1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
topjm [15]
3 years ago
15

Which of the following is a step in paraphrasing? Skim the original information to get a sense of what it is about. Select a few

key words to change to your own words. Reorder the sentences to the order you think makes more sense. Identify the main points of what you have read.
Computers and Technology
2 answers:
Sedaia [141]3 years ago
4 0
Select a few key words to change to your own words
timofeeve [1]3 years ago
4 0
Select a few words to change to your own words. The rule of thumb is that you cannot use more than 3 consecutive words from your research. If you do, it's considered plagiarism. Consider using a thesaurus to replace and assist with your paraphrased version.
You might be interested in
Please answer fast as soon as possible.
zhenek [66]

Answer:

1. Scripts area is the main working area in Scratch.

2. Sensing blocks are color-coded light blue.

3. Adware is a malware which pops up a window, informing the user that the system is infected and asks for a fee to clean it.

4. Amaya is a WYSIWYG.

8 0
2 years ago
Can anybody answer this please hurry
Ludmilka [50]

Answer:

Ada Lovelace

The first one!

Hope this helps!

5 0
3 years ago
Read 2 more answers
If a database is not maintained or if incorrect data is entered into the database, serious problems can occur. What problems cou
Archy [21]

Database is maintained by keeping only relevant data and updating existing data in a timely manner.

This is achieved by issuing proper insert, update and delete operations.

Incorrect data leads to incomplete information. Databases which hold transaction details, any inaccuracies lead to misinformation to its users.

Both the above lead to serious issues in data maintenance and prove the database ineffective. This indicates manhandling of the database.

No maintenance

Database is maintained when only relevant information is present. Irrelevant information includes information like information of past students, old information of current students, etc.

For students who have completed their courses and left, the database should be updated by removing data of such students.

Also, for newly enrolled students, their enrolment should reflect in the official records.

In case of changes in any of the student information, timely update operations should be performed to keep only current data in the database.

All these operations should be done timely in order to avoid any discrepancies in the real data and updated data in the system.

Incorrect data

In situations where incorrect data is input in the student database, incorrect data will be recorded for that particular student. Incorrect data can be related to ssn, name, address, course details and fees payment.

In case of incorrect transaction details like fees payment, this incorrect data will reflect in the student record as well as will affect the overall earnings of the school.

For enrolled students, correct enrollment details regarding the course and classroom should be recorded. Any error in this data will cause the student inconvenience and the respective student will be at loss.

Also, taking advantage of this situation, any outsider acting as an enrolled student, can gain access to the school.

This leads to mismatch of information and can lead to fraud situations against the educational institute.

3 0
3 years ago
What are the different methods of enhancing/decorating<br> bamboo product​
Zepler [3.9K]

Explanation:

Methods of this technique include glueing, chemical gilding, and electroplating.  Staining is used to color wood to give an illusion of texture. This may come in two varieties.

7 0
3 years ago
The         provides access to the Internet; may also be internal
grin007 [14]
The TCP/IP protocol provides access to internally and externally I.e. The internet.
3 0
3 years ago
Other questions:
  • 4.17 LAB: Varied amount of input data ( C++)
    5·1 answer
  • ASAP FAST PLSKara is currently creating a storyboard for her web site. Which step of the web design process is she in? Coding Pl
    9·2 answers
  • Given n ropes of different lengths, we need to connect these ropes into one rope. We can connect only 2 ropes at a time. The cos
    9·1 answer
  • What is ambiguous grammar, explain in maximum 50words.
    5·1 answer
  • In relation to data science,advances in technology has made it more feasible to do what
    5·1 answer
  • What do application in productivity suites have in common
    5·1 answer
  • Write the function powersOf3ToN(n) that takes a possibly-negative float or int n, and returns a list of the positive powers of 3
    10·1 answer
  • I need help with my homework
    7·1 answer
  • __________ are very simple devices that connect network components, sending a packet of data to all other connected devices.
    6·1 answer
  • Which of the following was the first computer-animated film to win animated film to win an academy award?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!