1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Advocard [28]
2 years ago
14

How does our behavior change when we know we're being watched?

Computers and Technology
1 answer:
Hoochie [10]2 years ago
5 0

I can't even say this is an answer

If there isn't a specific answer for this, I think it depends on everyone. Maybe they'd behave better knowing that their actions are being monitored. Who in their right mind is going to act like a lunatic when they know people are watching.

I think it will most likely alter their attitude in a positive way but it will also most likely be fake actions put on show

You might be interested in
What part of a resource record tells a server how long the record should remain in the cache?
V125BC [204]
Time-to-live or TTL <span>tells a server how long the record should remain in the cache.
TTL is a mechanism that limits the lifetime of data in a network or a computer and prevents data packets from circulating indefinitely.
</span><span>It also improves the caching and privacy of networks and computers.</span>
8 0
3 years ago
Congress are smart becuase.....
spin [16.1K]

Answer:

If we are talking about government then they are smart bc of there two house policies, both are equal yet super unique. They make sure each state has an equal voice in the senate.

5 0
2 years ago
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
The initial step of the five-step problem-solving model is to: A. Explore alternatives B. Clarify values. C. Develop an approach
Alik [6]

Answer:

D. Identify the problem.

Explanation:

         

The five steps are -

  • Identify the problem
  • Understanding the problem
  • Select any alternative way to solve a problem
  • Select the best way to solve a problem from the list of alternative solutions.
  • List the instructions to solve the problem using the selected solution and evaluate the solution .

Identify the problem - This is the first steps towards solving a given problem. One must properly comprehend what exactly the challenge is.

8 0
3 years ago
Citation placeholders allow you to mark positions in your document for citations without stopping to create and insert a new cit
Alecsey [184]
I believe the answer to this is True
8 0
3 years ago
Other questions:
  • How can you different between standard and protocol?
    15·1 answer
  • Quick question how the internet has impacted y’all life ? 5 sentences or more
    8·2 answers
  • What the benefit is of folder when working with files
    8·1 answer
  • Using the _____ model brings sellers and buyers together on the web and collects commissions on transactions between these parti
    5·1 answer
  • When paying bills online, a payee is:
    9·1 answer
  • What is the differnce between ''P4 and 4P''
    12·2 answers
  • Karl comes across confidential information. What should he do with it? A. Manipulate the information in his favor B. Sell the in
    12·1 answer
  • Https://www.blooket.com/play?id=300932<br> please
    8·2 answers
  • TRUE OR FALSE:
    6·1 answer
  • Rward
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!