1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viva [34]
3 years ago
10

What are the cues that a website is safe to use for exchanging sensitive information?

Computers and Technology
1 answer:
sasho [114]3 years ago
8 0
Check if it uses .com, .org, .tv, etc. Or check if it has a citation, who created it.
You might be interested in
The process of executing a program is also called ________.
irga5000 [103]
It is also called running it.  Hope this helps!!!
5 0
3 years ago
if you play creative destruction and if u have a mic and if u play it 24/7 and would like to form a team tell me your name or yo
kipiarov [429]

i dont know that game but ill see if i like it and if i do ill send u my ID number ok


8 0
3 years ago
What are the similarities and differences in an electronic crime scene as compared to a traditional crime scene?
geniusboy [140]
Traditional crime scenes have physical evidence while electronic crime scenes have digital evidence such as IP address, geolocation, and user data.
8 0
2 years ago
Anne wants to know more about rock music. How should Anne begin her search? a) browse the rock music category of a Web directory
galben [10]
B)Do a search on a search engine about rock music=this is how she should start.
6 0
3 years ago
Use a _____ to safeguard computer systems from voltage fluctuations.
liq [111]

Answer.

1.Surge protection board

2.Uninterrupted Power Supply (UPS)


Explanation

A surge protection board is designed to protect equipment against a power surge or over voltage in power supply.A UPS provides back up power in occasions of power outage.In most events of power cut,UPS units only allow a person to save the work and perform a controlled shutting down of a computer.

4 0
3 years ago
Other questions:
  • Consider the code below. Note that the catch statements in the code are not implemented, but you will not need those details. As
    11·1 answer
  • Stefan is finalizing his presentation by adding media files and preparing it for distribution. Stefan knows that saving a presen
    13·1 answer
  • Consider the following protocol for concurrency control. The database system assigns each transaction a unique and strictly incr
    6·1 answer
  • Does anyone know the answer for this? I’m extremely confused.
    8·2 answers
  • A customer has a computer for a home business, but wants to have another computer as a web server. What would be the best soluti
    11·2 answers
  • Indica si los elementos de las imagenes son una materia prima o un material elaborado
    12·1 answer
  • Examples of email use that could be considered unethical include _____.
    14·2 answers
  • Help me please I’m failing
    11·1 answer
  • To be useful for most household applications, DC voltage is?please <br>​
    7·1 answer
  • Write a Pascal program that will prompt the user to enter the radius of a circle.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!