1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren2701 [21]
3 years ago
9

Which sources could provide reliable evidence for your claim? Check all that apply. a step-by-step guide listed at www.gettingto

college.com an article from the New York Times a book by an educational researcher and professor a report from the US Department of Education at www.ed.gov a blog post written by a college admissions director a high school student’s research report
Computers and Technology
2 answers:
kozerog [31]3 years ago
7 0
The correct answer is:
<span>an article from the New York Times</span>a book by an educational researcher and  professor<span>a report from the US Department of Education at www.ed.gov</span>
tigry1 [53]3 years ago
7 0

<em>Reliable</em>, in the context of evidence, usually implies the fact that a source can be trusted to support the idea or argument that an author is trying to make.

Not all information available online or offline are reliable, and from the options provided, sources that generally can be used as reliable evidence would be:  an article from the New York Times, a book by an educational researcher and professor, and a report from the US Department of Education.

You might be interested in
A sales transaction was coded with an invalid customer account code (XXX-XX-XXX rather than XXX-XXX-XXX). The error was not dete
GenaCL600 [577]

Answer:

a simple IF statement using Regex

Explanation:

In any coding language, a good control procedure for this would be a simple IF statement using Regex. In the IF statement you can grab the account code and compare it to a regular expression that represents the correct format. IF the account code is in the correct format (matches the regular expression), then you go ahead and save the account code for use. Otherwise, you would output an error and ask for another account code. This will prevent the program from trying to use an account code that is not valid.

5 0
3 years ago
Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected
kakasveta [241]

Answer:

It is called a WPS brutal force attack.

Explanation:

Wired and wireless networks are both susceptible to attacks. The wired network, the advantage as a cable connection, is more secure than wireless networks, but wireless network also have security measures like the wifi protected set up (WPS).

WPS is used to connect to a network without passphrase, but with a key combination or a PIN.

Brutal force attacks are used on WPS to forcefully generate the PIN, using a third party software.

3 0
2 years ago
Suzanne is following a fad diet. She has started to experience low energy during her workouts, and on a recent trip to the docto
Nastasia [14]

Answer:

Hi mate....

Explanation:

This is ur answer....

<em>-</em><em>-</em><em>></em><em> </em><em>Suzanne just facing low carbohydrates</em>....

hope it helps you,

mark me as the brainliest pls....

Follow me!

5 0
2 years ago
Read 2 more answers
Explain how data structures and algorithms are useful to the use of computer in data management<br>​
laiz [17]

Answer:

programmers who are competent  in data  structures and algorithms  can easily perform the tasks related  to data processing ,automated reasoning ,or calculations . data structure and algorithms  is significant  for developers  as it shows their problems solving abilities amongst the prospective employers .

5 0
2 years ago
Every computer consists of physical components and nonphysical components. the nonphysical components of a computer that underst
IrinaVladis [17]
Physical component means Computer Hardware which you can touch and non Physical component means Software, which you can not touch. nonphysical component designed specially for physically component. like Microsoft company designed Software according the Hardware for example Microsoft windows 64 bit could not install on which 32 bit Architecture Hardware.
7 0
3 years ago
Other questions:
  • The term ________ refers to the use of a single unifying device that handles media, internet, entertainment, and telephone needs
    13·1 answer
  • It is essential that a security professional is able to resolve and respond to cyber law inquiries and incidents while avoiding
    14·1 answer
  • You can write as many constructors for a class as you want, as long as they all have different ____ lists.
    8·1 answer
  • You can access a button s screentip by _____.
    6·1 answer
  • True or false that computers that are joined together are able to share hardware and software, but not data
    11·1 answer
  • How do you change colors for presentation to blue warm in power point?
    11·1 answer
  • When was the Ethics Resource Center (ERC) established? In the 1970s In the 1980s In the 1990s In the 2000s
    14·1 answer
  • Pleasee help. How do you fix this problem in discord?
    10·1 answer
  • With a heat exchanger, the temperature of the process fluid can be measured with a temperature-
    14·1 answer
  • Is a free verse a poetry that has no images
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!