1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddik [55]
3 years ago
14

Based on the description below which website is more appropriate

Computers and Technology
2 answers:
I am Lyosha [343]3 years ago
8 0

Answer:

D

Explanation:

nydimaria [60]3 years ago
7 0

Answer:

The answer is d

Explanation:

because asking for 10 dollars is the first website is not normal and in the second describing violent behavior is not ok and the third asking for personal information for a free bike is not good but d a site sponsored giving you factual information that made by the government is trustworthy

You might be interested in
Which of the acronyms listed below refers to a series of basic hardware diagnostic tests performed by the startup BIOS after the
Morgarella [4.7K]

Answer:

POST

Explanation:

  • POST stands for Power On Self test.
  • The process of booting the system involves performing the self test POST.
  • POST involves testing the computer hardware which are required for proper functioning of the computer.
  • If the POST test fails, the computer performs the necessary action required for the proper functioning of the computer.It immediately raises alarm ( beeps ) . Different number of beeps represents different devices which are having trouble.
  • So, option (D) is correct option.
  • Option (A) IDE is not the test. So, option (A) is wrong option.
  • Option (B) POTS is not the test.So, option (B) is wrong option.
  • Option (C) QoS is not the test. So, option (C) is wrong option.
7 0
3 years ago
A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
Tom [10]

Answer: Passive

Explanation: Passive scanning is the process that scans the possibility of the risk that can arise while data is received starting port to the destination. It does the scanning between the server and the client software to define vulnerability .

It cannot work in those network which don't persist the traffic.No false data that is present in the application is detected by it if the data is unclear.

5 0
3 years ago
The merge and center
elena-s [515]

Answer:

True

Explanation:

Merge & Center is a feature in excel that combines multiple cells and centers the contents of the first cell. You can merge columns and rows too.

8 0
3 years ago
Select the correct answer.
Anit [1.1K]

Answer: Steady OR Flashing

Explanation: If you are talking about the internet connection / power received lines One light should be Solid or "Steady" and the other usually green light will be flashing indicating that data is being transferred. Beware that just because the Orange light is Steady that does not mean that the internet is working that just means that it sees its connected.

4 0
3 years ago
Read 2 more answers
Assuming dataFile is an ofstream object associated with a disk file named payroll.dat, which of the following statements would w
svet-max [94.6K]

Answer:

dataFile << salary;

Explanation:

To write salary to a file (payroll.dat) using ofstream, you make use of the following instruction:

<em>ofstream dataFile; </em>

<em>myfile.open ("payroll.dat"); </em>

<em>myfile <<salary; </em>

<em>myfile.close();</em>

<em />

This line creates an instance of ofstream

<em>ofstream dataFile; </em>

This line opens the file payroll.dat

<em>myfile.open ("payroll.dat"); </em>

This is where the exact instruction in the question is done. This writes the value of salary to payroll.dat

<em>myfile <<salary; </em>

This closes the opened file

<em>myfile.close();</em>

<em />

<em />

8 0
3 years ago
Other questions:
  • Why are advanced features helpful when businesses use spreadsheets
    5·1 answer
  • Name the function in Python that prompts user to enter values as per the data type specified.
    5·1 answer
  • "The effectiveness of memory retrieval is directly related to the similarity of cues present when the memory was encoded to the
    11·1 answer
  • A token is combination of hardware and software that acts as a gatekeeper and prevents unauthorized users from accessing private
    11·1 answer
  • What was the first fully computer animated feature film?
    13·1 answer
  • Which one of the following characteristics or skills of a ScrumMaster are closelyaligned with coaching?Select one:
    5·1 answer
  • ___ is an example of a function prototype.
    12·1 answer
  • What is a orogram to block access to websites
    15·1 answer
  • GIVING BRAINLIEST Jenna creates advertisements for companies to air on television. Which file format will best preserve the grap
    5·2 answers
  • Jobs that use math and science to solve problems involving the design and development of technologies can be found in the what c
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!