Question and answer
What does computer firewall do
Question
Asked 6 days ago|1/7/2025 9:43:20 PM
Updated 5 days ago|1/8/2025 12:29:44 AM
3 Answers/Comments
f
Get an answer
Original conversation
User: What does computer firewall do

Weegy: A computer firewall is a security device that can be hardware or software.

Score 1

User: Helga is looking at plane flights for her vacation. Every time she looks at the tickets on her personal laptop, the prices seem to have gone up. One day, she looks at prices from her work computer instead, and they seem to have gone back down. What's this an example of?

Weegy: Helga is looking at plane flights for her vacation. Every time she looks at the tickets on her personal laptop, the prices seem to have gone up. One day, she looks at prices from her work computer instead, and they seem to have gone back down. This is an example of dynamic pricing.
Score .9724

User: A what , is a type of bossware that keeps a record of everything that a user types, even if it's later deleted.

Weegy: A keystroke logger is a type of bossware that keeps a record of everything that a user types, even if it's later deleted.
Score 1

User: Rebekah's twelve year old daughter has asked for her first smartphone. Rebekah wants to install parental monitoring software on the phone before she gives it to her daughter. What's the best advice for Rebekah?

Weegy: Rebekah's twelve-year-old daughter has asked for her first smartphone. Rebekah wants to install parental monitoring software on the phone before she gives it to her daughter. The best advice for Rebekah is: Use the parental monitoring software along with age-appropriate safety talks with your daughter.
Score 1

User: A key part of ethical online behavior is what , or tolerating differences of opinion or disagreements with people you see online.

Weegy: A key part of ethical online behavior is acceptance, or tolerating differences of opinion or disagreements with people you see online.
Score 1

User: Your friend Dave tells you he has a problem with doomscrolling. What would be the best piece of advice to give Dave?

Weegy: Your friend Dave tells you he has a problem with doomscrolling. The best piece of advice to give Dave would be: If doomscrolling makes you feel bad, try stopping after 15 minutes or so.


Score 1

User: Tamir works remotely and travels frequently. That means he often needs to do work in airports, hotels, and other places with public Wifi connections. Which program would be most useful in keeping tamirs private information, including his IP address, safe while he works?

Weegy: Tamir works remotely and travels frequently. That means he often needs to do work in airports, hotels, and other places with public WiFi connections. A VPN - would be most useful in keeping Tamir's private information, including his IP address, safe while he works.

Score 1

User: Plagiarism

Weegy: Self-plagiarism occurs when the use of one's own previous work in another context without citing that it was used previously.
Score 1

User: Copyright infringement

Weegy: Copyright infringement is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work.
Score 1

User: Wanda has a job that requires her to use a computer for most of the workday. After she's been typing for a while, the tendon at the base of her right thumb swells up, making it painful to rest he thumb against the keyboard. What repetitive strain injury is Wanda experiencing?

Weegy: Wanda has a job that requires her to use a computer for most of the workday. After she's been typing for a while, the tendon at the base of her right thumb swells up, making it painful to rest her thumb against the keyboard. Tendinitis is Wanda experiencing.
Score 1

User: Doxing

Weegy: Doxing or doxxing is the act of publicly providing personally identifiable information about an individual or organization, usually via the Internet.

Score 1

User: Computer monitoring

Weegy:
Monitoring is the regular observation and recording of activities taking place in a project or programme.


|Score .8708|topherbucad|Points 80|

User: Social engineering

Weegy: Engineers are trained and skilled personnel in the design, construction, and use of engines or machines, or in any of various branches of engineering.

Score 1

User: Information about the rights to the pictures you post on social media platforms and how the companies are allowed to use your images can be found in the platforms

Question
Asked 6 days ago|1/7/2025 9:43:20 PM
Updated 5 days ago|1/8/2025 12:29:44 AM
3 Answers/Comments
New answers
Rating
3
Computer monitoring is a process of recording and tracking user activity on a PC or computer network.
Added 5 days ago|1/8/2025 12:28:31 AM
This answer has been confirmed as correct and helpful.
3
Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data. Train yourself to spot the signs.
Added 5 days ago|1/8/2025 12:29:19 AM
This answer has been confirmed as correct and helpful.
3
Information about the rights to the pictures you post on social media platforms and how the companies are allowed to use your images can be found in the platform's: terms of service.
Added 5 days ago|1/8/2025 12:29:44 AM
This answer has been confirmed as correct and helpful.
Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Questions asked by the same visitor
Information about the rights to the pictures you post on social media platforms and how the companies are allowed to use your images cam be found in the platform's what?
Weegy: Information about the rights to the pictures you post on social media platforms and how the companies are allowed to use your images can be found in the platform's: Terms of service. User: Phishing Weegy: Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. User: Piracy Weegy: Piracy refers to the unauthorized duplication of copyrighted content that is then sold at substantially lower prices in the 'grey' market. User: Malware Weegy: Malware involves VIRUSES. (More)
Question
Updated 5 days ago|1/8/2025 12:25:45 AM
1 Answer/Comment
Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy.
Added 5 days ago|1/8/2025 12:25:45 AM
This answer has been confirmed as correct and helpful.
39,705,082
questions answered
Popular Conversations
The right to bear arms is protected by which amendment? A) First ...
Weegy: The Fourth Amendment (Amendment IV) to the United States Constitution is part of the Bill of Rights that ...
1/9/2025 8:53:30 AM| 6 Answers
Describe how different genres of writing may require different ...
Weegy: A writ of certiorari is the legal document the Supreme Court issues when it agrees to hear a case. User: ...
1/13/2025 11:19:35 AM| 6 Answers
Who was the leader of the Soviet Union during World War II? A) Leon ...
Weegy: Vladimir Ilyich Ulyanov, better known as Lenin, was the leader of the Bolsheviks in Soviet Russia. User: ...
1/9/2025 5:25:35 AM| 5 Answers
Describe how African American literature during the Harlem ...
Weegy: The harlem renaissance started in the Harlem, New York. User: What impact did the Great Migration have on ...
1/13/2025 7:07:44 PM| 4 Answers
What is a ‘close-up’ word
Weegy: Zucchini is the best close-up word. User: What is one way to make your writing sound conversational Weegy: ...
1/3/2025 2:08:26 AM| 4 Answers
An important feature of Emergency Operation Plans is that they what?
Weegy: An important feature of emergency operation plans is that they incorporate a well-defined feedback loop for ...
1/6/2025 4:49:27 PM| 4 Answers
_______ are used with a comma to join two independent clauses
Weegy: The comma is a punctuation mark that appears in several variants in different languages. User: Where do you ...
1/3/2025 1:12:14 PM| 3 Answers
The destruction of organisms before they enter the body is known as ...
Weegy: The destruction of organisms before they enter the body is known as surgical asepsis. User: The destruction ...
1/4/2025 4:06:27 AM| 3 Answers
Which ICS functional area arranges for resources and needed services ...
Weegy: ICS Functional Areas are: Command, Operations, Planning, Logistics, and Administration/Finance. User: which ...
1/5/2025 11:34:33 PM| 3 Answers
In the House, the _______ assigns a bill to a committee. Question 6 ...
Weegy: User: Why does the Central Intelligence Agency have more freedom of action than that of other federal ...
1/6/2025 3:06:11 PM| 3 Answers
What does computer firewall do
Weegy: A computer firewall is a security device that can be hardware or software. User: Helga is looking at plane ...
1/7/2025 9:43:20 PM| 3 Answers
Which of the following is a primary producer in an ecosystem? a) ...
Weegy: A predator is: D. carnivore. User: What type of mutation results in a change in a single nucleotide? a) ...
1/9/2025 11:24:23 AM| 3 Answers
S
L
Points 54 [Total 134] Ratings 2 Comments 34 Invitations 0 Offline
S
Points 51 [Total 51] Ratings 0 Comments 51 Invitations 0 Offline
S
Points 41 [Total 41] Ratings 0 Comments 41 Invitations 0 Offline
S
Points 15 [Total 15] Ratings 0 Comments 15 Invitations 0 Offline
S
Points 14 [Total 72] Ratings 1 Comments 4 Invitations 0 Offline
S
L
1
1
1
1
Points 11 [Total 4259] Ratings 1 Comments 1 Invitations 0 Offline
S
Points 10 [Total 43] Ratings 1 Comments 0 Invitations 0 Offline
S
Points 10 [Total 10] Ratings 1 Comments 0 Invitations 0 Offline
S
Points 1 [Total 1] Ratings 0 Comments 1 Invitations 0 Offline
S
L
P
L
P
Points 1 [Total 5149] Ratings 0 Comments 1 Invitations 0 Offline
* Excludes moderators and previous
winners (Include)
Home | Contact | Blog | About | Terms | Privacy | © Purple Inc.