1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anit [1.1K]
3 years ago
13

Crossing out answers that could not possibly be correct is called ‘eliminating answers.’ Please select the best answer from the

choices provided T F
Computers and Technology
2 answers:
lora16 [44]3 years ago
8 0

Answer:

TRUE

Explanation:

BaLLatris [955]3 years ago
6 0

The correct answer is True.

Explanation

When we must solve a multiple-choice test or exam, in most cases, we are asked to select only one choice from four or more options. This means we need to know which is the correct answer from the options given to obtain a good grade. Due to this, we must be very precise when responding and paying attention to details because many times the answers are very similar, but only one contains all the elements that answer the question.

One of the most used methods to do this is "eliminating answers" this means we discard answers that we are sure are not possible answers by crossing out these and leaving only the correct answer or a few possible correct answers, in this case, we will need to analyze the remaining answers to select the most appropriate. So, the correct answer is True.

You might be interested in
1
g100num [7]
Have a look at the man page for printf:

man 3 printf
4 0
3 years ago
Read 2 more answers
True or false
Semmy [17]
It’s false I hope this helped you
3 0
3 years ago
The core of ___________ is the implementation of intrusion detection systems and intrusion prevention systems at entry points to
cestrela7 [59]

Answer:

sorry I can't understand what is this is

3 0
3 years ago
Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and
makkiz [27]

Answer:

Social Engineering Attack

Explanation:

The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.

read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Lmk if this helps! :)

7 0
3 years ago
The best technique to read​
Readme [11.4K]

Answer:

The best reading techniques are the SQ3R technique, skimming, scanning, active reading, detailed reading, and structure-proposition-evaluation.

Explanation:

6 0
3 years ago
Other questions:
  • Which statement about trees is false?
    12·1 answer
  • Which shortcut key aligns text to the center of the paige
    5·1 answer
  • What department is cyber security
    6·2 answers
  • Jason works for a restaurant that serves only organic, local produce. What
    15·2 answers
  • A company is acquiring a smaller firm and is setting up a new IT system in order to consolidate the data and assets of the acqui
    11·1 answer
  • Can someone pls do a toradora,Mha or princess jellyfish rp I'm open for anyother rp's
    11·2 answers
  • True or False: At the Company level, users will only have access to view projects to which they have been specifically granted a
    5·2 answers
  • You are the Emergency Management Director of a small island nation. Your nation has come under Cyber-attack and the attackers ha
    7·1 answer
  • Which type of network allows backups and network security to be centrally located?
    11·1 answer
  • ____ storage is not recommended for long-term archiving because the storage media can degrade over time
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!