1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
3 years ago
14

(03.05 LC

Computers and Technology
1 answer:
Trava [24]3 years ago
4 0

Answer:

B. both primary and secondary sources.

Explanation:

Information can be defined as processed data that can be used to perform specific tasks or job functions. The two (2) main sources of information are;

I. Primary source: this type of source comprises of raw information that are first-hand in nature i.e a personal experience or witness of an event (occurrence).

II. Secondary source: this type of source relies solely on the primary source for its information and as such it comprises of second-hand information provided by other authors or researchers.

A reliable source is an information source that is unbiased, trustworthy and reliable. Also, a reliable source is typically backed up by evidence from various information channels and should be accurate.

In order to validate a reliable source, it is necessary that the information provided is checked against other credible sources to verify its accuracy.

This simply means that, if you got an information (data) from any source such as newspaper, website, television, books, radio or anywhere else, you should confirm the credibility and reliability of these information by verifying from one or more sources listed in the reference.

Hence, a reliable textbook should contain references to both primary and secondary sources.

Additionally, references are citations or links to all of the sources from which an author, writer, or researcher got his or her information from. One important thing that references show a reader is that the information is well researched.

You might be interested in
When building systems, the only two entities that constitute software engineering are people and process.
VLD [36.1K]

Answer: False

Explanation: Software engineering is the designing, analyzing, creating the software application as per the requirement of the user. The programming languages is the base for the designing of the application the software engineering field.

At the time of building system ,there is the requirement of many resources for the development.There is the requirement of the software skills, programming knowledge, resources and tools for the working and designing.Thus, there are different resources, people,skills processes, problem solving skill etc required for the building of the system.

7 0
4 years ago
Assuming that a user enters 15 as input, what is the output of the following code snippet? Scanner in = new Scanner(System.in);
snow_tiger [21]

Answer:

The output of the following code is "The number is SMALL!"

Explanation:

When the following java code is executed. Firstly the program will ask for "Please enter a number" after input the number 15 as per the question, than it check the condition which is "number > 20", if the number is greater than 20 it shows "The number is LARGE!", but the given number is smaller than 20.

3 0
4 years ago
R15. Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent f
maria [59]

Answer:

The answers are: an IP datagram, and 3 forwading tables.

Explanation:

An IP datagram sent from a source host to a destination host will travel through 8 interfaces. 3 forwarding tables will be indexed to move the datagram from source to destination.

8 0
3 years ago
What is the definition of shape
DerKrebs [107]

Explanation:

the external form, contours, or outline of someone or something.

8 0
3 years ago
Read 2 more answers
Where could an identity theft access your personal information?
noname [10]
Hey there!

Here is your answer:

<u><em>The proper answer to your question is "through websites".</em></u>

Reason:

<u><em>There are many ways identity thefts make there attacks but the most common ways is using unsafe websites. These websites most likely sell cheap products that require you to give all of your personal information in order to buy the product. </em></u>

Therefore the answer is using unsafe websites.

If you need anymore help feel free to ask me!

Hope this helps!

~Nonportrit
8 0
3 years ago
Read 2 more answers
Other questions:
  • What is software piracy
    12·2 answers
  • Is a component that provides a button control in a gui application or applet?
    15·1 answer
  • Please help
    5·2 answers
  • While performing Before Operations PMCS, you notice the front right tire appears slightly underinflated. What is the proper acti
    11·1 answer
  • On which of the following pointing devices can you control the pointer by sliding your fingertip?
    11·1 answer
  • What process periodically validates a user’s account, access control, and membership role on inclusion in a specific group?a. Re
    12·1 answer
  • What is displayed on the console when running the following program?
    5·1 answer
  • Which factor is NOT used to determine who can be let go during a downsizing?
    8·2 answers
  • Write a code that takes numbers from the user as a list. (User can enter as many numbers as he wants). Then, find mean and stand
    15·1 answer
  • Which information can you apply to every page of your document with the page layout options?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!