1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elixir [45]
4 years ago
8

A website updated daily could be considered _____. a. authoritative b. objective c. accurate d. timely

Computers and Technology
1 answer:
kolbaska11 [484]4 years ago
5 0

Answer:

option C: accurate

Explanation:

this is because daily updated website contains the up to date information.

You might be interested in
Explain the operation of POS
zaharov [31]

Answer: POS stands for point of sale.

Merchants typically use a POS system to complete a sales transaction. In its most basic definition, a POS system is a combination of POS hardware and POS software to create a POS machine for processing a transaction and payment.

Explanation: Hope this helps, have a great day.

4 0
3 years ago
What is the value stored in the variable myNum after the following assignment statement executes? myNum = 23 % 5
netineya [11]

Answer:

% is a modulus operator in most languages, returning the remainder when the preceding number is divided by the following one .  Assuming the language this question pertains to is one of those, then the answer is 3.

7 0
3 years ago
A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused
sweet [91]

Answer:

a. True

Explanation:

The statement that a pen testing method or penetration test in which a tester who has a means of entry to an application behind its firewall imitates an attack that could be caused by a malicious insider.

A penetration test, which is also refer to as a pen test, pentest or ethical hacking, is an approved simulated cyberattack done on a computer system, performed in order to evaluate the security of the system. The test is carried out to identify both weaknesses or vulnerabilities including the potential for unauthorized parties to penetrate to the system's features and data.

The main purpose of performing this test is to identify any vulnerability in a system's defenses which attackers may take advantage of.

6 0
3 years ago
A mobile device user has tried to install a new app numerous times without success. She has closed all unused apps, disabled liv
elena-14-01-66 [18.8K]

The correct answer is B. Check for sufficient available storage space.  

Explanation:

One of the factors that can cause it is not possible to install a new app is insufficient storage as space in the mobile device is needed to save the app. This can be easily solved either by deleting apps and other content or expanding the memory available through a Micro SD card. Also, before attempting any major procedure such as a complete reset it is important to check the storage space availability. In this context, the user should check for sufficient available storage space (option B) because this might be the cause of the issue she is experiencing; also, this is a basic step before considering others such as performing a factory reset.

6 0
3 years ago
You are the information security officer at a medium-sized company (1,500 employees). the cio asks you to explain why you believ
Ivahew [28]
If your CIO asks such a stupid question run for the hill, he should not hold that title.
Every company, small, medium or large should have Firewalls, Intrusion Detection, Managed Virus Protection Software at the very least. Windows is the most deployed OS in the world and of course the main target of hackers i.e Viruses. MAC's to a lesser extent and Unix while probably the least vulnerable are still not immune to Viruses/Trojan and other Malware.

Users can still be the victims of trojan horses, phishing scams, and other online fraud. There<span> is no such thing as a 100% safe computer, a </span>Mac<span>, Windows, and even Linux are all capable of being infected with a </span>virus<span> or other malware.
</span>
Lastly, physical access to any computer that is not encrypted is vulnerable.
5 0
3 years ago
Other questions:
  • To create smartart, switch to the insert tab and use a button in the ____ group.
    12·1 answer
  • (40 pointsAnd brainliest answer ASAP) Maria is recording her friend’s graduation ceremony. How can Maria ensure that the video i
    9·1 answer
  • Refer to the exhibit. All workstations are configured correctly in VLAN 20. Workstations that are connected to switch SW1 are no
    14·1 answer
  • Carbon copy others who are..
    14·2 answers
  • Which hexadecimal number is equivalent to the decimal number 11?
    13·1 answer
  • Jenny is working on a laptop computer and notices that the computer is not running very fast. She looks and realizes that the la
    14·1 answer
  • The combined resistance of three resistors in parallel is: Rt = 1 / ( 1 / r 1 + 1 / r 2 + 1 / r 3 ) Create a variable for each o
    15·1 answer
  • You are evaluating the bounce rate of your overall website traffic and find that users with a social media referral source have
    6·1 answer
  • Which role involves designing and creating advertisements for marketing purposes?
    14·1 answer
  • Add me as a friend on Real pool 3D so we can play a round of pool!!!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!