1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
love history [14]
2 years ago
5

This website is using a security service to protect itself from online attacks.

Computers and Technology
1 answer:
uysha [10]2 years ago
3 0

Answer:

yes it has an ssl certificate making it impossible to hack

You might be interested in
List two items that are required to make a text file into a bash script.
Olenka [21]

Answer:

Explanation:

First a header is needed indicating which bash will be used (sh, zsh, bash, etc.), then it is necessary to change the file extension so that the system recognizes it as an executable file and no longer as text

6 0
3 years ago
Good keyboarding technique includes ________
Svetlanka [38]

Answer:

Keeping you hands on the homerow keys

Explanation:

3 0
2 years ago
Read 2 more answers
The "fathers of the internet" are vinton cerf and ________.
Harrizon [31]
Robert E Kahn I hope this helps
8 0
3 years ago
My cell phone rear camera is dirty does anyone know how to clean it?
Vesna [10]
If you have glasses the liquid and cloth can be used to clean it. You spray the camera, then use the cloth to wipe it up. If you don't have them the dollar store should have some, or even places like Walmart and Maceys.
5 0
3 years ago
Read 2 more answers
Telepresence provides the opportunity for people to work from home and attend virtually. True False
ira [324]
The answer is true.
Telepresence is essentially things like video-chat that allows people to participate in meetings even if they are not physically present.

I hope this helps! :)
~ erudite 
7 0
3 years ago
Read 2 more answers
Other questions:
  • What should you do if your computer keeps shutting down while working?
    9·2 answers
  • Univariate linear regression Note: Solutions to this problem must follow the method described in class and the linear regression
    7·1 answer
  • What are the first two lines of defense a company should take when addressing security risks?
    10·1 answer
  • What features are provided by most GUIs?
    7·1 answer
  • The need to strike a<br>- among work, life, family, and other responsibilities is<br>universal.​
    15·1 answer
  • Random Walker Collisions In lecture, we saw how to model the behavior of a random walker on a 2D grid using a Monte Carlo simula
    8·1 answer
  • The following are part of characteristics of a software requirement specification.
    6·1 answer
  • What is the second step when designing an algorithm?
    12·2 answers
  • Write a pseudocode that receives a positive number from the user, and then,
    14·1 answer
  • To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!