1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ZanzabumX [31]
3 years ago
9

What types of news can be created? Who could be the sources of "Fake News?"

Computers and Technology
2 answers:
Dmitry_Shevchenko [17]3 years ago
8 0

NEWS are the facts collected from various places extending North, East, West, South. There shouldn’t be any imaginary content in the news. NEWS should depict the actual scene. Fake news are obtained from rivalry or opponents of another publisher, unfit employees, unethical work background.

Any news should be cross verified and then only published. A fake news will damage the name of the organization and also will mislead the readers. People who found the news to be fake will stop buying that particular news paper publisher.

larisa86 [58]3 years ago
5 0

Answer:

Fake news is a type of yellow journalism or propaganda that consists of deliberate disinformation or hoaxes spread via traditional news media or online social media. The false information is often caused by reporters paying sources for stories, an unethical practice called checkbook journalism. Digital news has brought back and increased the usage of fake news, or yellow journalism The news is then often reverberated as misinformation in social media but occasionally finds its way to the mainstream media as well. Fake news is written and published usually with the intent to mislead in order to damage an agency, entity, or person, and/or gain financially or politically, often dishonest, or outright fabricated headlines to increase readership. Clickbait stories and headlines earn advertising revenue from this activity.

You might be interested in
URGENT!!! If Pete selects the green square or little green camera icon on his camera dial, what mode is he selecting?
SOVA2 [1]

B Shutter Priority Mode

7 0
3 years ago
Audrey would like to save her document. She should choose the Save command from the _____. folder menu window directory
Damm [24]

Answer:

File folder

Explanation:

6 0
3 years ago
What is Systems Engineering?
ki77a [65]

Answer:

focuses on how to design, integrate, and manage complex systems over their life cycles

5 0
4 years ago
The technical relationship between inputs and outputs, which is needed to understand the difference between the short run and th
MrRa [10]
<span>The technical relationship between inputs and outputs, which is needed to understand the difference between the short run and the long run, is called a production function.

Hope I helped ;)
</span>
3 0
3 years ago
identify at least three additional ethical responsibilities expected from a computer professional. In brief, explain each respon
kompoz [17]

The ethical responsibilities for computer professionals are:

Respect Confidentiality.

Maintain professional competence.

Respects and protection of personal privacy.

Explanation:

  • Computer professionals are expected to conduct themselves in an ethical manner.
  • Codes of ethics exist in this field to help these professionals make good decisions about the manner of their professional work.
  • A computer professional must strive to provide the highest quality of work possible by acquiring and maintaining professional competence. He should be knowledgeable in the laws pertaining to his profession and not violate them.
  1. Respect Confidentiality : Confidentiality refers to protecting information from being accessed by unauthorized parties. Only the people who are authorized to do so can gain access to sensitive data. All the security incidents reported in the media today involve major losses of confidentiality.
  2. Maintain professional competence : The capability to perform the duties of one's profession generally, or to perform a particular professional task, with skill of an acceptable quality. Maintaining professional competence allows individuals to learn throughout their career, to develop technical skills, and to keep pace with accountancy changes.
  3. Respects and protection of personal privacy : Privacy computing includes all computing operations by information owners, collectors, publishers, and users during the entire life-cycle of private information, from data generation, sensing, publishing, and dissemination, to data storage, processing, usage, and destruction.

8 0
3 years ago
Other questions:
  • What is a close-up shot, and when it is an appropriate shot choice in a film?
    6·1 answer
  • When you right-click a word with a red squiggly line under it, which of the following displays?
    12·2 answers
  • To prevent unauthorized access and use, at a minimum a company should have a written __________ that outlines the activities for
    6·1 answer
  • A popular Voice over Internet Protocol (VoIP) service is ________.
    12·1 answer
  • What term best describes when the scope of the project changes from what was initially agreed upon?
    8·1 answer
  • What is the primary way to access applications in window 10
    7·1 answer
  • You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directl
    5·1 answer
  • After turning volume all the way up on your computer speaker you still can’t hear any sound. What should be done next
    15·1 answer
  • How do these ideas connect?
    8·1 answer
  • To find out what a database contains simply look at the ________ inside the database.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!