1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anastassius [24]
3 years ago
5

When browsing using certain browsers, if a page is known to be malicious or using phishing techniques in the past a browser may

display a _________ before allowing you to move forward. Select one: Red Flashing Lights Red X Warning Bell Warning Page
Computers and Technology
1 answer:
Ghella [55]3 years ago
7 0

Answer:

the last option

warning page

You might be interested in
Whate is function of northe bridge<br>​
Scorpion4ik [409]

Answer:

After this I'm officially a virtuoso

Explanation:

Sorry bout the spelling

3 0
3 years ago
Which of the following parameters should match in order for a pair of routers to form an adjacency when running OSPFv2? (Points
Gnom [1K]

Answer: Subnet mask

Explanation:

 Subnet mask is the type of parameter that should be match in order to form the adjacency for running the OSPFv2. The subnet mask is mainly used to identifying the address of network in the system.

The OSPF enable the router that must form an adjacency with the neighbors before sharing any type of data.

It mainly determine the neighbors links in the OSPF. The OSPFv2 router send the special type of message which is known as hello packet in the network.  

 

4 0
3 years ago
Which of the following is NOT a factor of identifying graphic design?
kolezko [41]

Answer:

i think it is a

Explanation:

sorry if it is wrong

4 0
2 years ago
Read 2 more answers
2. Why do old video games have large pixels and images with jagged edges?
egoroff_w [7]

Answer:

A

Explanation:

cuz yea

3 0
1 year ago
In the world of computers, the term ____ refers to the computerâs physical components, such as the monitor, keyboard, motherboar
USPshnik [31]
The missing word there is hardware
6 0
3 years ago
Other questions:
  • How can you recognize an unsecured wireless network?
    9·1 answer
  • Fax machines, voice mail, electronic mail, and electronic conferencing are all examples of _________.
    15·2 answers
  • Click _______ to view each individual record of a mail merge document.
    5·2 answers
  • 5. Drawing Conclusions If you were a person in
    10·1 answer
  • python A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun
    15·2 answers
  • What is a project?
    5·2 answers
  • How do I delete my brainly account?<br> I don't need anymore.
    13·2 answers
  • . Write a C++ Code to get a multiline statement Str1 from a user with a ‘$’ as return character (Hint:
    6·1 answer
  • What is a hardware device that allows you to connect to several computers and other devices to a single internet connection
    6·1 answer
  • Why does rating an incorrect answer as 1 star raise its score on brainly?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!