1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
3 years ago
6

What do secondary sources rely on for their analysis of events?

Computers and Technology
2 answers:
MariettaO [177]3 years ago
7 0

Secondary sources are defined as <u>a form of document that includes information from another source to analyze an issue. </u>

When a researcher or writer wishes to cite a secondary source, it means they are using information from a primary source that is presented in another document which has cited it, <em>instead</em> of directly referring to the primary source.

Thus, it can be said that the best answer for the question above is (D) primary sources only, since secondary sources use this when analyzing the problem presented in their document.

sveta [45]3 years ago
5 0

it is d- primary sources only

You might be interested in
What form of note taking would be MOST beneficial for a visual learner who needs to see the connections between ideas?
Svetlanka [38]

Answer:

Think link

Explanation:

8 0
3 years ago
General Hardware Products Your boss, the IT director, wants you to explain FDDs, BPM, DFDs, and UML to a group of company manage
Bas_tet [7]

Answer:

1. FDD is a process and Analysts can use a FDD to create and use business functions and processes. It Requirements models are used when gathering requirements for a new system.

2. BPM is used on an ongoing basis for business process improvement. It is meant to improve order, insight and efficiency of the collective workflows that make up any given business process. BPM is meant to reduce any chaos within those collective workflows that make up a process and eliminate ad hoc workflow management. BPM means Business Process Management.

3. DFDs stands for Data Flow Diagram which will help software developers and designers to understand how they can take their next step to fit into the overall business process. DFDs paly key role for a successful requirements modeling.

4. UML can be used for modeling a system independent of a platform language. UML is a graphical language for visualizing, specifying, constructing, and documenting information about software-intensive systems. UML gives a standard way to write a system model, covering conceptual ideas.

Explanation:

Functional decomposition diagram (FDD) is used to identify functions and define their structure. It is a technique to decompose the complex problem into manageable pieces or individual elements to develop the application or product.

DFDs: It contains a process (shape) that represents the system to model, in this case, the "Food Ordering System". It also shows the participants who will interact with the system, called the external entities. In this example, Supplier, Kitchen, Manager and Customer are the entities who will interact with the system.

Unified Modeling Language (UML): Edraw UML Diagram is the application of choice for many software engineers and designers. The software is fully compatible with 64 and 32-bit Windows platforms from Windows XP to Windows 10.

3 0
3 years ago
What statement should you use to print the value of total with a precision of 5 digits?
Norma-Jean [14]

Answer:

Option A: print("The total is %0.5f" % total)

Explanation:

To ensure the value is rounded to a precision of 5 digits, we have to create a formatted string which is %0.5f. The <em>.5</em> denotes five decimal places and <em>f </em>refers to float data type.

Next, we use the <em>%</em> operator again and followed with the variable <em>total</em>. The % is used as a string modulo operator that will interpolate the value held by the the variable <em>total </em>in the formatted string that we create previously. The interpolated value will be rounded to 5 decimal places. For example, if

total = 256.786789

The output will be 256.78679

5 0
3 years ago
What legal punishment can people face for plagerism
Maru [420]
They can get a fine.
5 0
3 years ago
2. A data catalog identifies all of the following, except: a. Attribute data type b. Attribute range of values c. Attribute cons
alexandr1967 [171]

Answer:

c. Attribute constraints

Explanation:

A data catalog identifies all of the following, except: "Attribute constraints"

The above statement is TRUE because a Data Catalog, a metadata management service, operates by searching for key data, understand and manage data for usefulness.

Data Catalog checks on the BigQuery datasets, tables, and views and checks both technical and business metadata by identifying the following attributes:

1. Data type

2. Range of values

3. Value for Instructor ID

5 0
3 years ago
Other questions:
  • Which tool encrypts entire drives, rendering them unusable unless one possesses the correct key to unlock the drive?
    8·1 answer
  • Consider the relation Courses(C, T, H, R, S, G), whose attributes can be thought of informally as course (C), teacher (T), hour
    10·1 answer
  • 2a
    8·1 answer
  • What are three ways you cite evedince
    5·2 answers
  • A network router connects multiple computers together and allows them to send messages to each other. If two or more computers s
    7·1 answer
  • Difference between a software package and Integrated software and why users would choose one over the other
    8·1 answer
  • An automatic transmission is a mechanism that _
    7·1 answer
  • Write a C program to input a character, then check if the input
    5·1 answer
  • Help me please with this
    12·1 answer
  • Cybersecurity is defined as the set of techniques to protect the secrecy, integrity, and availability of computer systems and da
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!