1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olin [163]
3 years ago
14

Think back over the information presented in the lesson about how you can skillfully use the Internet when doing research. Selec

t three of the ideas that you think are particularly useful for you and other students to know. In a paragraph of not less than five sentences, explain which ideas you picked and why.
more points!
Computers and Technology
1 answer:
madreJ [45]3 years ago
7 0

Avoid wikipedia, anyone can put answers down on there and make it seem correct but it is not. Do not trust any website research the websites or look at ratings if possible. Use the answers that google provides itself if possible. And research trusted websites.

If this helped please mark me as brainlest.

\left[\begin{array}{ccc}Thanks,\\JustSomeIdiot\end{array}\right]

You might be interested in
This is a random question, it’s not about computers or technology
ivann1987 [24]

Answer:

Explanation:

There’s only an AngelKittenn583

To delete in an account ,you must sign into it with the email and password, go into your setttings, and find the “Delete Account” Button

4 0
3 years ago
The timer is running in the up mode with a period of 800 cycles. Channel 1 engages the output mode (Set/Reset) and sets its regi
Soloha48 [4]

Answer:

Explanation:

Part a)

_______________ ____________ _____________ ___

TAR | /\ \/ /\ \/ /\

|//////////|____________|____________|_____________|__________|

0 600 800 600 800 600

PWM Duty Cycle = 200/800 = 25%

Part b)  

______________ _________________ _________ _________________

TAR | \/ /\ \/ /\ \/

|//////////|_________|_________________|__________| _______________|

0 600 800 600 800 600

PWM Duty Cycle = 600/800 = 75%

7 0
3 years ago
In an attack known as ____, valid protocol packets exploit poorly configured dns servers to inject false information to corrupt
ladessa [460]

This is known as DNS poisoning, so called because it 'poisons' the entries of the DNS with false information.

8 0
3 years ago
Look at (d), is it accurate? ​
Angelina_Jolie [31]

Answer:

ya

Explanation:

8 0
3 years ago
Read 2 more answers
this is a question about this app. Is the plus a scam or something. please tell me the truth. cause ive paid for it and it worke
mylen [45]
I didn’t get the plus and it let me review answers without an ad so idk so like you really don’t need plus I wouldn’t get it
7 0
3 years ago
Read 2 more answers
Other questions:
  • In what ways are Outlook notes useful for personal or professional use? Check all that apply.
    13·2 answers
  • What can you do to make sure you have a healthy credit report
    13·2 answers
  • Rob Janoff believes that technology should not be used too
    11·1 answer
  • ____ are programs that run independently and travel between computers and across networks.
    7·1 answer
  • Dynamically allocatе mеmory for a DNA objеct and storе its addrеss in a variablе namеd dnaPtr
    11·1 answer
  • Show the stack with all activation record instances, including static and dynamic chains, when execution reaches position 1 in t
    6·1 answer
  • the_____ tool is used to change the select text to capital letters or small letters (change case /grow font)​
    11·1 answer
  • Book information (overriding member methods) Given main() and a base Book class, define a derived class called Encyclopedia. Wit
    12·1 answer
  • Explain the following buttons as used in emails:compose,inbox and Draft.<br>​
    10·1 answer
  • A computer memory that acts as the main storage available to user for programs and data
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!