1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grin007 [14]
3 years ago
11

What is the most credible website or webpage you have ever visited?Why is it so credible? Describe some of the qualities that ma

ke that website credible
Computers and Technology
1 answer:
alekssr [168]3 years ago
3 0
I'm not sure, but easybib is very good at finding credible sources. Steer clear of websites like Wikipedia when making research papers, and .com websites, or bias websites
You might be interested in
Write a program that uses the function isPalindrome given in Example 6-6 (Palindrome). Test your program on the following string
Artist 52 [7]

Answer:

#include <bits/stdc++.h>

using namespace std;

bool isPalindrome(string str)

{

   char a,b;

int length = str.length();

for (int i = 0; i < length / 2; i++)

{

   a=tolower(str[i]);//Converting both first characters to lowercase..

   b=tolower(str[length-1-i]);

   if (b != a )

return false;

}

return true;

   

}

int main() {

   string t1;

   cin>>t1;

   if(isPalindrome(t1))

   cout<<"The string is Palindrome"<<endl;

   else

   cout<<"The string is not Palindrome"<<endl;

return 0;

}

Output:-

Enter the string

madam

The string is Palindrome

Enter the string

abba

The string is Palindrome

Enter the string

22

The string is Palindrome

Enter the string

67876

The string is Palindrome

Enter the string

444244

The string is not Palindrome

Explanation:

To ignore the cases of uppercase and lower case i have converted every character to lowercase then checking each character.You can convert to uppercase also that will also work.

6 0
3 years ago
An employee mentions that opening a large document file is taking longer than usual. The desktop support technician suspects tha
kumpel [21]

Answer:

Perform data backup on the work computer

Explanation:

It is very important that at every point in time that a technician will perform a maintenance, repair, or troubleshooting. the data on the work computer should be backed up to avoid loss. This is done to avoid data loss resulting from failure from hardware or software, backup provides copy of critical data immediately the maintenance is done, therefore backup is very important before any troubleshooting is done.

8 0
3 years ago
Lots of data can be transferred in short time, when we have,
dusya [7]

Answer: B. Higher Bandwidth

8 0
2 years ago
Read 2 more answers
A student is having trouble finding enough time in his busy schedule to work on his school science project. He has a demanding s
Katena32 [7]

Answer:c

Explanation:

got it rii

3 0
3 years ago
Read 2 more answers
When first defining the cloud, NIST gave three service models, which can be viewed as nested service alternatives: software as a
irakobra [83]

Answer:

Infrastructure.

Explanation:

In Computer science, Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives. It offers individuals and businesses a fast, effective and efficient way of providing services.

Simply stated, Cloud computing are services or programs located on the Internet, they are usually remote resources making use of cloud storage.

When first defining the cloud, National Institute of Standards and Technology (NIST) gave three (3) service models, which can be viewed as nested service alternatives;

1. Software as a Service (SaaS).

2. Platform as a Service (PaaS)

3. Infrastructure as a Service (IaaS).

According to NIST, the five (5) characteristics of a cloud computing service are;

1. On-demand self-service .

2. Broad network access .

3. Resource pooling .

4. Rapid elasticity .

5. Measured service.

Additionally, the cloud service can either be deployed as private, public, hybrid or community service.

6 0
3 years ago
Other questions:
  • kai is interviewing for a job, and the interviewer asks him for an example of skill at cooperating with others. Which example be
    14·2 answers
  • What is the name for the individual sections of the ribbon in PowerPoint 20162
    8·1 answer
  • Identify which of these types of sampling is​ used: random,​ systematic, convenience,​ stratified, or cluster. To determine her
    13·1 answer
  • When cleaning a computer, you need only worry about what you can see.
    11·1 answer
  • A standard for compressing music into computer files that can be easily exchanged on the Internet is called a(n) ______. A. musi
    5·1 answer
  • What is the full path and filename for the file on a Debian Linux distribution that displays the time zone settings?
    13·1 answer
  • Explain how the CPU processes data instructions.
    6·1 answer
  • What number will be output by the console.log command on line 5?
    9·1 answer
  • RTOS stands for ______ Time Operating System.
    11·1 answer
  • Which of the phases of the software development life cycle (SDLC) would the following action take place in?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!