1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
3 years ago
5

When using the Internet, it is important to know the validity of web page you are using. How can you know if the information is

reliable?
Question 3 options:

Sometimes domains that include .gov or .edu come from more trustworthy education or government sources.


Look at at the author bio or About page. How qualified is this person?


We can’t judge a book (or website!) by its cover but sites that are cluttered, difficult to navigate, or look amateurish may be worth avoiding.


All of the above
Computers and Technology
1 answer:
Svetradugi [14.3K]3 years ago
4 0

Answer: it would be the first option

ANSWER FROM EPICTORRACAT

You might be interested in
What three components should be included in a computer that is used to create TV commercials and music videos? (Choose three.
Vikki [24]

The three components is a specialized video card, large and fast hard drives and specialized audio card.

8 0
3 years ago
Read 2 more answers
Waht is the difference between authorization and access control? Access control specifies what a user can do, and authorization
spayn [35]
<h2>Answer:</h2>

Authorization specifies what a user can do, and access control enforces what a user can do.

<h2>Explanation:</h2>

Authorization is simply granting access to an authenticated user of an application. It specifies what a user can and/or cannot do. For example, for a user to access their banking details in an online banking service, they have to be authorized by first authenticating them to prove their identity. Another example is in an organizational system where some users (normally called admins) can access certain database info whereas some other users (normally called the regular users) cannot.

Access control is used to enforce the policies dictated by authorization. In other words, access control enforces the policy of what a user can and/or cannot do. Access control makes authorization possible. It is sometimes called privileges or permissions. For example, the <em>security tab </em>in the operating system of Windows, allow to set access privileges for certain files and/or folders. Another example is in an organizational system where some files on the organization's server are configured in such a way that access to it is restricted and dependent on some further authorization.

5 0
3 years ago
Read 2 more answers
describe how t - charts and star charts can be used to organize information into cause and effect relationships
soldier1979 [14.2K]

These two charts show both cause and effect relationships. T-charts, for instance, compares one word and contrast the other. It can help graphically make decisions by comparing resulting advantages and disadvantages or explaining the strengths and weaknesses of a piece of writing. The same case goes to the use of a star chart. A star chart is a map of the night sky that astronomers use to divide into grids for comparison. It turns the night sky into a readable map that helps humans travel the world just by using the stars.

6 0
3 years ago
Read 2 more answers
Write down a description of how a magnetic had drive works
Rus_ich [418]

Answer:

This is how a magnetic hard drive works

Explanation:

The hard drive contains a spinning platter with a thin magnetic coating. A "head" moves over the platter, writing 0's and 1's as tiny areas of magnetic North or South on the platter. To read the data back, the head goes to the same spot, notices the North and South spots flying by, and so deduces the stored 0's and 1's.

Hope it helps pls mark as brainliest

5 0
3 years ago
What is the capital for Russia
s344n2d4d5 [400]

Answer:

Moscow

Explanation:

Moscow is the capital of Russia and was made the capital in 1918.

4 0
3 years ago
Read 2 more answers
Other questions:
  • You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you r
    9·1 answer
  • The ability to learn a new computer software program is to ____________ as knowledge of state capitals is to _____________.
    11·1 answer
  • The ____ algorithm was the first public key encryption algorithm developed (in 1977 and published for commercial use.
    8·1 answer
  • Which statement describes a printer driver? a) It is the configuration code that is sent to a printer to identify the operating
    5·1 answer
  • Whats the correct answer
    15·2 answers
  • Mention five features on the desktop screen​
    5·1 answer
  • I will have to goste yall im busting my butt off doing homework
    10·2 answers
  • What is Parallelism? And what is Pipelining?<br> Can someone please explain them fully?!
    14·1 answer
  • Hey, how do we get our warnings removed? I got one and I didn't realize that what I did was wrong.
    6·2 answers
  • A _____ system allows a customer to request a fax using email, via the company website, or by telephone.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!