were different from the attitudes in New
Sergeeva-Olga [200]

Answer:

The law showed that the middle colonies were more tolerant of different religions than the Puritans of New England.Explanation: I took the test;)

3 0
3 years ago
Read 2 more answers
What is the best way to address the problem of nonresponse bias?
Vinil7 [7]
Design your survey carefully; use well-trained staff and proven techniques.
Develop a relationship with respondents. ...
Send reminders to respond.
Offer incentives to respond.
Keep surveys short.
Brainliest?
7 0
3 years ago
Susan is a hacker. after breaking into a computer system and running some hacking tools, she deleted several files she created t
igomit [66]

The actions that Susan made are clearly an irruption to someone’s privacy. With that said, basically, Susan is a person whose abilities allow her to meddle into someone’s business without their permission. This is what people usually call as “privacy violation” since the person who is stealing someone’s information is doing it without them to know.  

Hacking is a very common activity nowadays. There are some apps and tools that facilitate this kind of task,s for hackers. Sometimes they have their own hacking software but it is pretty common to do it throughout programming.  

The problem with this kind of activities is that it is a moral dilemma since it is a cybernetic felony that send people to jail and sometimes they also have to pay a bail in order to not to go to prison if they are discovered and caught.  In the worst scenery, people that commit this type of crimes, are both convicted and forced to pay the bail.  

Most of the time, people or enterprises are hacked because their system is very vulnerable so that makes it really easy to hack. This is one of the reasons for the new type of security that is being implemented in people’s computers in order to avoid this type of misfortunes that currently affect many people around the world.  

To summarize, Susan’s occupation can be described as a chain of risky activities that she has to do in order to avoid being discovered by the person she attacked; so that, she always must be very careful to not let any trace behind her actions.  


6 0
3 years ago
Read 2 more answers
Vocal sounds that are not included in one's native language first begin to disappear from usage during the ________ stage of lan
timama [110]
I believe answer would be BABBLING
7 0
3 years ago
Read 2 more answers
Other questions:
  • How would you help this person change his or her inflow (income) and outflow (expenses) to improve his or her financial health?
    15·1 answer
  • Which of the following are true statements about Franklin Roosevelt's experience with polio? A. He made those who came to see hi
    12·2 answers
  • Primary emphasis in the economic model of social responsibility is on
    13·2 answers
  • The cause of the Gulf War was the __________.
    15·2 answers
  • Mati may engage in sexual relationships with which of these groups?
    6·1 answer
  • The asteroid 2008 AF4 has one chance in 21,000 of hitting the Earth between the years 2078 and 2100. The asteroid is 390 meters
    15·1 answer
  • Select the correct answer.
    14·1 answer
  • The ADA states that a service animal can be any animal that the passenger deems a service animal and must be permitted on the ve
    7·2 answers
  • Carbon dioxide stomata respiration organism nutrients adaptation photosynthesis reproduce chloroplast chlorophyll
    13·1 answer
  • PLEASE ANSWER!! Which animal is NOT found in waters near the Dominican?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!