1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
3 years ago
5

PAGEDATE0 What types of information should be there internet?​

Computers and Technology
1 answer:
Hoochie [10]3 years ago
5 0

Answer:

The kind of information that should be on the internet must be one that is good.

Explanation:

Qualities of good information are as follows:

A) Relevance:

For the purpose it was published, to the audience, it was intended for, every information put out there on the internet must be relevant. This is key and not negotiable. Perhaps its relevance may wane over time, however, in the period it was posted, it has to speak to the intended purpose.

B) Complete:

Incomplete information automatically becomes misleading or useless.

To say Donald Trump was a United States president in 2021 would be factually correct. However, that statement is misleading because he also stepped down in the same year for Joe Biden. Now that gives a complete and true picture of the Presidency of the United State of America (POTUS) in 2021.

 

C) Accuracy:

Accuracy means there is little chance for misinterpretation, misinformation, and misrepresentation of facts.

Essentially, if it's a spade, don't call it a pen.

D) Clarity:  

"In 2020, delegates to the White House to speak about the problems so that we can be happy so the problems have to go away soon"

The above statement at its best only tells us that someone sent delegates to the White House to speak about problems. We don't know what the problem was, who the delegates were, nor do we know who sent them. Clarity is key. The next point conciseness also helps with this.

E) Conciseness

Another word for this is brevity.

This does not necessarily mean one must only publish short messages on the internet. It simply means that you must make your point with the least amount of words possible.

F) Authenticity

Call it trustworthy information if you like. People make decisions based on information they have received. If one must put out information on the internet, it must be true, factual, and correct.

Cheers

You might be interested in
Print "userNum1 is negative." if userNum1 is less than O. End with newline Convert userNum2 to 0 if userNum2 is greater than 8.
Butoxors [25]

Answer:

import java.util.Scanner;

public class num1 {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter User name 1 and 2");

       int userNum1 = in.nextInt();

       int userNum2= in.nextInt();

       if(userNum1<0){

           System.out.println("userNum1 is negative.");

       }

       else if(userNum2>8){

           userNum2 =0;

       }

       else{

           System.out.println("userNum2 is less than or equal to 8..");

       }

   }

}

Explanation:

This is implemented in Java programming language

Using the scanner class, the user is prompted to enter two numbers

These are saved in the variable userNum1 and userNum2 respectively.

If, else if and else statements are then used according to the specifications given in the question.

8 0
4 years ago
What is a way that i can connect my Xbox360 to my computer?
Vladimir79 [104]
Its possible if you get the right cords like double ended usb cord and also it depends on what kind of model you have message me and ill tell you
8 0
4 years ago
Read 2 more answers
A company wants to implement a wireless network with the following requirements:
jarptica [38.1K]

Answer:

PEAP is the correct answer to the given question .

Explanation:

The  PEAP are implemented to meet the demands because it is very much identical to the EAP-TTLS design also it includes the server-side PKI authentication .

  • The main objective of  PEAP is to establish the protected TLS tunnel for protecting the authentication process, as well as a server-side encryption authentication.
  • The PEAP  is also used for validating the application it validating her process with the help of the TLS Tunnel encryption between the user and the verification.
  • All the other options are not suitable for the  to meet the requirements of the design that's why these are incorrect option .
3 0
3 years ago
Which phrase describes a dependent cell in Excel 2016? a cell that feeds data into another cell a cell that has data fed into it
vovangra [49]

Answer:

a cell that feeds data into another cell

Explanation:

The dependent cell means the cell which refers to another cell.

Just take an example

If cell c15 involves the formula = B10

So c15 is being dependent on cell b10

For reaching this we visit to formulas section after that dependent and precedent occurs

So according to the given options, the first option is correct

4 0
4 years ago
With the ease of the Internet, it is not uncommon for individuals to copy skills from resume templates to make themselves look m
Butoxors [25]

Answer:

Content.

Explanation:

With the convenience of the Web, copying skills of resumes models is not unusual among people that create themselves seem quite appealing to such a recruiter. Understanding this, Ed developed a check to examine whether that person's job skills are about what's on the form.  

He is checking the validity of the content because It relates to that of the extent that the products on such a survey seem to be extremely determinative of the whole domain to be measured by the study.

7 0
4 years ago
Other questions:
  • _________ is the amount of data a storage device can move per second from the storage medium to ram.
    12·1 answer
  • How to eject a flash drive from chromebook?
    6·1 answer
  • What is the purpose of look up tables in spreadsheet software apex
    13·1 answer
  • To apply a style to one or more elements on a web page, configure a css ________.
    5·1 answer
  • If a user has one column in a table and would like to make it into two columns which command should be used?
    8·2 answers
  • Which of the following would NOT be considered a cause of technological progress?
    6·1 answer
  • In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of
    14·1 answer
  • Convert the following decimal number into octal number-147​
    11·1 answer
  • OH GOD PLEASE HELP I CAN'T FIGURE THIS OUT-
    6·1 answer
  • Evaluate the merits of a hard disk drive or a solid state drive to use as the secondary storage
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!