1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadya [2.5K]
3 years ago
9

Why it is important for everyday people to have access to credible online information?

Computers and Technology
2 answers:
GREYUIT [131]3 years ago
6 0
Well let’s start off with what “credible” means it means something that is able to be believed. So why should people have access to believable and true information, simply because it’s one of the ways we can learn more and understand more about the world we live in. If we didn’t have believable sources we would be learning a bunch of untrue information. We need to make sure that what we research and believe is credible so we can answer and learn as well as make a fair judgment when this information needs to be applied
Citrus2011 [14]3 years ago
5 0

Answer:

so you know what is true

Explanation:

You might be interested in
2. You have noticed over the past several days that your computer is running more slowly
xenn [34]

Answer:

probably to many tabs open or take it to a shop

3 0
2 years ago
Read 2 more answers
Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
Andrew [12]

<u>Man-in-the-middle attack</u> refers to a type of an attack in which an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers.

<u>Explanation:</u>

A man-in-the-middle attack (MITM) is an assault where the aggressor furtively transfers and potentially changes the correspondences between two gatherings who accept that they are straightforwardly speaking with one another. This happens when the assailant catches a segment of a correspondence between two gatherings and retransmits it sometime in the future. The assailant would then be able to screen and perhaps change the substance of messages. The utilization of such encoded burrows makes extra secure layers when you get to your organization's secret systems over connections like Wi-Fi.

8 0
2 years ago
Does the security burden fall primarily on the user? On
liubo4ka [24]

Answer:

yes and no because of the security

Explanation:

yes and no because of the security

6 0
3 years ago
Whoever wants to join me in The Sims (mobile), my friend code is:<br> EPQL3E9<br> Come join me!
BigorU [14]
BET LOLOLOL SEE YA THERE
7 0
3 years ago
Read 2 more answers
Joe always misspells the word calendar. He types the word as calender but the correct spelling appears on the document. Which fe
Anika [276]
A. Autocorrect is the answer
7 0
2 years ago
Other questions:
  • How many rows and columns does ms-excel 2007 have???
    10·1 answer
  • A web __________, such as internet explorer or mozillaâs firefox, allow users to access the world wide web.
    10·1 answer
  • What does the merge &amp; center button in the alignment group on the home tab do?
    8·1 answer
  • What are the useful techniques in program design?
    12·1 answer
  • 12. Kelly would like to know the average bonus multiplier for the employees. In cell C11, create a formula using the AVERAGE fun
    7·1 answer
  • If you were to create a new app for a smartphone or tablet that does not already exist, what would you create?
    10·1 answer
  • IT professionals should help to protect users’ personal information, such as bank account information or Social Security numbers
    14·1 answer
  • PLEASE HELP!!!!
    6·2 answers
  • Vpn stands for _____. very precise settings virtual private network virtual public network vice prestigious setup
    5·1 answer
  • Whats the formatting of a letter to the editor?​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!