1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Galina-37 [17]
3 years ago
11

Jack used primarily web sources for his informative speech about gun control. however, his over-reliance on the web site sponsor

ed by the national rifle association caused his speech to be slanted in one direction, rather than presenting multiple sides of the issue. which of the six criteria for evaluating web sources did jack ignore?
Computers and Technology
1 answer:
Snezhnost [94]3 years ago
8 0
The answer is  Objectivity. <span>Jack used primarily web sources for his informative speech about gun control. however, his over-reliance on the web site sponsored by the national rifle association caused his speech to be slanted in one direction, rather than presenting multiple sides of the issue. One of the six criteria for evaluating web sources jack ignored was Objectivity.</span>
You might be interested in
A block signature indicating that a text message was typed on a mobile device is an example of ____________.
Katarina [22]

A block signature indicating that a text message was typed on a mobile device is an example of  <u>impression management</u>.

The correct option is A.

<h3>What is  impression management?</h3>

Impression management is a conscious or unconscious process whereby individuals strive to regulate and control information in social interactions in order to affect how others perceive a person, an item, or an event.

<h3>What is the main goal of impression management?</h3>

The actions people take to influence others' perceptions of a notion are referred to as impression management. Depending on their objectives, people can work to reinforce existing beliefs or make an effort to change them.

<h3>What is block signature?</h3>

A signature block is the text that surrounds a signature and offers context for the signature as well as additional details. An email message, Usenet article, or forum post's signature block is a customized block of text that is automatically attached at the bottom of these types of documents.

To know more about  block signature visit:

brainly.com/question/2123747

#SPJ4

I understand that the question you are looking for is :

A block signature indicating that a text message was typed on a mobile device is an example of ____________.

A. impression management

B. convergence

C. evaluative language

D .pragmatic rules

6 0
2 years ago
Which of the following websites can help you learn about general career trends?
Ber [7]
The answer is vocational information center as this area or website provides a person or a student to explore careers that could be suitable to his or her liking and to show careers or professions' role as they work. This website is a way of educating an individual of having to provide informations regarding about careers.
8 0
2 years ago
Match the term with the appropriate definitions : Edge Computer Applications ANSWERED
WARRIOR [948]
It’s right, good luck.
7 0
2 years ago
A qualifier distinguishes the set of objects at the far end of the association based on the qualifier value.
Andrei [34K]

Answer:

True

Explanation: A qualifier is a term used in IT(information technology) and computer software. It is used to differentiate/ identify and select different sets of objects that are located at the far ends of a qualifier association.

A qualifier is usually used to identify an object from a set of closely related and similar objects, they are usually small boxes possibly with a rectangular shape.

7 0
2 years ago
Write a subclass named 'ReadWrite' with the following additional behavior: Any necessary constructors. a method named 'setVal' t
nataly862011 [7]

Answer:

Java Class given below

Explanation:

class ReadOnly

{

protected int val;

public ReadOnly(int arg)

{

val = arg;

}

public int getVal()

{

return val;

}

}

class ReadWrite extends ReadOnly

{

private boolean dirty;

public ReadWrite(int arg)

{

super(arg);

dirty = false;

}

public void setVal(int arg)

{

val = arg;

dirty = true;

}

public boolean isDirty()

{

return dirty;

}

}

6 0
3 years ago
Other questions:
  • You install an M.2 SSD card in an M.2 slot on a motherboard. When you boot up your system, you discover the DVD drive no longer
    15·1 answer
  • In one sentences describe how to change your home page
    10·1 answer
  • A network technician is assisting the security team with some traffic captures. The security team wants to capture all traffic o
    9·1 answer
  • What is a fax machine used for
    9·1 answer
  • Camille prepared excellent PowerPoint slides for her speech about education reform, but the speech didn't go as well as she had
    15·1 answer
  • Which of the following is your personal record of payments and bill-paying?
    13·1 answer
  • What types of tools are used in the process of a digital or network investigation?
    12·1 answer
  • If String str = "Computer Science";, then what is the value of str.substring(10);? ​
    6·1 answer
  • Can you exclude header rows from sort in excel?
    8·1 answer
  • What is the purpose of the GETPIVOTDATA function?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!