1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andre45 [30]
2 years ago
6

It is important to verify internet source because-------- choose that apply. A.the source should be written by real author. B.an

yone can create a website and write false or inaccurate information on it. C..you need to make sure it is owened by a government agency. D. Website can contain opinion not facts.
Computers and Technology
2 answers:
Lady_Fox [76]2 years ago
7 0

1 is B&D 2 is D 3 is A

Lady_Fox [76]2 years ago
3 0
B. anyone can create a website and write false or inaccurate information on it
You might be interested in
Identify three errors in this HTML code snippet:
Kazeer [188]

I have annotated the errors in the picture.

<em />

<em>Hope this helps :)</em>

5 0
1 year ago
Read 2 more answers
What are issues to consider when deciding to build software in-house or purchase commercial off-the-shelf software (cots)?
Scrat [10]
<span>On the computer there are always issues. For a developer to sit all day in front of a google that always invents things and the flashy images that disrupt everything. Googling on facebook is also an issue. Youtube, everything that contain flashy image is quite disruptive. If you think about content, maybe googling is less inventive. In a way it's nicer to buy applications but if you finally think of building it, there are always nicer ways of spending time. I prefer to go to seaside when I can.</span>
7 0
3 years ago
How did voyager 1 and voyager 2 made outer space exploration and easier
Anna007 [38]
They made it easier because they mapped out some of the galaxy and hazardous things like Astroid belts or rogue planets
5 0
2 years ago
A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user
sergeinik [125]
<h2>A <u>Rogue attack</u> utilizes software just to attempt hundreds of frequent phrases in a row.</h2>

  • Rogue access equipment would be any WLAN radio channel that isn't even authorized to communicate or join the corporate connection.
  • Whenever they have been misconfigured as well as set up without authentication, it creates a new security vulnerability potentially gaining simple access to a private network.

Thus the response above is correct.

Learn more about software attacks here:

brainly.com/question/25407509

7 0
2 years ago
Read 2 more answers
Does anyone have a rbx account? If they do friend request Tribalchief777
Mila [183]

Answer:

ok, no because this site is for hw

Explanation:

8 0
2 years ago
Other questions:
  • Jason is computer professional who has access to sensitive information. He shares this information with another organization in
    8·1 answer
  • What type of machine is a CD player? A. simple machine B. compound machine
    8·2 answers
  • What is the name of the contextual or specific tab that appears in page layout view when adding a header
    15·1 answer
  • . What is automated testing?
    10·1 answer
  • A(n) __________attack is designed to render the target unreachable by legitimate users, not to provide the attacker access to th
    8·1 answer
  • Kathy created a video presentation of her company, which will be shown on a television show as an advertisement. Her company wan
    11·1 answer
  • At the start of the school year, Brianna’s history teacher announces that students’ final grades will be weighted based on how t
    8·2 answers
  • The steps.txt file contains the number of steps a person has taken each day for a year. There are 365 lines in the file, and eac
    12·1 answer
  • 5. Compare the telephone network and the internet. What are the similarities? What are the differences?
    12·1 answer
  • Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!