1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
3 years ago
13

Which prefix indicates you are browsing a secure webpage

Computers and Technology
1 answer:
natka813 [3]3 years ago
4 0

Answer is in the screenshot

You might be interested in
Which of the following terms means the computer operating system automatically detects and installs the proper driver for a new
lukranit [14]
Plug and play installation
4 0
3 years ago
Is there such a thing as an ethical reason for unauthorized access into a computer system?
Anastaziya [24]
Of course there is. On a simple level, consider a parent trying to locate their missing child. Someone might break into their social media accounts to see if there are messages that might help determine their whereabouts.

Consider a website hosting inappropriate pictures of children. Breaking into the server hosting the files and removing them is 100% ethical. 

I'm sure you can think of more examples. 
7 0
3 years ago
________ enables advertisers to display more relevant ads based on user's search and browsing history. FIP NORA A Web bug An int
Arturiano [62]

Answer:

Behavioural targeting

Explanation:

Behavioural targeting is the method that enables advertisers to display more relevant ads based on user's search and browsing history. This is an online targeting technique that collects information from a particular user. This information comes from the person's browsing history. The information that comes from the browsing history enable advertisers to display specific targeted ads that would most appeal to the person in question.

7 0
3 years ago
Help me plssssss which rule should be followed to stay safe online
max2010maxim [7]

Answer:

B: Avoid Sharing Photos

Explanation:

If you send a photo to a person, you need to be very careful not to send something that can give your information away, this includes but it not limited to Pictures of your town, Pictures of You, Pictures of Friends, Pictures of Family, etc.

Hope I could help!!

7 0
3 years ago
Read 2 more answers
You have been tracking your exercise routine, which involves running, lifting weights, yoga, and stretching. You want to see wha
Harrizon [31]

The best chart to see the data distribution for the exercise routine would be a pie chart. Using Microsoft Excel, you can input each data point you have for all you exercise routine category, and generate a pie chart which will show you the percentage for each category in comparison to the total.


5 0
4 years ago
Read 2 more answers
Other questions:
  • Someone is retiring next year. What would be an appropriate amount of risk to take their investments?
    8·2 answers
  • Noah's document was very plain and would not catch the readers' attention. Select each item below that would make
    7·1 answer
  • ANSWER THIS CORRECTLY FOR BRAINLIEST
    13·2 answers
  • 1.6 code practice: question 1 edhesive
    12·2 answers
  • Validating the results of a program is important to a. correct runtime errors b. make sure the program solves the original probl
    8·1 answer
  • Unleashes the ability of each person on their team to improve performance, solve problems, and
    6·2 answers
  • A source mainly provides <br> from a text or piece of media.
    6·2 answers
  • How does a cell phone change the<br> incoming signals from a caller into sound that<br> you can hear
    10·2 answers
  • What is the shortcut key to create a new desktop ​
    11·2 answers
  • Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and ins
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!