1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anit [1.1K]
4 years ago
13

Crossing out answers that could not possibly be correct is called ‘eliminating answers.’ Please select the best answer from the

choices provided T F
Computers and Technology
2 answers:
lora16 [44]4 years ago
8 0

Answer:

TRUE

Explanation:

BaLLatris [955]4 years ago
6 0

The correct answer is True.

Explanation

When we must solve a multiple-choice test or exam, in most cases, we are asked to select only one choice from four or more options. This means we need to know which is the correct answer from the options given to obtain a good grade. Due to this, we must be very precise when responding and paying attention to details because many times the answers are very similar, but only one contains all the elements that answer the question.

One of the most used methods to do this is "eliminating answers" this means we discard answers that we are sure are not possible answers by crossing out these and leaving only the correct answer or a few possible correct answers, in this case, we will need to analyze the remaining answers to select the most appropriate. So, the correct answer is True.

You might be interested in
Please describe the role of games in modern society!
ohaa [14]
It is to Entertainment.
5 0
3 years ago
Read 2 more answers
How would a programming language that allows programs to run on any operating system be classified?
Illusion [34]
Cross-platform.





--------------------
3 0
3 years ago
Which of the following best describes the purpose of child labor laws?
BabaBlast [244]

Answer:

Are there supposed to be answer choices with this question?

Child labor laws are basically laws placing restrictions and regulations on the work of minors.

6 0
3 years ago
Read 2 more answers
A network needs to be set up with 60 subnets. Given the IPv4 class C address 192.168.100.0, what subnet mask value should be use
d1i1m1o1n [39]
We are asked for the subnet mask and the total usable host. There are given values such as a network needs to be set up with 60 subnets given that the IPv4 class C address 192.168.100.0. The subnet mask is "255.255.255.0". The total host is "254".
6 0
4 years ago
If you need to provide a storage server with fault tolerance through the use of multiple paths between the server and the actual
yan [13]

Answer:

The correct answer to the following question will be "Multipath I/O ".

Explanation:

Multipath I/O going to minimize the impact of a failure of either the host network interface by offering an alternative access route through storage media as well as a Windows OS.

  • It offers the possibility for someone like you to support high accessibility and significantly improve efficiency based on your SAN setup.
  • Offer valuable even fault resistance to a terminal server by using different objectives or paths.

So, you should install this Multipath I/O.

3 0
3 years ago
Other questions:
  • Which of the following is important to do when downloading a game to your
    8·1 answer
  • "Consideration of being digitally" literate Means to produce digital technology Participate in digital activities none of the ch
    11·1 answer
  • How many categories of bitmap images are there?
    8·1 answer
  • If the computer has an encrypted drive, a ____ acquisition is done if the password or passphrase is available. a. passive b. sta
    8·1 answer
  • PLEASE HELP I WILL GIVE YOU BRAINLILY
    15·2 answers
  • Suppose an IP packet is fragmented into 10 fragments, each with a 1% (independent) probability of loss. To a reasonable approxim
    15·1 answer
  • Question # 5
    6·1 answer
  • How does applying Fontworks effects to text on an advertising flyer change the text?
    14·2 answers
  • The scope of a temporary table is limited to what?
    10·1 answer
  • Someone put malware on your computer that records all of your keystrokes. what aspect of security was primarily attacked? choose
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!