1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anit [1.1K]
4 years ago
13

Crossing out answers that could not possibly be correct is called ‘eliminating answers.’ Please select the best answer from the

choices provided T F
Computers and Technology
2 answers:
lora16 [44]4 years ago
8 0

Answer:

TRUE

Explanation:

BaLLatris [955]4 years ago
6 0

The correct answer is True.

Explanation

When we must solve a multiple-choice test or exam, in most cases, we are asked to select only one choice from four or more options. This means we need to know which is the correct answer from the options given to obtain a good grade. Due to this, we must be very precise when responding and paying attention to details because many times the answers are very similar, but only one contains all the elements that answer the question.

One of the most used methods to do this is "eliminating answers" this means we discard answers that we are sure are not possible answers by crossing out these and leaving only the correct answer or a few possible correct answers, in this case, we will need to analyze the remaining answers to select the most appropriate. So, the correct answer is True.

You might be interested in
What are the four primary factors described in the text that set the state for Web 2.0 or the social Web that we enjoy today??
antiseptic1488 [7]


The four primary factors that set the stage for web 2.0 of the social web are following:  broad bandwidth, sustainable business models, new web programming technologies and application programming interfaces.
• Broad Bandwidth which technology developments have been taking place at a faster situation and the availability of internet has remarkably increased over the years through the rise of broad band technology. The broadband increase in easy accessibility laid a strong base for social web or web 2.0.

• Sustainable Business Model which E-commerce took its roots and has proven a great success rate.

• New Web Programming Technologies which includes web content, web client, server scripting and network security.

• Application Programming Interface is a system of resources and tools in an operating system which enables the developers to create software applications.
7 0
4 years ago
Website managers use____ every day.
babymother [125]

Answer:

technology

Explanation:

4 0
3 years ago
Read 2 more answers
Name and describe methods of inplementing a new computer system. For each one describe the type of situation where each method m
Sunny_sXe [5.5K]

this is the answer hope it will help you

6 0
3 years ago
Which of the following is a programming language that permits Web site designers to run applications on the user's computer?
muminat

Answer:

c) Java.

Explanation:

Java can be refereed to as a programming language that allows Web site designers and developers to run applications on the user's computer.

Due to the fact that the java platform is a type of platform-independent language. The bytecode that was created with the code as at when compiling it and the language uses a JVM machine that can help in run bytecode on any platform.

6 0
3 years ago
Which of the following are considered in a risk table?
Margarita [4]

Answer:

We need to find that out of these four, which of them have the risk involved. the severity and probability have the risk involved, and hence it is one of the options. The instances are for classes. And all the instances have some kind of outcomes, as they are of one class. And hence, there is no risk involved in this. The variables and assumptions also don't have any risk involved, as as we will be assumed, that will be the value of the variable. However, Biases is a risk, as it is not known how much and when somebody is biased. And hence margin of error and biases are the risk involved certainly. And hence, A and D are the correct options here as they can be considered as the risk table.

Explanation:

Please check the answer section.

Remember, what is not in our hand is a risk.

6 0
4 years ago
Other questions:
  • 38. Which of the following best describes why e-mail spoofing is easily executed? a. SMTP lacks an adequate authentication mecha
    15·1 answer
  • What is a hobbyist for engineering
    7·1 answer
  • Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without understandi
    14·1 answer
  • Which component manages the flow of data between parts of a computer
    14·1 answer
  • Technology not only influences what formats are possible in media, it also defines their contents.
    13·1 answer
  • A(n) ___________ analyzes traffic patterns and compares them to known patterns of malicious behavior.
    8·1 answer
  • Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards
    9·1 answer
  • Write a program that prompts the user to enter a password and displays "valid password"
    11·1 answer
  • He is the person behind the development of electronic mail
    13·1 answer
  • In a DTP project, Fiona is looking for a way to make a page layout attractive to readers. Help Fiona pick the correct word to co
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!