1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andre45 [30]
3 years ago
6

It is important to verify internet source because-------- choose that apply. A.the source should be written by real author. B.an

yone can create a website and write false or inaccurate information on it. C..you need to make sure it is owened by a government agency. D. Website can contain opinion not facts.
Computers and Technology
2 answers:
Lady_Fox [76]3 years ago
7 0

1 is B&D 2 is D 3 is A

Lady_Fox [76]3 years ago
3 0
B. anyone can create a website and write false or inaccurate information on it
You might be interested in
A hacker corrupted the name:IP records held on the HOSTS file on a client, to divert traffic for a legitimate domain to a malici
balu736 [363]

The type of attack that the hacker performed is Domain Name System (DNS) server cache poisoning.

<h3>What is DNS poisoning?</h3>

In Domain Name System (DNS) server cache poisoning, the hackers often enter into a DNS server because they want to make an adjustment to its directory so that it can point the domain name users enter to a wrong, IP address.

Note that Domain Name Server (DNS) poisoning is a form of system attack in which there is the change of DNS records which are then used to redirect online traffic to a wrong website.

Learn more about hacker  from

brainly.com/question/24956493

7 0
2 years ago
When the router xe-0-0-1.core-910.frgp.net drops the ip datagram enclosing a UDP segment from my computer, does it send a UDP se
Strike441 [17]

Answer:the first IP when the traceroute is started is our IP. It is our private IP which is displayed because it is the first hop for the tracing of the route. Hence, our IP is shown in the first statement.

Explanation:

4 0
3 years ago
The way a particular application views the data from the database that the application uses is a.
masha68 [24]

The way a particular application views the data from the database that the application uses is a sub-schema.

<h3>What is Database?</h3>

A Database may be defined as a process of collecting data and information that is principally assembled for quick search and recoupment by a computer.

The sub-schema is the reasoning elucidation of that section of the database which is applicable and accessible to a specific application. This type of database is common to two or more applications.

Therefore, the sub-schema is the way through which a particular application views the data from the database that the application uses.

To learn more about Database, refer to the link:

brainly.com/question/26096799

#SPJ4

4 0
2 years ago
The protections from the security software must continue when the device is taken off the network, such as when it is off-grid,
snow_lady [41]

Answer:

third ighjojdudjz

ghddduewjj

wkckdjjj

Explanation:

cchmddkhwmx

ndhdnahdd

jruditndjed

3 0
3 years ago
What do you use for soaking hands and holding soapy water​
sertanlavr [38]

Answer

???

Explanation:

Was this a school question?

5 0
3 years ago
Read 2 more answers
Other questions:
  • In the 2007/2010 version of Paint, which of the following tools are located in the View tab? (Select all that apply.)
    5·1 answer
  • One of the original forms of viruses, is usually stored on some form of removable media. When the removable media is connected t
    9·1 answer
  • Jennifer frequently uses a few programs on her laptop. Where will she find all the frequently used program icons in her computer
    13·1 answer
  • The ____ command displays the last 10 lines of a text file.
    5·1 answer
  • Alan is the security manager for a mid-sized business. The company has suffered several serious data losses when mobile devices
    9·1 answer
  • ________ consists of detailed, preprogrammed instructions that control and coordinate the computer hardware components in an inf
    11·1 answer
  • Grab the stniop or they will dissapear
    12·1 answer
  • Fre.e points enjoy em
    7·2 answers
  • Explain drawing and painting package.​
    12·1 answer
  • Thiết kế biểu đồ thực thể liên kết và tập lược đồ cơ sở dữ liệu quan hệ cho các bài toán quản lý sau:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!