1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
3 years ago
5

When using the Internet, it is important to know the validity of web page you are using. How can you know if the information is

reliable?
Question 3 options:

Sometimes domains that include .gov or .edu come from more trustworthy education or government sources.


Look at at the author bio or About page. How qualified is this person?


We can’t judge a book (or website!) by its cover but sites that are cluttered, difficult to navigate, or look amateurish may be worth avoiding.


All of the above
Computers and Technology
1 answer:
Svetradugi [14.3K]3 years ago
4 0

Answer: it would be the first option

ANSWER FROM EPICTORRACAT

You might be interested in
Accepted identifier for a variable in PHP except:
olganol [36]

Answer:

b. & Puihaha

Explanation:

PHP variables are supposed to start with a $ sign.

Other rules followed by PHP variables are:

Starting character in variable name (after $) must be letter or _.

Other characters in variable names can be letters,numbers or _.

a. $_Puihaha

c. $Pui_haha

d. $Puihaha

satisfy these rules.

Whereas , b. & Puihaha does not satisfy as it starts with '&'. Moreover it also contains an invalid space character in the variable.

3 0
3 years ago
An author is preparing to send their book to a publisher as an email attachment. The file on their computer is 1000 bytes. When
maksim [4K]

Answer:

The data is transformed to usually make it smaller. It can always be re-constructed back to the original.

Explanation:

I'm on the same lesson on code.org as you, so just go to the question before and the answer to that question was the answer!  ;)

Let me know if you got it right!

5 0
4 years ago
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
mihalych1998 [28]

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
5 0
3 years ago
Presentation aids should include short phrases or images to convey your message.
pantera1 [17]
Hi!

The answer is True because a typical audience does not have a large attention span so using short phrases and images is the best way to get your message across to them.
5 0
3 years ago
We want to implement a data link control protocol on a channel that has limited bandwidth and high error rate. On the other hand
Korolek [52]

Answer:

Selective Repeat protocols

Explanation:

It is better to make use of the selective repeat protocol here. From what we have here, there is a high error rate on this channel.

If we had implemented Go back N protocol, the whole N packets would be retransmitted. Much bandwidth would be needed here.

But we are told that bandwidth is limited. So if packet get lost when we implement selective protocol, we would only need less bandwidth since we would retransmit only this packet.

6 0
3 years ago
Other questions:
  • How do you scan a qr code on your iPhone
    5·2 answers
  • Which architect designed the Guggenheim Museum in New York?
    6·2 answers
  • An expression involving byte, int, and literal numbers is promoted to which of these?
    12·1 answer
  • The QWERTY keyboard is the most common layout of keys on a keyboard. <br> a. True<br> b. False
    8·2 answers
  • Let's practice Audience analysis by going to the Google Merchandise Store demo account with a date range of Feb 1, 2016 - Feb 29
    13·1 answer
  • Which of the following is the correct financial function that returns the periodic payment for a loan?
    10·1 answer
  • Given the code as follows: main() { int i = 3, n; float x; x = i; n = 8 % x; } What problem will occur? Group of answer choices
    12·1 answer
  • The advantages and disadvantages of internet​
    6·1 answer
  • We begin with a computer implemented in a single-cycle implementation. When the stages are split by functionality, the stages do
    13·1 answer
  • A server malfunction has been resolved after replacing a failed hard drive. Enterprise services have been restored. What is the
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!