1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
7

How can you tell that a website is valid and reliable

Computers and Technology
2 answers:
scoray [572]3 years ago
8 0
- suffix of site 
.edu = educational
.com = commercial
.mil = military
.gov = government
.org = nonprofit 
- also, if there is a listed author and they provide credentials 
ad-work [718]3 years ago
8 0
A website that is reliable and valid will be for that purpose, and won't have much ads. Sites that send malware, phishing scams, etc, are called biased websites. 

Here are some clues to tell that a website is reliable. 

- http:// 
- Has a company, is associated with an administration. 
- Is for a certain purpose, example: to inform readers and viewers. 
- Author's name is clear 
- Date 
You might be interested in
A project manager is responsible for (check all that apply)
Klio2033 [76]
When I answered this it was C
3 0
3 years ago
Marty uses a customized database to sort parts and track inventory. The customized database is an example of _____.
Alexeev081 [22]

cataloging is a term for that

5 0
3 years ago
Which three pieces of information should be included in an artist statement? Select all that apply.
Dima020 [189]

Answer:

There is no answers given??

Explanation:

N/A

4 0
2 years ago
If you wanted to detect x-rays coming from the sun,where would you place the detector? Why?
Temka [501]
You would place it in orbit around Earth, as most X-rays are absorbed by the atmosphere, so you would want the detector outside of the atmosphere to accurately detect the X-rays.
5 0
3 years ago
When you see an ad on social media that relates to your profile or something
sesenic [268]

Answer:

Tritium BF

Explanation:

5 0
2 years ago
Read 2 more answers
Other questions:
  • How can I use the internet/social media to protect my identity?
    14·1 answer
  • Which of the following is not a common network architecture type?
    9·1 answer
  • A security policy is a
    11·1 answer
  • What is used to monitor the activity of a network and notify network administrators when it identifies something as suspicious?
    15·1 answer
  • Which of the following will you select as X in the following series of clicks to lay the title over a chart: Chart Title box &gt
    14·1 answer
  • You rub two red balloons against a wool scarf. What do you think will happen if you place the balloons near each other. Justify
    5·1 answer
  • What is TLB for? Why TLB? Given the following number, what is theeffective memory access time?
    11·1 answer
  • Each of the outcomes listed below is a result of executing the following script except for one. Which one? CREATE ROLE ExampleRo
    6·1 answer
  • Is anyone a robIox moderator?
    13·2 answers
  • Examples of email prividers​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!