1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Advocard [28]
3 years ago
14

How does our behavior change when we know we're being watched?

Computers and Technology
1 answer:
Hoochie [10]3 years ago
5 0

I can't even say this is an answer

If there isn't a specific answer for this, I think it depends on everyone. Maybe they'd behave better knowing that their actions are being monitored. Who in their right mind is going to act like a lunatic when they know people are watching.

I think it will most likely alter their attitude in a positive way but it will also most likely be fake actions put on show

You might be interested in
Does any of yall know how to delete your account?
il63 [147K]

Answer:

No i really don't but why would you want to delete your account

8 0
3 years ago
Which industry did the Interstate Commerce Act primarily affect? A. coal B. airplane C. steel D. oil E. railroad
babunello [35]

I believe the answer is E. Railroad, hope this helps!

6 0
4 years ago
Read 2 more answers
Why is accessing a disk block expensive? discuss the time components involved in accessing a disk block. (?
Dahasolnce [82]

Answer:

Explanation:

A disk block works by transferring data between the disk and main memory units which are called the blocks, whose size can range drastically from 512 bytes to several thousand.  This data is converted to hardware-level cylinder, surface, and sector number  which makes accessing the data immensely slower than accessing data in the main memory. This time constraint is also the main reason as to why accessing a disk block is so expensive.

6 0
4 years ago
Outputting all combinations. Output all combinations of character variables a, b, and c using this ordering abc acb bac bca cab
Alina [70]

Answer:

#include<iostream>

using namespace std;

 

int main()

{

   char a;  

   char b;  

   char c;

cin >> a;  

cin >> b;  

cin >> c;

 cout<<a<<b<<c<<endl;

 cout<<a<<c<<b<<endl;

 cout<<b<<a<<c<<endl;

 cout<<b<<c<<a<<endl;

 cout<<c<<a<<b<<endl;

 cout<<c<<b<<a<<endl;

 

cout << endl;

}

Explanation:

Note: code is hard coded it does not contain any logic based coding

5 0
3 years ago
Two small engine technicians are disassembling the engine shown in Figure A-9. After observing the engine components, both techn
11Alexandr11 [23.1K]
<span>A splash-type lubrication system uses what the Technician A says :  that the engine uses a dipper that's attached to the connecting rod to splash oil from the crankcase onto its components. </span>In  the  engine, dippers on the connecting-rod bearing caps enter the oil pan with each revolution to produce the oil splash.  A passage is drilled in each rod from the dipper to the bearing to <span>ensure lubrication.</span> 
3 0
3 years ago
Other questions:
  • Insurance can help you:
    11·1 answer
  • What special member function of a class is called whenever an instance of a class is created and initialized?
    15·1 answer
  • A technician removes the cap from the brake fluid reservoir and finds that the rubber boot in the cap is swollen. technician a s
    8·1 answer
  • Connection-oriented protocols protect against dropped data by forming connections and using what type of constant stream?
    5·1 answer
  • 16 to 19 year old drivers are how many more times likely to crash? 1.7,2.7,0.7 ,3.7
    12·2 answers
  • A group of users is unable to connect to the network. When testing several of the PCs and issuing the command ipconfig, the tech
    10·1 answer
  • 2) What are two reasons we analyze algorithms?
    7·2 answers
  • Which of the following best describes professional behavior in the IT field?
    11·2 answers
  • If you use your smartphone as a hotspot to connect to the Internet on your tablet you are using a ________.quillet
    11·1 answer
  • quizlet ann is a security professional for a midsize business and typically handles log analysis and security monitoring tasks f
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!