1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Advocard [28]
3 years ago
14

How does our behavior change when we know we're being watched?

Computers and Technology
1 answer:
Hoochie [10]3 years ago
5 0

I can't even say this is an answer

If there isn't a specific answer for this, I think it depends on everyone. Maybe they'd behave better knowing that their actions are being monitored. Who in their right mind is going to act like a lunatic when they know people are watching.

I think it will most likely alter their attitude in a positive way but it will also most likely be fake actions put on show

You might be interested in
Adios brainly, you were sh.t sometimes, but you had your moments, wont be posting that much take my points away i d c
svlad2 [7]

you got a bad day today, bud?

3 0
3 years ago
Read 2 more answers
Submitting a cover letter and resume is a step in the process of applying for a job.
likoan [24]
Very True

When applying for jobs, candidates are required to understand how the job application process works. Getting your Resume ready and being able to write a well-crafted cover letter might guarantee you that job. There are different approaches of submitting a cover letter and a Resume via email. You can always cut and paste your actual cover letter or attach both documents as separate documents to your email.      

 

 

 



3 0
4 years ago
What is a hash function? A. A function that computes the location of the values in the array B. A function has allocated memory
galina1969 [7]

Answer:

A hash function is a function which when given a key, generates an address in the table. The example of a hash function is a book call number. Each book in the library has a unique call number. ... The later is always possible only if you know (or approximate) the number of objects to be proccessed.

Explanation:

A

3 0
3 years ago
Read 2 more answers
What is a file explore?
Tcecarenko [31]
File Explorer, previously known as Windows Explorer, is a file manager application that is included with releases of the Microsoft Windows operating system from Windows 95 onwards. It provides a graphical user interface for accessing the file systems.
7 0
3 years ago
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
Other questions:
  • Gina is upgrading your computer with a new processor. She installs the processor into your motherboard and adds the cooling syst
    5·2 answers
  • Write a program to provide information on the height of a ball thrown straight up into the air. The program should request as in
    5·2 answers
  • Using the _______ list, you can select the number of photos that will appear on each slide.
    14·1 answer
  • A computer hacker usually gets into a companyâs network by _____.
    15·1 answer
  • Why do i have to wait and watch videos
    11·1 answer
  • The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify phys
    15·1 answer
  • You want to verify whether a PTR record exists for the Serv2.csmpub.local host, but you don't know the IP address. Which of the
    8·1 answer
  • Describe PROM, EPROM and EEPROM memories​
    7·1 answer
  • Why is it preferable to code web pages in HTML format?
    10·2 answers
  • Is there actually a difference between left and right twix
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!