The secret garden was written by Frances Hondgson Burnett a classic novel of children’s literature.It’s really very classic and famous.It is a charming book about a girl named Mary Lennox. She is a spoiled and sickly child who lives in India. When her parents die because of a cholera epidemic, she moves to Misselthwaite Manor to live with her rich uncle in England. Things are a definite change for her. Slowly she becomes stronger and starts to take an interest in the outdoors. She meets all sorts of people like Martha, Dickon, and Colin. Martha is a maid on the grounds who has taken a fancy to Mary, and Dickon is her brother. Dickon is quite an unusual fellow. He possesses the ability to talk to animals and is able to grow anything with a little bit of soil. Colin, who you will meet later in the story, is a child who has basically given up the will to live, believing he is doomed to be a hunchback like his father. Strong-willed Mary reprimands him and takes matters into her own hands. Mary has all kinds of adventures with strange sounds at night, funny accents, and a locked garden. The Secret Garden is a wonderful book about friendship, determination, and perseverance.
Allows application to modify global audio settings such as volume and routing.
Allows the application to control the vibrator.
Allows application to access the audio record path.
Allows application to take pictures with the camera. This allows the application at any time to collect images the camera is seeing.
full Internet access
Allows an application to create network sockets.
view network state
Allows an application to view the state of all networks.
view Wi-Fi state
Allows an application to view the information about the state of Wi-Fi.
read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to, ect.
fine (GPS) location
Access fine location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power.
coarse (network-based) location
Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
access extra location provider commands
Access extra location provider commands. Malicious applications could use this to interfere with the operation of the GPS or other location sources.
modify/delete SD card contents
Allows an application to write to the SD card.
retrieve running applications
Allows application to retrieve information about currently and recently running tasks. May allow malicious applications to discover private information about other applications.
change Wi-Fi state
Allows an application to connect to and disconnect from Wi-Fi access points, and to make changes to configured Wi-Fi networks.
change your UI settings
Allows an application to change the current configuration, such as the locale or overall font size.