1.Accessing the file systems
2.Using Accelerometers
3.Online users
4.Using specific Locations
Answer:3