1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liraira [26]
3 years ago
14

How can you assess a website for currency?

Computers and Technology
2 answers:
aliya0001 [1]3 years ago
6 0

Answer:

By checking the page for dates showing when it was posted and when it was last revised

Hope this helps :)

<em>-ilovejiminssi♡</em>

mash [69]3 years ago
4 0
Answer: C if im corect
You might be interested in
Several coworkers in the sales department received an email claiming to be from you. Each message was personally addressed and c
LuckyWell [14K]

Answer:

The correct answer is A.

Explanation:

Vishing can be described as phishing but only using a mobile telephone, making the victim give up any personal information that could be used for identity theft etc.

Pharming is a process which redirects the traffic from a known and trusted website to another one where they perform the operation of stealing the personal information of the people.

The example given in the question falls into the category of "Spear Phishing" which is when the victim receive e-mails that look like they have been sent by a trusted and known individual. This way they are more likely to open the e-mail or click on the link in the e-mail and the phishing act has a higher chance of success.

I hope this answer helps.

6 0
3 years ago
Coordinate with
Lunna [17]

Answer:

First blank: producer

Second blank: Hairdressers

5 0
3 years ago
Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication
Serjik [45]

A device, usually external to a computer that is plugged into a computer's communication port or is connected wirelessly. Common peripherals are keyboards, mice, monitors, speakers, and printers

4 0
3 years ago
Ranges of IP address that anyone can use for their internal networks are known as ______.
Rama09 [41]
Since no answer choices, have to deduce it is Private Networks
8 0
3 years ago
Read 2 more answers
Explain vividly any operating system of your choice stating at least 3 distinguishing features of each version.
rosijanka [135]

Answer:

microsoft windows, macOS, and linux

Explanation:

if you need help let me know

7 0
3 years ago
Read 2 more answers
Other questions:
  • Can you help me correct a sentence?
    13·1 answer
  • what type of authentication does the dod require to accesss sensitive data on mobile devices and /or email
    7·2 answers
  • In what year was google launched on the web?
    14·1 answer
  • Someone asks you for help with a computer that hangs at odd times. You turn it on and work for about 15 minutes, and then the co
    7·1 answer
  • A company purchased a high-quality color laser printer to print color brochures and sales proposals. The printer is connected to
    5·1 answer
  • Name a piece of software you often use where it is easy to produce an error. Explain ways you could improve the interface to bet
    5·1 answer
  • What functions do these WLAN applications and tools perform on WLANs: airmonng, airodump-ng, aircrack-ng, and aireplay-ng
    10·1 answer
  • Which would be included in a SaaS platform?<br><br> A.data link<br> B.IaaS<br> C.Java<br> D.vb.net
    5·1 answer
  • A group of computers that are interconnected in order to share information or documents is called what?
    13·1 answer
  • HELP PLEASE
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!