1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natka813 [3]
3 years ago
7

What is the web of trust

Computers and Technology
2 answers:
kodGreya [7K]3 years ago
7 0
D. A group of reviewers with your highest ratings
Oksana_A [137]3 years ago
4 0

Answer:

A group of reviewers with your highest rating

Explanation:

A web of trust is kind of a crowd sourcing platform that helps site users to see how trustworthy a website is based on the ratings of other users and also enables the user of the site to review the sites as well.

It is a crowd sourcing in the sense that it depends on the ratings of a group of reviewers with highest ratings on a website to determine how safe and trustworthy the site is or will be. it doesn't depend on the ratings a specific group of experts. The higher the ratings the safer the website is said to be.

You might be interested in
Give two reasons why cloud computing could be detrimental to a company.
dimulka [17.4K]

Security/Insider threats.

As much as cloud computing is good for your organization, just know that someone is looking after your data. The cloud provider does everything for you from maintenance to managing security. The bigger picture here is that users are entrusting their data to someone else. Although the work of cloud providers is to ensure that your data is safe, some are not always looking after your best interests.

Cyber-attacks.

Any time your data is stored on the cloud, you are at a higher risk of cyber-attack. Vulnerabilities such as DDoS attacks might occur and this single point of failure is in the cloud. As cloud computing continues to become more sophisticated, so do cyberattacks. As much as the security is right, hackers will go to any lengths to penetrate the systems.  


3 0
3 years ago
In Revit, BIM provides a variety of model information. Which piece of information is not offered by BIM? Select Answer A) Payrol
gizmo_the_mogwai [7]

Answer:

yeet my points into my wallet i need brainliest for points plzz

i actually think scheduling im 11 so i dont know dude

4 0
3 years ago
The ____ attribute lets you control how the internal table gridlines are drawn.
nevsk [136]
<span>cell spacing is the answer</span>
4 0
2 years ago
What would be the result after the following code is executed? int[] numbers = {40, 3, 5, 7, 8, 12, 10}; int value = numbers[0];
maw [93]

Answer:

The value variable will contain the lowest value in the numbers array.

Explanation:

Given

The given code segment

Required

The result of the code when executed

The illustration of the code is to determine the smallest of the array.

This is shown below

First, the value variable is initialized to the first index element

int value = numbers[0];

This iterates through the elements of the array starting from the second

 for (int i = 1; i < numbers.length; i++) {

This checks if current element is less than value.

     if (numbers[i] < value)

If yes, value is set to numbers[i]; which is smaller than value

value = numbers[i];

<em>Hence, the end result will save the smallest in value</em>

7 0
2 years ago
Your corporation hosts a Web site at the static public IP address 92.110.30.123.
ladessa [460]

Answer:

Check the explanation

Explanation:

In line with the question, we can now derive that:

The router's outside interface IP address will be 92.110.30.65.

The router's inside interface IP address will be 192.168.11.254.

The Web site's IP public IP address will be 92.110.30.123.

The private IP address of the backup Web server will be 192.168.11.110.

and when we say IP address, it stands for Internet Protocol, it is a set of usual predefined rules which are utilized to administrate the manner to which data packets are sent over the internet. An IP address, which is typically just identified as an IP, is a sequence of figures used to uniquely recognize a computer/device on a particular network or on the internet space.

7 0
3 years ago
Other questions:
  • What is the primary purpose for a screen saver in windows?
    8·1 answer
  • What would I need to make the perfect music video
    10·1 answer
  • According to your textbook, which of the following is a consequence of the quick development of new technologies in the digital
    8·1 answer
  • Oracion con punto focal​
    6·1 answer
  • A thin red border indicates the active cell. (True or False)
    12·1 answer
  • Select the statement that best describes the function of the cell wall. O it gives shape to plants cells. O it produces food fro
    14·1 answer
  • An algorithm that could execute for an unknown amount of time because it depends on random numbers to exit a function may:______
    13·1 answer
  • In order for the image tag in an HTML file to function properly, the file named square.png must be located where?
    5·2 answers
  • AYYOOOO CAN YOU HELP A GIRL OUUTT???
    11·1 answer
  • WHO LOVES THE KREW LOOK IT UP ON YOU_TUBE IF UR NOT SURE BUT PLZ SUBSCRIBE TO HER SHE DA BEST "YOOT" the one with pink and golde
    13·3 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!