1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Assoli18 [71]
4 years ago
14

Karen has found and removed all Web postings about her ex-boyfriend Bill. She has moved on. She’s now researching information ab

out a project for work. There are a lot of Web sites about it, and she’s trying to determine which ones will give her the best information. What is one way she can evaluate the Web sites she comes across?
Computers and Technology
1 answer:
Naya [18.7K]4 years ago
6 0

<u>Researching information about a project for work:</u>

The internet has a lot of information to offer when it comes to making a project about almost anything. There are a lot of web sites, posts,  articles, research papers, and even presentations about the topics that are most likely to be chosen for projects.

The best way to evaluate web sites about the content they offer is to know whether the site has an authorized or trusted source or  not.

There are platforms over the internet where people end up giving false information in the name of freedom of speech. The information conveyed should be genuine and supported by facts and figures.

You might be interested in
What is the most important reason to create a backup of your files somewhere other than your computer
Marizza181 [45]
The most important reason we should make a backup of our files on a USB or other device is in case our computer suddenly dies. If something in it goes bad and it stops working, you will have then lost everything on your computer. But, if you make a save, you can buy another computer and upload everything onto the new one.
6 0
4 years ago
PLEASE ANSWER CORRECTLY
Bess [88]

Answer:

If you know how many passes you'll be making, a for loop is most suitable.

If you do not know ahead of time, the while loop is better, since the while condition will decide if you're going to make another round.

5 0
3 years ago
1. Software used to search a database using keywords or phrases entered by the user.
vladimir1956 [14]

Answer:

1 C

2 D

3 B

4 A

5 D

6 B (the question should state software that manages ...)

7 D

8 C

9 A

10 B

11 C

12 D

13 B

Explanation:

6 0
3 years ago
. An access specifier is one of three keywords:
Zolol [24]

Answer:

Access specifiers are used to control the visibility of members like classes, variables and methods. There are three access specifiers: public, private and protected. We shall see only about the public and private access specifiers for now. Protected access specifier comes into picture when inheritance is implemented. plz brainly me

Explanation:

8 0
3 years ago
Why do you think viruses are called “viruses”? What do they have in common with the living viruses that cause diseases in humans
Vinvika [58]

Answer:

Computer viruses are referred to living viruses as they both have similar effects.

Explanation:

While living viruses invade cells and cause harmful effects on the body, computer viruses basically do the same thing. Computer viruses are a malicious code that inserts itself into a computer. It's designed to spread to one computer to another, just like a living virus.

Similarities:

  • Spreads from one host to another.
  • They both alter/harm the host.
  • Both can replicate itself.

Differences:

  • A computer virus is manmade, while living viruses aren't.
  • A computer virus needs to be removed manually through an app or software while living viruses are almost curable medicine.
  • A computer virus effects machines and software while living viruses only infect living organisms.
5 0
3 years ago
Read 2 more answers
Other questions:
  • Free points! your welcome
    9·2 answers
  • Does anyone want to play 2k21 or rocket league on xbox my username is Bud zecaog
    13·2 answers
  • What is the difference between requirements and controls in the security process? Give examples of each.
    11·1 answer
  • The ____ object can trigger a selectedindexchanged event when a selection is made
    5·1 answer
  • Express 0.0005 x 10-4 farads as picofarads
    5·2 answers
  • Brainliest for whoever adds me on snap<br> gianavaughn007
    15·2 answers
  • Is there any quantum computer in India?​
    9·1 answer
  • Consider the following code segment, which is intended to create and initialize the two-dimensional (2D) integer array num so th
    15·2 answers
  • Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are
    9·1 answer
  • Match the IP Protections Patent, Copyright and Trademark into the following cases:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!