1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren2701 [21]
3 years ago
9

Which sources could provide reliable evidence for your claim? Check all that apply. a step-by-step guide listed at www.gettingto

college.com an article from the New York Times a book by an educational researcher and professor a report from the US Department of Education at www.ed.gov a blog post written by a college admissions director a high school student’s research report
Computers and Technology
2 answers:
kozerog [31]3 years ago
7 0
The correct answer is:
<span>an article from the New York Times</span>a book by an educational researcher and  professor<span>a report from the US Department of Education at www.ed.gov</span>
tigry1 [53]3 years ago
7 0

<em>Reliable</em>, in the context of evidence, usually implies the fact that a source can be trusted to support the idea or argument that an author is trying to make.

Not all information available online or offline are reliable, and from the options provided, sources that generally can be used as reliable evidence would be:  an article from the New York Times, a book by an educational researcher and professor, and a report from the US Department of Education.

You might be interested in
Kim is writing a sql query that will pull a list of customers with outstanding orders and the sales rep for each order. What sho
Step2247 [10]

What the phrase should say in Kim's SQL Query is;  WHERE Customer = Sales Rep

<h3>What is SQL Query?</h3>

Structured Query Language (SQL) is defined as a standardized programming language that is used to manage relational databases and perform various operations on the data in them.

Now in SQL Query, when one SQL query is embedded in another SQL query to simulate a join, the second SQL query is embedded in the "WHERE" of the first query.

Since the query will pull a list of customers with outstanding orders and the sales rep for each order. Then, the where phrase will be;

WHERE Customer = Sales Rep

Read more about SQL Query at; brainly.com/question/10097523

6 0
2 years ago
Write a function called countstuff () that takes as a parameter a character array, and returns an int. The prototype must be:
PSYCHO15rus [73]

Answer:

Please kindly go to the explanation part.

Explanation:

The required function is written in Raw code below.

Function:

#include<stdio.h>

#include<ctype.h> //including required libraries

int countstuff(char s[]){ //Function countstuff

int cntUp=0,cntLow =0,cntDigits = 0,i=0,value; //declaring required variables

for(i=0;s[i]!='\0';i++){ //loop to iterate over the characters of string

if(isupper(s[i])){

cntUp++; //incrementing count of uppercase if it is uppercase character

}

else if(islower(s[i])){

cntLow++; //incrementing count of lowercase if it is lowercase character

}

else if(isdigit(s[i])){

cntDigits++; //incrementing count of digits if it is digit

}

}

value = cntUp*1000000 + cntLow*1000 + cntDigits; //counting value using formula given in question

return value; //returning the value

}

void main(){

char string[1000]; //declaring required variables

int value;

printf("Enter a String:");

scanf("%[^\n]s",string); //taking string as input

value = countstuff(string); //calling function

printf("The Value is : %d\n",value); //printing result

}

5 0
3 years ago
Lập trình web truy vấn csdl và hienr thị ra màn hình danh sách các bản ghi
almond37 [142]

Answer:

ExplanatOverfishing occurs "when more fish are caught than the population can replace through natural reproduction," according to the World Wildlife . Once this occurs, the species is no longer "sustainable." Eighty-seven percent of all the world's fish stocks that we know about are at the "breaking point," according to the Environmental Defense Fund (EDF).

ion:

3 0
2 years ago
Which of the following is used to track and gather information without knowledge or authorization?
harkovskaia [24]
It might be spyware... but i might be wrong.
3 0
3 years ago
Read 2 more answers
8. If you, or someone you know is a victim of cyber-bullying what should you do? not say a word ,write mean things back ,report
bearhunter [10]

Answer:

report it

Explanation:

4 0
2 years ago
Read 2 more answers
Other questions:
  • You are using a crimper to attach an RJ-45 connector to a Cat 6 UTP cable. You need to use the T568A standard to connect the ind
    6·1 answer
  • Which buttons should you use to publish and change a message on a message board
    6·2 answers
  • Fortnite anyone? i just started tdy so dont be judgiee lol
    6·2 answers
  • Hazel has just finished adding pictures to her holiday newsletter. She decides to crop an image. What is cropping an image?
    10·1 answer
  • When browsing using certain browsers, if a page is known to be malicious or using phishing techniques in the past a browser may
    5·1 answer
  • What your favorite video game? (Put your user if you wanna play!)
    9·2 answers
  • What kind is a utility file that shrinks the size of a file
    14·1 answer
  • Why does my roku tv keep disconnecting from the internet.
    13·1 answer
  • !!! PLEASE HELP ASAP REALLY NEED IT !!!
    15·2 answers
  • you are currently logged in using the badams account. you want to view the contents of the /etc/inittab file, but you are not al
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!