1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viva [34]
3 years ago
10

What are the cues that a website is safe to use for exchanging sensitive information?

Computers and Technology
1 answer:
sasho [114]3 years ago
8 0
Check if it uses .com, .org, .tv, etc. Or check if it has a citation, who created it.
You might be interested in
The process in which a server is partitioned into smaller components virtually.
ExtremeBDS [4]
The answer is Allocation
5 0
3 years ago
The purpose of __________________ is to isolate the behavior of a given component of software. It is an excellent tool for softw
OLga [1]

Answer:

d.) black-box testing

Explanation:

Software testing can be regarded as procedures/process engage in the verification of a system, it helps in detection of failure in the software, then after knowing the defect , then it can be corrected. Black Box Testing can be regarded as a type of software testing method whereby internal structure as well as design of the item under test is not known by one testing it. In this testing internal structure of code/ program is unknown when testing the software, it is very useful in checking functionality of a particular application. Some of the black box testing techniques commonly used are; Equivalence Partitioning, Cause effect graphing as well as Boundary value analysis. It should be noted that the purpose of black-box testing is to isolate the behavior of a given component of software.

3 0
3 years ago
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
HACTEHA [7]

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

8 0
3 years ago
RAM memory is intended?
adell [148]

Answer:

RAM is a short abbreviation for Random Access Memory. It is the physical working memory used by your PC to temporarily store computer data. Your PC stores all open applications, files, and any other data into RAM for quick access. The more RAM you have installed, the more programs you can run at the same time.

8 0
3 years ago
Any anime weebs wanna talk
erastova [34]

Answer:

Sowwy, it's not Me!

The Bermuda Triangle, also known as the Devil's Triangle, is a loosely defined region in the western part of the North Atlantic Ocean where a number of aircraft and ships are said to have disappeared under mysterious circumstances. Most reputable sources dismiss the idea that there is any mystery.[1][2][3]

Bermuda Triangle

Devil's Triangle

6 0
2 years ago
Read 2 more answers
Other questions:
  • When you see ##### in a cell, you should A. increase the cell width. B. increase the cell height. C. decrease the cell width. D.
    14·1 answer
  • Shelly praised Susan via email for how well she executed an employee training program last week. Shelly is engaging in the _____
    6·1 answer
  • What is the property of the Magnetic Lasso tool?
    6·2 answers
  • Assign testResult with 1 if either geneticMarkerA is 1 or geneticMarkerB is 1. If geneticMarkerA and geneticMarkerB are both 1,
    11·1 answer
  • An email can lead to miscommunication because:
    6·2 answers
  • An office employee working in a payroll department uses a customized program to log hours employees have worked. The customized
    12·2 answers
  • In 4-bit sign magnitude representation, what is the binary encoding of the number -5?
    15·1 answer
  • To access your gradebook you click on the __________.
    6·2 answers
  • A computer (mainframe, server, or workstation) that has an operating system enabling _____________ to access it at the same time
    11·1 answer
  • Audiovisual means that a presentation combines film and photos.<br> true or false?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!