What is electricity? This strange word that doesn’t even appear in the dictionary is the translation of the English word “electricity”. Its meaning refers to the implementation of techniques that are used to collect knowledge or information about people. Therefore, the request is nothing more than a technique used to obtain information discreetly, without the person discovering it.
This makes it necessary to obtain the information directly from the person who owns it, but to achieve it without suspicion, without the other person realizing that the goal is to obtain information, you cannot be asked directly. you may never know that they have provided important information.
- A person with a great knowledge of the request needs to know a lot about others.
- About their behavior and about the cultural differences and predispositions that exist.
- Voters are often people who want to help.
- Even strangers.
- Are characterized by a desire to appear.
- Well-informed people.
- Able to talk about any subject and very professional.
The elictors develop certain themes and talk a lot about gossip, they tend to correct others. They tend to believe that others are honest and refuse to be suspicious. When asked honestly, they often tell the truth, but they also tend to convince others that their opinion is true.
There are many application techniques. The use of each will depend on the time and skills of the voter, some of them are presented below:
The first step in preventing them from getting the relevant information we have is to know what information is relevant. Of all we know, what can be useful to others?Once we’ve identified this valuable information we have, it would make sense to suspect anyone who asks us. Never provide information to people who are not allowed to know you, including family members and close friends.
To avoid any eritation, several things can be done. Some of them are
In a world where information is increasingly important, our personal information, our work, etc. , can be valuable to others, luckily not all of our information is shared over the network, although this may lead some people to try to get it. They may try to steal it from us using application techniques, but now we know how to recognize and avoid them, of course on other occasions it will be us who will use electricity, for example, if you want to know a friend’s tastes to give them a gift, you know how to get the information you are looking for.