1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dennis_Churaev [7]
3 years ago
7

If you interview a dentist to learn about her experiences on the job, she is considered a secondary source of information. Pleas

e select the best answer from the choices provided T F
Computers and Technology
2 answers:
boyakko [2]3 years ago
7 0

Answer:

False

Explanation:

Just took the test

Alik [6]3 years ago
6 0

A source can be either primary or secondary. The statement that if you interview a dentist to learn about her experiences on the job, she is considered a secondary source of information is false. A primary source provides direct or firsthand  experience, while a secondary source of information describes or analyzes the primary source. In this case, when the dentist is interviewed she is considered as primary source because she is speaking about herself and her experience.


You might be interested in
Curved lines are generally used where blank is needed ( 1 point)
Andrews [41]
Form or volume probably. sorry, this question needs more info
7 0
3 years ago
Digital transmissions are superior to analog transmissions because of their __________.
makkiz [27]

Answer: B reliability

Explanation: i took the test

hope it helps :)

3 0
2 years ago
Describe the attacks in wireless networks that are more serious com pared to wired network
Julli [10]

Answer:

Both types of attacks can be devastating.

Explanation:

Attacks Wireless Networks are sometimes considered more serious because they can be attacked from remote locations. One of the more serious attacks would be against commercial airplanes. A wireless hack and system shutdown of a commercial aircraft can be catastrophic, and can all be done wireless. While a Wired Network attack can cause catastrophic events they need to be attacked from within the location of the network which is usually guarded by security personnel as well as system firewalls.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
Holly needs to create an online survey to find out what people want and is
Dahasolnce [82]

Answer:

The correct answer is (A).The server application will allow the customers to select their  answers on the survey.

Explanation:

Since Holly needs to design an online survey which is a web based application, in finding out what people need or want, In this process, the role or function of the server is to enable customers to select their own choice of answers on the survey that will be created online.

4 0
3 years ago
when happens when the quantity of a good supplied at a given price is greater than the quantity demanded
Norma-Jean [14]

If there is a bigger supply than demand, it is called a surplus.

8 0
3 years ago
Read 2 more answers
Other questions:
  • When sociologists say that it is difficult to predict all the results of social change, what are they referring to?
    5·1 answer
  • ____ indicates the number of pixels that a computer uses to display the letters, numbers, graphics, and background on a screen.
    12·2 answers
  • True or False: clicking ads and pop-ups like the one below could expose your computer to malware.
    11·2 answers
  • What are personal skills? A manner of individual style How a person manages and expresses oneself One's ability to excel at spor
    13·2 answers
  • Which ipv6 prefix will the typical enterprise network receive from the service provider?
    12·1 answer
  • Angelina wants to modify the footer in her report so the page numbers are correct. To do this, she first double-clicks the foote
    14·1 answer
  • The ____ method returns an integer that represents the location of the substring within the string.
    13·1 answer
  • What country is associated with the tor relay using the ip address 104. 244. 74. 97?.
    6·1 answer
  • Develop a program to sort a file consisting of bonks details in the alphabetical order of author names. The details of books inc
    5·1 answer
  • A class member function that automatically initializes the data members of a class is called?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!