1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin2010 [14]
3 years ago
7

1. While researching online, you come across an article that prominently displays the author's name. This source is likely to ha

ve
A. timeliness.
B. unreliable sources.
C. authority.
D. a direct citation.
Computers and Technology
2 answers:
PSYCHO15rus [73]3 years ago
6 0

In  researching online, if you come across an article that prominently displays the author's name, this source is likely to have authority.

<h3>What is an authority?</h3>

This is known to be the power of a person to be able to affect others in form of influence or command them.

Note that based on the above,  In  researching online, if you come across an article that prominently displays the author's name, this source is likely to have authority.

Learn more about authority from

brainly.com/question/507147

#SPJ1

mash [69]3 years ago
5 0

This information source is likely to have a direct citation.

<h3>What is a direct citation?</h3>

A direct citation typically occurs when an article or any piece of text contains word-for-word contents directly taken from another author’s, or from a previously published work by the author.

In the case of this online article, since it prominently displays the author's name, the rules of academia put the author of the article under obligation to also make direct citations of word-for-word material gotten from other authors or previous works published by him, otherwise, he could be sanctioned for plagiarism.

You can learn more about direct citations from a related question here brainly.com/question/683722

#SPJ1

You might be interested in
Like this post if u hate edhesive
Charra [1.4K]

Answer:

I hate Adhesive.

Explanation:

Adhesive is something of or relating to the molecular force that exists in the area of contact between unlike bodies and that acts to unite them. And that is just ridiculous.

5 0
3 years ago
Why has the PCM sampling time beenset at 125 microseconds?
suter [353]

Answer Explanation:c

PCM( pulse code modulation) is a process for transmitting the analog data from one place to other place the signal which are used in pulse code modulation are binary that is only 0 and 1 using PCM all forms of analog data can be form including voice music etc.

to obtain pcm an analog signal is sampled at regular time interval the sampling rate is very high as compared to the frequency used by analog signal. the instant amplitude of analog signal at each sampling is being closer to the nearest several specific earlier levels.this process is called tantalization. in this the number of level is power of 2 so the sampling time is set as 125 microseconds.

3 0
4 years ago
Do the police check your mobile device during police checks?
JulsSmile [24]

They cannot legally check it without a warrant.


Depending on the circumstances of the arrest/check, and the method of seizure of the mobile device, you are subject to a certain set of rights, laws, or protections. First off, know that it is your right to decline the warrantless search of your mobile phone. If you are arrested or taken into police custody, you should verbally state that you do not consent to a search of your devices. A law enforcement agency is only permitted to conduct a warrantless search of your device if a compelling case for an emergency can be made.


If the authorities are using evidence obtained through an unlawful search of your mobile device against you in a criminal proceeding, you can move for that data to be suppressed under the Fourth Amendment right to freedom from incidental seizures.

4 0
3 years ago
How to fix this.. facing this problem to upload logo
AlekseyPX
I use an app called codechecker that helps with me having issues like that cause 99% of the time I'll mess it up.
7 0
3 years ago
The screened subnet protects the DMZ systems and information from outside threats by providing a network with intermediate secur
maks197457 [2]

Answer:swswsw

Explanation:swwsws

4 0
3 years ago
Other questions:
  • Calculated fields can be entered in queries. What row should you type a calculated field in?
    13·1 answer
  • Business ethics are?
    9·1 answer
  • Which of the following is an example of indirect perception checking?
    7·2 answers
  • Wap to input any multi digits number and display the sum of odd digits and even digits​
    5·1 answer
  • this device can be used to type documents,send email,browse the internet,handle spreadsheets,do presentations,play games,and mor
    14·1 answer
  • Which type of memory helps in reading as well as writing data?
    7·1 answer
  • What are the most positive and the most negative decimal numbers that can be represented by a 2C (n+k) bit fixed-point number, w
    12·1 answer
  • How many tables are needed to implement an REA data model that has five distinct entity-sets, two many-to-many relationships and
    6·1 answer
  • Pick the correct statements on the 64-bit machine representation of numbers.
    5·1 answer
  • The internet is controlled by ______
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!