1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sindrei [870]
3 years ago
5

Which of the following describes the term "false information?"

Computers and Technology
1 answer:
pav-90 [236]3 years ago
3 0
Inaccurate and misleading
You might be interested in
A person who has a been exposed to technology at a young age is?
Dahasolnce [82]
Ok if lets say a young child at the age of like 6-7 was allowed to play grand theft auto by his/her parents maybe the child would understand incorrectly and start doing what the people do in the game this may cause to serious trouble jail time or even death. In this case dont let your kids play underrated games or watch underrated movies.
Hope that helped you understand more.
7 0
3 years ago
What is the minimum amount of hard drive space required for a 64-bit Windows 10 installation?
BaLLatris [955]

The minimum requirements for a 64-bit Windows 10 installation are 2 GB of RAM and a minimum of 16 GB of space on the hard drive.

<em>Hope this helps :)</em>

7 0
1 year ago
What is the primary language used to write web content and is the default format for Outlook messages?
Doss [256]

Answer:

I think its plain text but I might be wrong

7 0
2 years ago
To deny a host from sending HTTP traffic destined to a specific server you will need to apply a __________ Access Control List.
DedPeter [7]

I would a Standard Access control List

There are two common access lists: The standard and extended access list.  With the standard access list, it creates filters only on source addresses and is commonly used for server-based filtering. They are not as powerful as extended access lists. Standard Access lists are typically used for restricting access to a router through HTTP and HTTPS.  


6 0
3 years ago
Read 2 more answers
What are possible consequences for cyberbullying?
BaLLatris [955]

Answer:

Possible consequences for cyber bullying include depression, isolation and illness

Explanation:

The reason for this is when a person is hurt there body tends to go through things to make them feel a certain way about things.

3 0
2 years ago
Read 2 more answers
Other questions:
  • Monica needs a printer to use at home. She wants fine-quality prints at an affordable cost. Which printer will help her achieve
    9·1 answer
  • A matrix representation stores matrices such that the offset address of the element in row i and column j can be calculated by c
    12·1 answer
  • Write a fragment of code that will test whether an integer variable score contains a valid test score. Valid test scores are in
    6·1 answer
  • What is the best operating system
    12·1 answer
  • Which tab on the Chart Tools Contextual tab will contain commands that are used to change the style of charts and to edit chart
    12·2 answers
  • )In a graph represented by adjacency matrix u can find all the neighbours of a given vertices in ____Operations
    6·1 answer
  • What are some other features of sending attachments in Outlook 2016? Check all that apply.
    9·2 answers
  • Dr. Kim divides a programming class into groups. Each group will create a large program as their
    15·2 answers
  • Which of the following is a hand-drawn animation that takes a large amount of time to complete?
    5·1 answer
  • Name 4 components of a components system​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!