1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
3 years ago
8

An academic or professional blog would be especially useful ?

Computers and Technology
1 answer:
Anna71 [15]3 years ago
3 0
Blogs, even academic and professional, are not usually considered reliable sources. Most importantly, that's because they don't undergo the peer review process, which ensures the quality of the published papers (that they don't publish lies, in simple words).


You might be interested in
What are the factors that influence the selection of access control software and/ or hardware? Discuss all aspects of access con
skelet666 [1.2K]

Answer:

While selecting the access control system (software or hardware), there are many factors that influence it and those factors are campus location, network capabilities, number of users using it, size of campus, the motive for using it, etc.

Explanation:

The access control system is electronic device that needs to be connected to the network for providing security control and authorization to the user to enter into the Campus.  

Access control systems are used to control access into premises or any IT area which is control in two ways either in a physical way or a logical way.

8 0
4 years ago
This method is employed in order to rapidly change the locations of the website in order to ensure that no one site us used long
tester [92]

Answer:

Fast-flux

Explanation:

The techniques that is used to shift the network without shutdown of website.

4 0
4 years ago
What is an effective technique for searching the web? Choose one.
kakasveta [241]
Option B is what i would say 

if you are searching something and want a specific answer you are going to need to be specific on how you search it
4 0
4 years ago
Read 2 more answers
What has abstraction enabled users to do?
Sindrei [870]

Answer:

c, understand what a computer does

8 0
2 years ago
Read 2 more answers
What was named the worst game ever?
Schach [20]

Answer:

Fortnight

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • If you paste a word document text into an excel spreadsheet, the paste optio allow you to keep source formatting or
    9·1 answer
  • Sam's manager would like him to create and distribute copies of a budget report for each department. The budget report should sh
    8·2 answers
  • Dr. Laos gets a referral for a 6 month old who has become listless and stopped eating lately. Her pediatrician wanted her to be
    15·1 answer
  • Most of the pollution in the ocean comes from:
    11·1 answer
  • W-11/6=4<br><img src="https://tex.z-dn.net/?f=%20%20%5Cfrac%7Bx%20-%2011%20%7D%7B%206%7D%20%20%3D%204" id="TexFormula1" title="
    14·1 answer
  • Help please fast
    6·2 answers
  • What Active Directory object enables an administrator to configure password settings for users or groups that are different from
    9·1 answer
  • The key schedule results in generating multiple keys from the one secret key. These multiple keys are used:
    9·1 answer
  • You designed a program to create a username using the first three letters from the first name and the first four letters of the
    6·1 answer
  • The ______ Works on a single variable or constant. *​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!