1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RideAnS [48]
3 years ago
10

How can you tell that a website is valid and reliable 10 points

Computers and Technology
1 answer:
Dmitry_Shevchenko [17]3 years ago
6 0

Answer:

if it uses the CARS checklist

You might be interested in
What are the first and the last physical memory addressesaccessible using
Misha Larkins [42]

Answer

For First physical memory address,we add 00000 in segment values.

For Last physical memory address,we add 0FFFF in segment values.

<u>NOTE</u>-For addition of hexadecimal numbers ,you first have to convert it into binary then add them,after this convert back it in hexadecimal.

a)1000

For First physical memory address, we add 00000 in segment value

We add 0 at the least significant bit while calculating.

          1000<u>0</u> +00000 = 1000<u>0</u> (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           1000<u>0</u> +0FFFF =1FFFF    (from note)

b)0FFF

For First physical memory address,we add 00000 in segment value

We add 0 at the least significant bit while calculating.

     0FFF<u>0</u> +00000=0FFF0 (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           0FFF<u>0</u> +0FFFF =1FFEF (from note)

c)0001

For First physical memory address,we add 00000 in segment value

We add 0 at the least significant bit while calculating.

     0001<u>0</u> +00000=00010 (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           0001<u>0</u> +0FFFF =1000F (from note)

d) E000

For First physical memory address,we add 00000 in segment value

 We add 0 at the least significant bit while calculating.

    E000<u>0</u> +00000=E0000 (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           E000<u>0</u> +0FFFF =EFFFF (from note)

e) 1002

For First physical memory address,we add 00000 in segment value

 We add 0 at the least significant bit while calculating.

    1002<u>0</u> +00000=10020  (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           1002<u>0</u> +0FFFF =2001F (from note)

6 0
2 years ago
What is a spreadsheet​
Delicious77 [7]
A spreadsheet function that indicates the average of a group of numbers in a range.
8 0
2 years ago
A technically qualified individual who may configure firewalls and IDPSs, implement security software, diagnose and troubleshoot
sineoko [7]

Answer:

Security technician

Explanation:

Security technicians are responsible for fixing, planning, and implementing the IT and computer security system of organisations by making sure the safety and security of the data and information of the clients as well as the employees that make daily use of the systems

Security technicians administer security access to the clients and employees of the organization and are responsible for being up to date with the latest IT security technology developments.

7 0
3 years ago
What occurs when information is copied from an internet source to another computer?
Margarita [4]
The answer is pasting
3 0
3 years ago
How does making a phone call differ when using: A public phone A cell phone
rosijanka [135]

Answer:

Differ in the quality of their transmission.

Explanation:

For example, when using the public phone box, wired transmission is done not wireless as in cell phones. Public phone box use electronic signals transmitted through a cable network to send voice data which are not very effective for long distance communication.

However, cell phones wirelessly send electromagnetic wave signal to a cell tower close to the caller and then the information is then transmitted to cell tower close to the receiver within a split of a second. This method of communication has much advantages.

7 0
3 years ago
Other questions:
  • Universal Containers (UC) has multi-level account hierarchies that represent departments within their major Accounts. Users are
    13·1 answer
  • Write a program that performs the following tasks: Display a friendly greeting to the user Prompt the user for the value to conv
    13·1 answer
  • You are required to copy in your attendees' emails from outside of Outlook when creating a meeting
    6·2 answers
  • The best way to take control of the first page of Google is to
    14·1 answer
  • Laptops are used for accessing the internet. Name two advantages and two disadvantages for using a laptop rather than a smartpho
    5·2 answers
  • what is cicada 3301? i will give brainliest if you give me a correct answer (not copy and pasted) and somewhat well detailed, i
    8·1 answer
  • What are the 3 dimension of an information system?
    13·1 answer
  • mary needs to rename her report.txt file to final_report.txt. which command will allow her to do this?
    10·2 answers
  • Need help with this, will give brainliest
    15·1 answer
  • Explain any two types of board band connection​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!