1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksian1 [2.3K]
3 years ago
5

An author’s qualifications are important in determining whether a media source is...

Computers and Technology
1 answer:
geniusboy [140]3 years ago
4 0

Answer:

An author's qualifications are important in determining whether a media source is;

Credible

Explanation:

In order to find out about the credibility of an author, the preface, forward, and or introduction including the book's back cover should be checked for the author's credentials, qualifications and areas where the author is an expert

The author's credential can also be checked by finding out about other books the author has written and also about the author's biography.

You might be interested in
Which marketing strategy is represented by advertisers paying for online display ads?
e-lub [12.9K]

Answer:

The answer is (c) paid media

Explanation:

Because they are paying for the ad to be displayed online. hope this helps!

8 0
3 years ago
QUESTION 9 of 10: Bob charged $200 for a plane ticket last month. When he received his statement, he saw that he could pay the m
IgorLugansk [536]

Answer:

yes cuz 25x8=200

Explanation:

3 0
3 years ago
Read 2 more answers
Should i change my profile pic<br> dont delete
nignag [31]
On the one hand it looks pretty cool, on the other hand change is good
8 0
3 years ago
Read 2 more answers
A ____ attack is much more substantial than a DoS attack because of the use of multiple systems to simultaneously attack a singl
victus00 [196]

Answer: (D) Distributed denial- of- service (DDoS)

Explanation:

The distributed denial of service attack is one of the type of attack that occur when the multiple system are basically flooded with the resources and the bandwidth.

  • Botnet is one of the example of DDoS as it caused the DOS (denial of service) for the users.
  • This type of attack is more substantial as compared to the DoS attack as they use the multiple system for attack the single target simultaneously.

Therefore, Option (D) is correct.

8 0
3 years ago
An electric spreadsheet can perform all of the following tasks, except
motikmotik

Answer:

C. Plan worksheet objectives

Explanation:

3 0
3 years ago
Other questions:
  • Describe Network in terms of the classroom computer lab
    14·1 answer
  • Why should you log out when you finish an online session?
    9·1 answer
  • You are testing a web application for sql injection vulnerabilities. you send various sql statements which return results on the
    5·1 answer
  • _____________________ denotes the use of human interactions to gain any kind of desired access. Most often, this term involves e
    11·1 answer
  • An aircraft departs an airport in the mountain standard time zone at 1615 MST for a 2-hour 15-minute flight to an airport locate
    14·1 answer
  • Does Buzz or APEX shows all your due assignments on the left of the main home screen?
    11·1 answer
  • 15) Three primary activities of a program are: A) Variables, Operators, and Key Words B) Lines, Statements, and Punctuation C) I
    11·1 answer
  • Reply emailing a student who is asking about audio materials​
    6·2 answers
  • Fre.e points enjoy em
    7·2 answers
  • CreatePolicies<br> I need help with this in java.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!