1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren2701 [21]
3 years ago
9

Which sources could provide reliable evidence for your claim? Check all that apply. a step-by-step guide listed at www.gettingto

college.com an article from the New York Times a book by an educational researcher and professor a report from the US Department of Education at www.ed.gov a blog post written by a college admissions director a high school student’s research report
Computers and Technology
2 answers:
kozerog [31]3 years ago
7 0
The correct answer is:
<span>an article from the New York Times</span>a book by an educational researcher and  professor<span>a report from the US Department of Education at www.ed.gov</span>
tigry1 [53]3 years ago
7 0

<em>Reliable</em>, in the context of evidence, usually implies the fact that a source can be trusted to support the idea or argument that an author is trying to make.

Not all information available online or offline are reliable, and from the options provided, sources that generally can be used as reliable evidence would be:  an article from the New York Times, a book by an educational researcher and professor, and a report from the US Department of Education.

You might be interested in
What is the technological singularity and what are the dangers it brings to man
professor190 [17]
The definition according to google and the dictionary of technological singularity is the following : The technological singularity (also, simply, the singularity) is the hypothesis that the invention of artificial superintelligence will abruptly trigger runaway technological growth, resulting in unfathomable changes to human civilization.

The dangers this brings to man kind is the fact that people will turn out to not be people or there may be a different species considered as humans or human kind .Also we were made as humans from something else artificial super intelligence will basically be forming from us which means it will be forming from something that was already mean basically meaning there will be something changed within the species or artificial super intelligence itself.
3 0
3 years ago
Write a program that assigns values to
ss7ja [257]

Explanation:

10:A program that assigns the sum 20,30,40

20: input 20,30,40

30:sum input

40: print total

End

3 0
3 years ago
Which microsoft operating system started the process of authenticating users with a user name and password?
11111nata11111 [884]
It should be either windows 98 or windows xp but I think it is windows xp
5 0
3 years ago
Carol purchases a computer. She installs speech recognition software on the computer.
Leno4ka [110]

<u>B. Microphone</u> helps Carol to use the speech recognition software.

<u>Explanation</u>:

A microphone is a hardware device which converts the sound waves in the air into electronic signals. The electrical signals are transferred to a recording medium. Four main types of microphones are as follows:

i) Cardioid

ii) Super cardioid

iii) Omni

iv) Figure 8

Handheld microphone can be used better with the home theater or a karaoke machine. The speech recognition software can be used with the help of microphone. Cabling problem can be avoided with the use of microphone, thus cable trip hazard can also be avoided.

5 0
3 years ago
The ________ is responsible for the Internet's domain name system and the allocation of IP addresses. ICANN W3C ISOC IAB
Maurinko [17]

Answer:

ICANN

Explanation:

It handles the installation and processing of various databases related to network domains and provides a consistent and secure networking service and there are incorrect options are described as follows:

  • IAB, which provides a protocol for managing IETF, is therefore incorrect.
  • W3C is used in web development.
  • ISOC is used to provide Internet access.
7 0
3 years ago
Other questions:
  • Which function can you use to abbreviate the lengthy expression, A1+A2+A3+A3...+A19+A20?  MAX COUNT SUM ROUND
    10·2 answers
  • What is the pen tools use in Photoshop?
    6·2 answers
  • True or false: a cover letter accompanies a resume to showcase a job-seeker’s personal life
    6·2 answers
  • What type of social engineering attack uses email to direct you to their their website where they claim you need to update/valid
    6·2 answers
  • On laptops with a smart card reader installed, where is the smart card reader usually located?
    13·1 answer
  • For every $1 of deposits, the banks can increase ________________ by the value of the Money Multiplier.
    15·1 answer
  • After reading the article, "The Impact of Technology", answer the following question.
    7·1 answer
  • Can someone start me off with a short 2 or 3 paragraphs about the pros and cons of Microsoft Word, and if you can recommend a si
    12·1 answer
  • Different between desktop application and web application ?​
    9·1 answer
  • Unconformities develop when new sedimentary layers accumulate atop old, eroded layers, resulting in a geologic hiatus. Which of
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!