1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saveliy_v [14]
3 years ago
12

To see if a website is using a secure connection, what should you look for? Select all that apply.

Computers and Technology
1 answer:
kupik [55]3 years ago
6 0

Answer:

– A web address using “HTTPS” (The extra “S”means it’s a secure connection. – Secure sites show a closed padlock emblem you can click on for security details – the most trustworthy sites will have green padlocks or address bars.

Explanation:

You might be interested in
the handles the overall activity of the computer and provides services such as memory management, input/output activities, and s
Alisiya [41]

The operating system controls the overall activity of the computer and furnishes services such as memory management, input/output activities, and storage management.

<h3>What is operating system?</h3>

An operating system (OS) is the programme that controls all other application programmes in a computer after being installed into the system first by a boot programme. Through a specified application programme interface, the application programmes seek services from the operating system (API).

It controls the memory, operations, software, and hardware of the computer. You can converse with the computer using this method even if you don't understand its language. A computer cannot function without an operating system.

An operating system performs three primary tasks: managing the computer's resources, including the CPU, memory, disc drives, and printers; creating a user interface; and running and supporting application software.

Hence, The operating system controls the overall activity of the computer and furnishes services such as memory management, input/output activities, and storage management.

To learn more about operating system refer to:

brainly.com/question/19999569

#SPJ4

4 0
2 years ago
which statement is true? O A Future games will be more context oriented. OB. Future games will be more product driven. Future ga
Wittaler [7]

Answer:

b

Explanation:

7 0
3 years ago
Read 2 more answers
What is the average value of a loyal customer (VLC) in a target market segment if the average purchase price is $75 per visit, t
anzhelika [568]

The value of loyal customers or VLC is derived by multiplying the values of the purchase price, contribution margin, repurchase frequency, and buyer's life cycle with each other.

<h3>How do you calculate a loyal customer's average value?</h3>
  • This number shows the amount of revenue your typical customer will likely provide to your company over the course of their dealings with you. Put into formula form: Customer value times typical customer longevity equals CLV. Using the equation: (P) (RF) (CM) = VLC (BLC) VLC = (75) (6) (10%) (1/0.25) VLC = $180.00 A loyal customer is worth an average of $180.00.
  • Loyalty-based segmentation gauges a customer's level of adherence to your brand, whether it is through participation in a rewards program, the volume of their purchases, or their overall engagement with your marketing initiatives.

VCL= 75*0.28

6*1/0.25=481,090.91

To learn more about value of a loyal customer refer to:

brainly.com/question/21306588

#SPJ1

5 0
1 year ago
Read 2 more answers
How can I get a refund of my money back
irakobra [83]

Say you got a dress from Macys but you dont like or it doesnt fit whitin 30 days usally you can take it back(with receipt . Most of the time you must show whoever you want the refund from a receipt.

4 0
4 years ago
Read 2 more answers
What is authentication?
Savatey [412]

Answer:

C

Explanation:

I believe that's the answer if it's not sorry

8 0
3 years ago
Other questions:
  • In window explorer, the opposite of expanding a folder is?
    11·2 answers
  • What are the advantages and disadvantages of it?
    14·1 answer
  • Write a fragment of code that will read words from the keyboard until the word done is entered. For each word except done, repor
    14·1 answer
  • ​according to your text, digital natives tend to prefer different digital communication channels more than do digital immigrants
    5·1 answer
  • Which of the following could be useful during system testing?
    6·1 answer
  • What type of malicious software technology is used to monitor user behavior or gather information about the user, sometimes incl
    5·1 answer
  • What should a consultant recommend to meet this requirement?Universal containers assign its contact center agents to certain int
    12·1 answer
  • Help me with A,b and c
    11·1 answer
  • You have a large text file of people. Each person is represented by one line in the text file. The line starts with their ID num
    5·1 answer
  • What microphone is this
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!