1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nlexa [21]
4 years ago
13

When using an online media source, students should ensure the information is

Computers and Technology
2 answers:
OLEGan [10]4 years ago
6 0
Viable and true. hope this helps!
vitfil [10]4 years ago
4 0
Relevant, credible, and valid.

You might be interested in
How can I crack a computer password?
Irina18 [472]
Try to use easy passwords first like the persons birthday fav color etc then move on to harder passwords
7 0
3 years ago
Ohh I'm so cool It a doge clicker!! What is a doge?
artcher [175]

Answer:

[ dohj, dohg ] SHOW IPA. / doʊdʒ, doʊg / PHONETIC RESPELLING. noun. an internet fad or meme typified by an image of a dog of the Shiba Inu breed accompanied by very short phrases that humorously represent the dog's imagined thoughts and use the wrong modifiers or shortened word forms, as "such dignified" or "amaze."

Explanation:

7 0
2 years ago
Read 2 more answers
Consider the following code: String word [] = {"algorithm", "boolean", "char", "double"}; for ( int i =0; i < word.length/2;
KiRa [710]

Answer:

{"double", "char", "char", "double"} will be stored in word.

Explanation:

Given the word is an array of four strings,  {"algorithm", "boolean", "char", "double"}. Hence, the length of the word array is 4.

The for-loop will only run for two iterations due to i < word.length/2, with i = 0 (first loop) and i = 1 (second loop).

In the first loop,  

  • word[word.length - 1 - i]  =  word[4 - 1 - 0]  = word[3]  = "double"
  • Hence, the string "double" will be assigned to word[0] and overwrite "algorithm"

In the second loop,

  • word[word.length - 1 - i]  =  word[4 - 1 - 1]  = word[2]  = "char"
  • Hence, the string "char" will be assigned to word[1] and overwrite "boolean"

At last, the word array will hold {"double", "char", "char", "double"}

8 0
4 years ago
Read 2 more answers
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
yaroslaw [1]

Answer:

Phishing

Explanation:

Phishing is a type of cyber attack in which the attacker masquerades as a trusted entity via e-mail and trick the recipient into clicking a malicious link that could steal user data including login details, credit card information e.t.c A phishing attack can have devastating effects such as Identity theft, Unauthorised purchase or stealing of funds on individuals.

The common types of phishing are<em>: Vishing, Smishing, Email Phishing, Search Engine Vishing, Whaling</em> e.t.c

3 0
4 years ago
Read 2 more answers
Two VALS segments stand apart. One segment represents the group with the highest resources and innovation and the other segment
irina1246 [14]

Answer:

Innovators and Survivors

Explanation:

The innovators are always interested in new information, are open to new ideas and trying out new things, future oriented and excellent problem solving skills. They represent the group with the highest resources according to the VALS segments.

Survivors are the group with the lowest resources. They are risk adverse, and exhibit low motivation towards new ideas or experiences.

3 0
4 years ago
Other questions:
  • Write a php program that checks the elements of a string array named $passwords. use regular expressions to test whether each el
    8·1 answer
  • Uugurfofyhjfsjvrdjctstghfjddd
    13·1 answer
  • A display that is thin, flexible, light, and easy to read in all types of light is
    9·2 answers
  • What is the name of the malware included in CCleaner?
    11·1 answer
  • PLEASE HELP I WILL METAL FOR AWNSER
    11·2 answers
  • Why do we allow electronic instruments to warm-up before use?
    11·1 answer
  • The marketplace for computer hardware:________ 1. has become increasingly concentrated in top firms 2. has expanded to include a
    5·2 answers
  • The security administrator for Corp.com wants to provide wireless access for employees as well as guests. Multiple wireless acce
    13·2 answers
  • when files on storage are scattered throughout different disks or different parts of a disk, what is it called
    10·1 answer
  • Shreya has combined all the cells in a single leftmost column in a table. Instead of identifying the category multiple times, sh
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!