1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pychu [463]
3 years ago
8

Describe in detail how to determine if a source is credible when conducting research. Justify your response using two or more co

mplete sentences.
Computers and Technology
1 answer:
tangare [24]3 years ago
8 0
There are many ways  to determine if the information is credible or not. One way is to ask yourself "Did the person or website list cites?"  Cites are good ways to determine if the information is credible or not or not.  Cites mean that you can prove where the information they are presenting came from.
You might be interested in
Which wireless standard has bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz?
Tamiku [17]

Answer:

802.11a

Explanation:

802.11a supports bandwidth of 54 Mbps in a regulated frequency spectrum of 5 GHz. 802.11a also referred to as Wi-fi 2. 802.11a is basically costs higher than 802.11b though both were created at the same time. Hence 802.11b is more popular than 802.11a . All of them are developed by IEEE.

4 0
3 years ago
In a stack data structure, the following items are inserted in the following order: Bob, Alice, Charlie, Eve, Zebra. Then an ite
const2013 [10]

Answer:

Zebra.

Explanation:

Stack is LIFO, so Zebra is added in the last so it will be removed first.

6 0
3 years ago
Suppose an 80286 microprocessor is in protected mode. How it is switched back
iris [78.8K]

Answer:

  hardware-initiated reset

Explanation:

Once in protected mode, the 80286 is designed to remain there until it is reset by hardware.

__

External hardware can be designed so that software can cause such a reset. In the 1984 PC/AT, such hardware combined with code in the BIOS allowed real mode re-entry and returned execution control to the program that caused the reset.

5 0
3 years ago
Match the word to its definition:
yuradex [85]

Answer :

All these are a type of computers and is used for processing data.

Explanation:

a. A small portable computer, such as a netbook -- 3. Tablet

b. A type of computer used by many people at the same time to allow access to the same secure data -- 4. Mainframes

c. A device that includes, text, and data capabilities -- 1. Smart phone

d. An individual’s personal computer that resides on a desk or table -- 6. Desktop

e. A computer that combines the features of a graphic tablet with the functions of a personal computer; sometimes called a tablet PC -- 5. Notebook

f. A large and powerful scientific computer that can process large amounts of data quickly -- 2. Super computer  

g. The coded instructions that tell a computer what to do; also to write the code for a program -- 7. Program

h. Is a machine that changes information from one form into another by performing four basic actions -- 8. Computer

3 0
3 years ago
In Word, when you conduct a merge a customized letter, envelope, label is created for each record in the data source. True or Fa
Goshia [24]
I cant be taking these pills when im in thethey say i be cappin a lot
3 0
3 years ago
Other questions:
  • 1. Which of the following are considered CAD powerhouses?
    6·1 answer
  • Amy has decided to use a dark background and light colored text for her prensentation. Which toolbar option will let her change
    5·1 answer
  • What is required when opening a checking account?
    14·2 answers
  • WILL UPVOTE ALL plz
    13·1 answer
  • 6. Why did he choose to install the window not totally plumb?
    13·1 answer
  • Manuel is working on a project in Visual Studio. He wants to keep this program showing on the entire desktop, but he also needs
    13·1 answer
  • 1. which of the following tools can be used to mesure mass. (answer = 5 +??? points)
    7·2 answers
  • Your sister asks you if it is possible to get an office productivity suite for free. What do you tell her?
    13·1 answer
  • Introduction to computing systems: from bits and gates to c and beyond
    7·1 answer
  • Tyra used the software development life cycle to create a new game. After debugging and documenting code, she released it to her
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!