1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balandron [24]
2 years ago
14

What indicates a website of a university

Computers and Technology
1 answer:
ad-work [718]2 years ago
8 0

Answer:

The domain suffix/TLD .edu is reserved for colleges and universities

Examples:

harvard.edu

stanford.edu

juilliard.edu

You might be interested in
Click this link to view O*NET’s Tasks section for Farmworkers and Laborers, Crop.
dangina [55]

Answer:

B. operating tractors and machinery

D. maintaining vehicles and equipment

E. operating irrigation (watering) equipment

F. harvesting fruits and vegetables by hand

Explanation:

6 0
3 years ago
When programming, the word "execute" means which of these?
Inga [223]

Answer:

to run!

Explanation:

hope this is helpful!

7 0
3 years ago
Which is a basic job requirement for a career in corrections services?
Diano4ka-milaya [45]

You must have a high school diploma

7 0
3 years ago
A set of programs that enable the hardware to process data is _____.
Mnenie [13.5K]
The most appropriate answer is C !! software os used for using hardware !!
4 0
3 years ago
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY <3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
3 years ago
Other questions:
  • Expressing your needs to others is aggressive behavior.<br> True or False?
    5·2 answers
  • What is needed to create a good problem statement?
    10·1 answer
  • Research at least two articles on the topic of managerial issues of a networked organization. Write a brief synthesis and summar
    8·1 answer
  • What is the acronym that helps you remember the order of math operations?
    9·2 answers
  • How can you tell that a website is valid and reliable
    7·2 answers
  • How is a recession determined?
    10·1 answer
  • Imagine that the following two lines of code are placed inside a
    11·1 answer
  • So I was looking at my profile and it says i'm a brainly PLUS member didn't sign up for it tho. Any ideas why this could have ha
    14·2 answers
  • TCP and the User Datagram Protocol (UDP) provide _________ between processes on any two of those hosts. A. address translation B
    6·1 answer
  • If “A” represents in binary 10011001, what will be the value of word “CAB”?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!