1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
3 years ago
15

Witch of the following attributes of a website indicates a more reliable source for information

Computers and Technology
1 answer:
Arada [10]3 years ago
4 0
The only one of those I would trust is the site ending with EDU I hope this helps you.
You might be interested in
The next elected president should be someone who can be very nice, kind, stick-up for him/herself, and take care of the people w
PSYCHO15rus [73]

Answer:trump

Explanation:

3 0
3 years ago
Read 2 more answers
Which intel processor technology interconnects the processor, chipset, and wireless network adapter as a unit, improving laptop
Ira Lisetskai [31]
Apu?
....................
8 0
3 years ago
A product/process is referred to as a key Technology during which of the
Rufina [12.5K]

The correct answer is D. Mature Phase

Explanation:

Most products go through four different phases, this includes the emerging phase, the growing phase, the mature phase, and the decline phase. In each of these phases, the product has a different impact on the general market.

In the case of the mature phase, this occurs once the product is established in the market, which means the product is known by many people and is considered as key or necessary. For example, nowadays smartphones are in the mature phase because these are an important part of the market or are key. Moreover, this phase occurs after the product grows in the market, and before it declines. Thus, a product is a key technology during the mature phase.

5 0
3 years ago
Joel has left his computer unattended while answering a phone call . A TV repairer in his house tries to surf through the applic
Triss [41]
<span>Joel is a victim of a security breech. By leaving his computer unattended and not locked, he allowed for another person to use his credentials to access (or attempt) to access information that would otherwise be restricted to him. The fact that the unauthorized person did not find the information he was seeking does not minimize the risk.</span>
5 0
3 years ago
There are three types of operators in BASIC-256 <br>a) True b) False​
Anestetic [448]

Answer:

a)True is the answer......

6 0
3 years ago
Other questions:
  • A(n) ____ is an attack that takes advantage of a system vulnerability.
    7·1 answer
  • Which feature of a social news sharing website distinguishes it from a social bookmarking website
    15·2 answers
  • _________ is a protocol used by e-mail clients to download e-mails to your computer. (
    6·1 answer
  • The purchase of one cup of coffee a day what's going to do
    15·2 answers
  • How to connect canon printer to computer?
    6·1 answer
  • What does an operating system do?
    12·1 answer
  • Write a program whose input is two integers, and whose output is the first integer and subsequent increments of 5 as long as the
    10·1 answer
  • Kos-huar-utb garls jonly​
    8·2 answers
  • 1. List three tabs that make up the Ribbon
    14·1 answer
  • Which option will be used to attach email messages ​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!