1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
madreJ [45]
4 years ago
12

The risk of carbon monoxide poisoning can be reduced by

Computers and Technology
1 answer:
lisov135 [29]4 years ago
5 0
A machine. I foget the name but there can be a machine, or fresh air, or turning off your car, or opening doors and getting out when there;s a fire or smoke.
You might be interested in
Consider an allocator that uses an implicit free list. The layout of each allocated and free memory block is as follows: 31 210
kakasveta [241]

Answer:

Explanation:

start with what you know

6 0
3 years ago
Why might you receive a tax refund from the irs
Harrizon [31]
Im not quite sure but i got mine back yesterday soooo (pretty good)

8 0
4 years ago
Stephanie is a zoologist who loves the outdoors and often travels the world researching wildlife and serving as a consultant it
Flauer [41]

Answer:

Nature (at all) is the best place for her to work at. Researcher or Environmental activist or Biologist Professor or Zoo care/assistant. All of the mentioned works can be applied to her.

Explanation:

8 0
3 years ago
Read 2 more answers
Srooy but can you guys help me with this​(sorry again miss click
telo118 [61]

what miss click let me know when you got the real one      

5 0
3 years ago
How can you evaluate digital news sources?
Vikki [24]

Answer:

Currency: Is this a recent article? Many articles shared on social media are older articles that may relate to current events. If the article is not recent, the claims may no longer be relevant or have been proven wrong.

Relevance: Is the article relevant? While some articles may appear to be addressing a current topic, you must read past the headline and determine the relevancy of the content for your purposes.

Authority: Who is the author? Has the author written other articles on the same or similar topic? What are the author's credentials? What is the domain of the website? Many websites these days mimic the legitimate source, take the time to look carefully. Is the source a blog or a news source? Is the website satirical or a hoax?

Accuracy: Is this article from an unbiased source? Can the content be verified by multiple sources? If it appears in only one publication with no links to sources, it is very likely to be inaccurate. This is particularly important with images that are shared widely across social media.

Purpose: Does this article provoke an emotional response? The intent of a valid news sources is to inform. While an emotional response to specific information is to be expected, inaccurate news articles are often written for the sole purpose of provoking anger, outrage, fear, happiness, excitement or confirmation of ones' own beliefs.

Explanation:

This is how you evaluate digital news sources

4 0
3 years ago
Other questions:
  • Fibre channel switched networks rely on the concept of a ___________________which is a fundamental concept in how the network wo
    10·1 answer
  • Sam says that when he clicks on his schedule on the Internet, his computer is a receiver, not a sender. Is Sam correct? Why or w
    7·1 answer
  • You have no control over who view your post
    10·1 answer
  • How to write a program that prompts the user to input two POSITIVE numbers — a dividend (numerator) and a divisor (denominator).
    13·1 answer
  • Ruth knows the name of a presentation file and the folder it's in, but there are many files in that folder. How can Ruth quickly
    8·1 answer
  • Some files appear dimmed in one of the default folders on your computer. What would be the best course of action? A. Leave the f
    5·1 answer
  • You work in the educational software industry. Your boss asks you to give a brief lecture to other employees about the digital d
    7·2 answers
  • What do you call when a hacker users multiple guest computers to crack a password?
    11·1 answer
  • TOT al<br>Name TWO examples of these settings and utilities. (2)​
    12·1 answer
  • What type of os must be installed on your machine to allow this type of action by another person?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!