1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pychu [463]
3 years ago
8

Describe in detail how to determine if a source is credible when conducting research. Justify your response using two or more co

mplete sentences.
Computers and Technology
1 answer:
tangare [24]3 years ago
8 0
There are many ways  to determine if the information is credible or not. One way is to ask yourself "Did the person or website list cites?"  Cites are good ways to determine if the information is credible or not or not.  Cites mean that you can prove where the information they are presenting came from.
You might be interested in
How do you describe Microsoft excel?
-Dominant- [34]

Answer:

Explanation: Microsoft Excel is a spreadsheet program included in the Microsoft Office suite of applications.  Spreadsheets present tables of values arranged in rows and columns that can be manipulated mathematically using both basic and complex arithmetic operations and functions.

6 0
3 years ago
It is necessary for us to verify and checked information before we shared online? Explain​
lesya [120]

Answer:

The answer is yes.

Explanation:

If you don’t check where the source is from and if it is verified, you may share an incorrect and false answer. Also, you may type in your personal information. This is <u>VERY</u> risky. Do <u>NOT</u> share your private information to strangers!

You can check your information by searching it up online or asking a teacher! There! I hope this helps! ;)

4 0
2 years ago
Which window allows you to view and change your computer's system information and settings?
ZanzabumX [31]
I think Its control panel
4 0
4 years ago
Read 2 more answers
Which of these YA (young adult movies is not base on a book is it A wrinkle in time, or Midnight sun,or Love,simon.
ExtremeBDS [4]
I think it’s midnight sun
4 0
4 years ago
Many websites provide open-source data about science, technology, engineering, and math. Which of these sites provide open-sourc
N76 [4]

Relational database transactions are defined by four key characteristics, commonly referred to as ACID: atomicity, consistency, isolation, and durability.

The four essential characteristics of a transaction—atomicity, consistency, isolation, and durability—are referred to by the acronym ACID in the context of transaction processing. Data updates are handled as though they were one single action. Domain integrity ensures that information is added to the table only under certain circumstances, such as the file type or range of values. Any row that has been re-linked to a different table is protected from deletion by referential integrity. When a transaction has been committed, it is guaranteed by the property of durability that it will remain in the system even in the event of subsequent failures. Durability enforces completed transactions.

Learn more about transaction here-

brainly.com/question/15122599

#SPJ4

7 0
1 year ago
Other questions:
  • A technician wants to create a new partition on a new additional hard drive. what tool should be used?
    15·1 answer
  • Microsoft windows server and linux are examples? of:
    12·1 answer
  • Neighbor discovery performs many of the functions that icmp router discovery and icmp ____ handled in ipv4.
    13·1 answer
  • What is a sluggish beta signal detection theory?
    15·1 answer
  • 14. Which of the following statements is true? A. The most secure email message authenticity and confidentiality isprovided by s
    11·1 answer
  • E-What is the important of Recycle bin?<br>Ans:​
    12·1 answer
  • 6.5 Code Practice
    5·1 answer
  • Sự ra đời của thương mại điện tử có tác động như thế nào đến việc quảng cáo và Marketing sản phẩm
    11·2 answers
  • Which action does not happen in each iteration of the repeat loop in the
    9·1 answer
  • Which two cisco products are equipped with the integrated connector to the cisco cws service? (choose two. )
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!