1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
15

An overall indication of the dependability of data may be obtained by examining the ________, credibility, reputation, and _____

___ of the source.
Computers and Technology
2 answers:
dexar [7]3 years ago
8 0

Answer:

Expertise, trustworthiness

Explanation:

Data is a vital tool in today's businesses, production, education, health care etc. As information technology evolves, data sources constantly increases, including genuine data sources and untrusted data source.

Original data sources promotes the dependability of data by proving it's expertise, credibility, reputation and trustworthiness. Sources that acquire this data give out incomplete or trusted data.

Vanyuwa [196]3 years ago
4 0

Answer: expertise, trustworthiness

Explanation:

An overall indication of the dependability of data may be obtained by examining the expertise, credibility, reputation, and trustworthiness of the source. We can obtain this information by checking with others who have used the information provided by the source.

You might be interested in
The roll out, roll in variant of swapping is used ____."
Sindrei [870]

Answer:

C.) for priority-based scheduling algorithms

Explanation:

for priority-based scheduling algorithms

4 0
3 years ago
HELLO answer this. Sidney needs to create a decimal number variable that will be added to another number. What kind of variable
kipiarov [429]

Answer:

Option D. float is the correct answer.

Explanation:

Decimal number contains decimal point. Out of all the given data types, float data type store the number with decimal point.

As the number has to be further used for calculations float ahs to be used. Because the numbers can also be stored in string but cannot be used for further calculations.

Hence,

Option D. float is the correct answer.

8 0
3 years ago
Read 2 more answers
Consider the following declaration: (1, 2) double currentBalance[91]; In this declaration, identify the following: a. The array
Rom4ik [11]

Answer:

Following are the solution to the given choices:

Explanation:

Given:

double currentBalance[91];//defining a double array  

In point a:  

The name of the array is= currentBalance.  

In point b:  

91 double values could be saved in the array. It requires 8bytes to hold a double that if the array size is 91*8 = 728

In point c:  

Each element's data type is double.

In point d:  

The array index range of values is between 0 and 90 (every array index starts from 0 and ends in N-1, here N=91).  

In point e:  

To access first element use currentBalance[0], for middle currentBalance[91/2] , for last currentBalance[90]

3 0
2 years ago
Scenario: 1. Victim opens the attacker's web site. 2. Attacker sets up a web site which contains interesting and attractive cont
Ann [662]

Answer :

These sort of attacks are known are Injected IFrame Attacks. The Injected IFrame Attacks are a common Cross Site Scripting or XCC attack that contains multiple or single iFrame tags implemented within a page which is not visible to user. User unintentionally enters his information which is posted to hacker’s server and information’s gets hacked.

5 0
3 years ago
If a thread is not finished running, perhaps because it had to wait or it was preempted, it is typically restarted on the same p
andrew11 [14]
<span>If a thread is not finished running, perhaps because it had to wait or it was preempted, it is typically restarted on the same processor that previously ran it.  This is this known as </span>processor affinity. 
4 0
3 years ago
Other questions:
  • Which of the following is a collection of honeypots used to present an attacker aneven more realistic attack environment?a. Padd
    6·1 answer
  • Lures, reels, rods, hooks, baits and nets are common equipment used in what food gathering method?
    15·2 answers
  • Wide area networks are defined by their ability to
    14·2 answers
  • What type of font color should Kim select if she chooses a dark-colored design theme for her presentation?
    14·2 answers
  • This program will store roster and rating information for a soccer team. Coaches rate players during tryouts to ensure a balance
    7·1 answer
  • Using PowerPoint or Impressed guarantees that your presentation will do which of the following?
    6·1 answer
  • Which of the following statement about CAD is NOT true A. It increase the productivity of designers B. It uses computer graphics
    8·1 answer
  • Consider the following code segments that are potential replacements for /* missing code */.
    6·1 answer
  • .....is used to save project in Visual basic .net from file menu
    6·1 answer
  • Your agile team only has one database developer. So the other developers finish their tasks and then wait for their work to be I
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!