1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
7

How can you tell that a website is valid and reliable

Computers and Technology
2 answers:
scoray [572]3 years ago
8 0
- suffix of site 
.edu = educational
.com = commercial
.mil = military
.gov = government
.org = nonprofit 
- also, if there is a listed author and they provide credentials 
ad-work [718]3 years ago
8 0
A website that is reliable and valid will be for that purpose, and won't have much ads. Sites that send malware, phishing scams, etc, are called biased websites. 

Here are some clues to tell that a website is reliable. 

- http:// 
- Has a company, is associated with an administration. 
- Is for a certain purpose, example: to inform readers and viewers. 
- Author's name is clear 
- Date 
You might be interested in
You are hired as an IT consultant for the government owned mobile operating company, Teletalk. Based on the following scenario,
morpeh [17]

Answer:

An IT consulting report may be a transcript created via an IT professional that addresses all the possible aspects of an enterprise or a corporation. It is often an aggressive analysis report, Project reputation report, Business Plan report, or a Supply Chain Model file

Let's see how to write this kind of report

(1) Introduction.

(2) Point out the problems.

(3) Addressing the problems.

(4) business model and competitive analysis.

(5) Conclusion.

Explanation:

Teletalk may be a government telecommunication company. it's been going out of the marketplace for quite a little bit of time and is thanks to a scarcity of human resources and innovative applications within the field.

The company uses outdated Customer Management Systems (CMS) now so as to research potential customers and gather information about them. they need to be battling retaining customers after a brief period of your time. Their customer service isn't fair and therefore the customers aren't satisfied with the service provided by the corporate.

In order to function well, they need to implement enterprise resource planning ( ERP) data systems.

A data system is everything starting from Human resources to hardware and software. they will be applied everywhere from Customer Retainment and Engagement they're termed as Customer Management Systems and if it's wont to Business Model of any organization then it's referred to as Enterprise Resource Planning Systems (ERP).

By incorporating information systems in teletalk there is often a performance improvement in Sales, Management, Technology, and D-S (Demand-Supply Model).

All these are going to be an excellent advantage to teletalk so teletalk should anticipate innovating the present system with a more reliable and efficient one

6 0
2 years ago
An intruder with malicious intent breaks into an office and steals a hard drive
kakasveta [241]

Answer: data security

Explanation:

The company's authentication protocols and data encryption measures denotes data security.

Data security simply means protecting unauthorized people from having access to a particular data. This is done to prevent unauthorized access of important information or to prevent fraud. Some of the data security measures include data encryption, tokenization, hashing, etc.

4 0
3 years ago
Small-business owner Marcos set up his Google Ads campaign by thinking of “obvious” keywords off of the top of his head. What's
LiRa [457]

Answer:See the suggestions on the Opportunities tab

Explanation: The improvement in the Google ad can be made by the taking a look at the Opportunities tab which will display the adequate opportunities.

The tab displays these opportunities on the basis of the campaign settings, account's history, performance, style, trends etc and thus will create the appropriate opportunities accordingly.Thus Marcos will have to see the suggestion displayed on Opportunities tab

5 0
3 years ago
? An attempt to harm damage or cause threat to a system or network is broadly termed as
Radda [10]

Answer:

A cyber attack or hacking

Explanation:

6 0
2 years ago
Suppose you create a class Square to be a subclass of GeometricObject. Analyze the following code:
Lemur [1.5K]

Answer:

B. The program has a compile error because you attempted to invoke the GeometricObject class's constructor illegally.

Explanation:

To call a superclass constructor, the user must use super(). This is necessary unless default constructors are used. Also, it is vital to make sure if their are appropriate argument to be used while invoking the superclass constructor.

3 0
3 years ago
Other questions:
  • This tag element is the last one used in the html code sequence
    7·1 answer
  • Which windows tool can you use to find out if the hard drive is slowing down windows performance?
    9·1 answer
  • Software that helps users to communicate with family, friends and business colleagues by posting personal information, status up
    13·2 answers
  • Tamara has $500 she is looking to save for a class trip. She wants to earn the most possible interest and will not need access t
    7·1 answer
  • How can websites illustrate cooperation and kindness?
    8·2 answers
  • The term generally used to describe storage systems that function at high speeds is:
    12·1 answer
  • Can i get any information on this website i'd like to know what its for ?
    11·1 answer
  • Importancia del sistema operativo
    6·1 answer
  • How is technology moving the business world forward?
    13·1 answer
  • Why does my laptop keep disconnecting from the wifi.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!