1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xenn [34]
3 years ago
6

Julie is purchasing new shoes on a website for her favorite store. Which of the following would indicate that a website is a sec

ure site? http https www wwws
Computers and Technology
1 answer:
OLEGan [10]3 years ago
7 0

Answer:

https

Explanation:

looking at one right now tryna get me some shoes

You might be interested in
2+2? D: I don't knoww​
Grace [21]

Answer:4

Explanation:

just bc it is

5 0
3 years ago
The security manager assigned a new security administrator the task of implementing secure protocols on all wireless access poin
Marysya12 [62]

Answer:

Good choice, as its one of the most secure wireless communications encryption methods, even though WPA2 would be the best

Explanation:

8 0
3 years ago
Question 1(Multiple Choice Worth 2 points)<br> Which of the following is true of a good photograph?
Rainbow [258]

Answer:

No link but good things about a photgrahp are

Explanation:

Good lighting

Good camra

Good spot

Good zoom

Good focus

4 0
3 years ago
Read 2 more answers
100 POINTS NEED ASAP PLEASE HELP
givi [52]

It is actually podcast! i took the quiz as well :)

3 0
3 years ago
Read 2 more answers
Match the job roles with their appropriate qualifications
UNO [17]
Knowledge...- software QA engineer
Master’s...- business analyst
course...- network and computer admin
training...- multimedia artist
3 0
3 years ago
Other questions:
  • What is the purpose of the “little down arrow” next to many different functions in word
    6·1 answer
  • Which of following allows you to share a file with someone that is too large to send via e-mail?
    5·1 answer
  • 1. Define a C++ function with the name evaluateBook. The function receives as one argument the name of the file to be processed
    13·1 answer
  • For Windows 9x and Windows NT operating systems, which authentication protocol should be used that protects the authentication p
    11·1 answer
  • Drag the correct type of update to its definition.
    13·1 answer
  • What is the importance of human flourishing to science and technology?​
    8·1 answer
  • There is a file of a few Sean Connery movies on the internet. Each entry has the following form:
    9·1 answer
  • What happens if an email server cannot find a matching username or the mailbox is full
    14·2 answers
  • 19. Fatigue can help improve your reaction time.<br> False<br> O True
    8·2 answers
  • Looking for similarities between concepts or problems is referred to as
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!