1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetllana [295]
3 years ago
7

An academic or professional blog would be especially useful in which of the following fields?

Computers and Technology
2 answers:
Vesna [10]3 years ago
7 0
Blogs, even academic and professional, are not usually considered reliable sources. Most importantly, that's because they don't undergo the peer review process, which ensures the quality of the published papers (that they don't publish lies, in simple words).

So usually, you would prefer a published paper.

When then would you use a blog?
One such instance is when you want to find out about a quickly changing field , for example the newest standards in software development. So software engineering is one such field.

Another field is internet protection and security, as the viruses and the ways to defend against them also develop faster than can be published in a paper
Advocard [28]3 years ago
5 0

Answer:

The answer is Information Technology

Explanation:

Information Technology

Construction

Retail sales

Marketing

these were the 4 choices and the first one is correct

You might be interested in
A security event popped up, alerting security of a suspicious user gaining access to, and copying files from, the %systemroot%\n
daser333 [38]

There are different kinds of event.  What the user trying to do is to gather employee login credentials.

<h3>What is a credential harvester?</h3>

Credential Harvesting  is a term that is also called Account Harvesting. This is known to be a type of MITM attacks, DNS poisoning, phishing, etc.

It is often used to gather a lot of high numbers of credentials (such as username /or password combinations) and it is done mainly for reuse.

Learn more about security event from

brainly.com/question/25720881

6 0
3 years ago
1. (01.03 MC) What is a string in Python
luda_lava [24]

Answer:

sorry I haven't answer your question but please can you provide me the information about the computer python

7 0
3 years ago
Read 2 more answers
प्रश्न-20 उचित स्थान पर विराम चिह्न लगाइए
prohojiy [21]

Answer: HIND TOENGLISH TRANSALATION

Explanation:  Question-20 Put punctuation marks at the appropriate place

a) Kamal you are truly extraordinary

b) Subhash Chandra Bose said you give me blood, I will give you freedom

c) Are you Mr. Pravesh Verma

d) In every society there are all kinds of people good and bad, poor and rich, small and big.

e) Friends, now the time has come to die on the country.

3 0
3 years ago
Which are examples of digital video? Choose all that apply.
Cerrena [4.2K]

Answer:

video downloaded from a website and played on a portable electronic device

Explanation:

8 0
3 years ago
Read 2 more answers
Which of the following is considered a period cost in absorption​ costing? A. variable manufacturing overhead costs B. fixed man
sasho [114]
Ccccccccccccccccccccc
5 0
3 years ago
Other questions:
  • A. True
    5·1 answer
  • What is used in computers to communicate with wireless keyboards, mice, and printers?
    8·1 answer
  • The term____relates to all things that we see.
    13·1 answer
  • Software that interprets commands from the keyboard and mouse is also known as the
    15·2 answers
  • What is the value stored at x, given the statements:
    11·1 answer
  • What is eight bits of data called?
    13·1 answer
  • Explain why the scenario below fails to meet the definition of a stakeholder.
    5·1 answer
  • Pls help me Pls help me
    13·1 answer
  • Draw the following diagrams to represent the information system chosen in assignment 1 Context diagram The context diagram is ex
    12·2 answers
  • The _________________ can be used to repair common causes of unbootable operating systems. It is based on the Windows Preinstall
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!