1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allisa [31]
4 years ago
15

All information is clearly identified and easy to find within the source

Computers and Technology
1 answer:
faust18 [17]4 years ago
6 0

Answer:

reliable or credible

A document if it is clearly identified as well as it is quite easy to find it with the source, is said to be credible and reliable. If you want to find more then you can study the library Science and information science.

Its an important part of Library Science, as well as information science.

Explanation:

A document can be reliable only if it provides the correct answer, and can be found easily. If this is not the case then that document cannot be considered as being reliable or credible. This is the first thing which should be kept in mind while collecting the documents.

You might be interested in
Supermarket managers who use scanners on the checkout counters to track inventory levels of their products are using a(n) ______
lidiya [134]
Operation Information System, because you are only collecting data on the amount of products leaving the store.
6 0
4 years ago
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
Some 3d printers work by controlling the exact locations where a liquid
kow [346]
Were a liquid what? id doesn't make any sense.
6 0
4 years ago
If the number 30 is in a cell, what number will be displayed after you format the cell in percent format? 30% 3000% 300% .003%
stellarik [79]
30% i believe im not sure im trying to complete a challenge honestly lol

5 0
3 years ago
Which data type is 2.5?<br> single<br> int<br> float<br> string
Ivenika [448]

2.5 is an example of a float.

Floats are numbers that have decimals.

5 0
3 years ago
Other questions:
  • Technician A says that the octane rating of gasoline is the measure of its antiknock properties. Technician B says that normal c
    5·1 answer
  • Why people needs soft skills in the era of high technology.
    13·1 answer
  • What is the name of the subsystem that transfers data between components inside a pc or between pcs?
    12·1 answer
  • What device connects your computer to a wireless network?
    11·2 answers
  • which of the following is the full path and filename of the file that contains information about which interrupt request (IRQ) c
    10·1 answer
  • Help me, please! No links btw :)
    9·2 answers
  • Creative Commons material often costs money to use.<br><br> True<br> False
    9·2 answers
  • Martin is responsible for translating the script into a visual form by creating a storyboard. Which role is he playing?
    8·1 answer
  • Why is biodiversity so important to ecosystems?
    6·1 answer
  • What type of security solution provides a hardware platform for the storage and management of encryption keys?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!