1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
2 years ago
6

What do secondary sources rely on for their analysis of events?

Computers and Technology
2 answers:
MariettaO [177]2 years ago
7 0

Secondary sources are defined as <u>a form of document that includes information from another source to analyze an issue. </u>

When a researcher or writer wishes to cite a secondary source, it means they are using information from a primary source that is presented in another document which has cited it, <em>instead</em> of directly referring to the primary source.

Thus, it can be said that the best answer for the question above is (D) primary sources only, since secondary sources use this when analyzing the problem presented in their document.

sveta [45]2 years ago
5 0

it is d- primary sources only

You might be interested in
How to reload ingenuity when a pulsating blue thing is there
Hatshy [7]
Todo is very important
4 0
3 years ago
What is the LER for a rectangular wing with a span of 0.225m and a chord of 0.045m
ch4aika [34]

Calculate LER for a rectangular wing with a span of 0.225m and a chord of 0.045m. The weight of the glider is 0.0500 Newtons. (Note: the wing span is the width of the wing and is measured from wing tip to wing tip, or perpendicular to the fuselage. The wing chord is the length of the wing measured parallel or along the length of the fuselage.)

Answer:

Area of rectangular wing = span × chord = 0.225×0.045= 0.010125m2

LER = Area/weight = 0.010125/0.0500 = 0.2025

4 0
2 years ago
Your company has merged with another company that also uses Windows Server 2016 and Active Directory. You want to give the other
LiRa [457]

Answer:Creation of two-way forest trust

Explanation: In active directory, Two way forest trusty is the two way trusting condition where one forest trust the other forest and it works same for both forest.The forest domain of one forest is reliable and have trusty relationship with the other forest and vice-versa.

This function of the forest helps all the users to reliably access all the components of both the domains.Thus two-way forest trust should be created between the two organization mentioned in the question.

5 0
3 years ago
PHP Create a for loop that initialize with the variable $i = 10 The loop outputs $i as long as $i is greater than 1 using for lo
Tanzania [10]

Answer:

The PHP code is as follows

<?php

for ($i = 10; $i>1; $i--)

{

echo $i.' ';

}

?>

Explanation:

The code is self explanatory and doesn't require comments before it can easily understood.

The program starts with a php opening tag <?php

And it ends with the closing tag ?>

The interpretation of the question is to print integer values from 10 to 1

To do this, an iteration is needed.

The above program makes use of a for loop iteration.

Analysis;

for ( -> This shows that it is a for loop iteration

$i = 10; -> Iterating variable $i is initialized to 10 (that is; printing will start at 10)

$i>1; -> Iteration is valid while $i is greater than 1 (e.g. 2,3,4...10)

$i-- -> For every Iteration, decrease $i by 1

) -> End of Iterating condition

echo $i.' '; -> This line prints the valid values of $i. In this case, the values of $i is from 10 and stops at 2

The output is as follows

10 9 8 7 6 5 4 3 2

4 0
3 years ago
1.How can we be a responsible online user???​
PSYCHO15rus [73]

Answer:

Be respectful – and expect respect.

Protect your reputation.

Protect your privacy.

Watch your tone.

Be sceptical.

3 0
2 years ago
Read 2 more answers
Other questions:
  • convert the following c code to mips. assume the address of base array is associated with $s0, n is associated with $s1, positio
    14·1 answer
  • .Although SQL is a language, you don’t use it to write applications? (true, false)
    8·1 answer
  • You’re responding to a troubleshooting ticket about a laser printer in HR that isn’t working. According to reports, the printer
    7·1 answer
  • Which of the following could be defined as a general-purpose computing device that enables workers to create, manage, store, sea
    12·1 answer
  • Which statement is false? Classes are reusable software components. A class is to an object as a blueprint is to a house. Perfor
    6·1 answer
  • PLZ HELP! ANSWER (WITH CORRECT ANSWER AND EXPLANATION THAT ACTUALLY IS CORRECT) GETS BRAINLIEST!
    13·1 answer
  • Think about the five steps to writing an algorithm. Why is each step necessary?
    6·2 answers
  • ____ is a technology that exists inside another device
    9·2 answers
  • 1. Write a statement that opens the file Customers.dat as a random access file for both reading and writing.
    9·1 answer
  • Selah infects the ads on a website that users from her target company frequently visit with malware as part of her penetration t
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!