1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
3 years ago
14

(03.05 LC

Computers and Technology
1 answer:
Trava [24]3 years ago
4 0

Answer:

B. both primary and secondary sources.

Explanation:

Information can be defined as processed data that can be used to perform specific tasks or job functions. The two (2) main sources of information are;

I. Primary source: this type of source comprises of raw information that are first-hand in nature i.e a personal experience or witness of an event (occurrence).

II. Secondary source: this type of source relies solely on the primary source for its information and as such it comprises of second-hand information provided by other authors or researchers.

A reliable source is an information source that is unbiased, trustworthy and reliable. Also, a reliable source is typically backed up by evidence from various information channels and should be accurate.

In order to validate a reliable source, it is necessary that the information provided is checked against other credible sources to verify its accuracy.

This simply means that, if you got an information (data) from any source such as newspaper, website, television, books, radio or anywhere else, you should confirm the credibility and reliability of these information by verifying from one or more sources listed in the reference.

Hence, a reliable textbook should contain references to both primary and secondary sources.

Additionally, references are citations or links to all of the sources from which an author, writer, or researcher got his or her information from. One important thing that references show a reader is that the information is well researched.

You might be interested in
Ipv6 includes a native information security framework (ipsec) that provides both data and control packets. true false
Galina-37 [17]
<span>The statement that IPv6 includes a native information security framework (IPsec) that provides both data and control packets is false.
</span>IPSec is a mandatory component for IPv6, and is used to natively protect IPv6 data <span>as it is sent over the network,. and not control packets.
</span>The IPv6 IPSec is a set of Internet standards that uses cryptographic security services to provide confidentiality ,data origin authentication and data integrity<span>
</span>

5 0
3 years ago
What do the 100 or so atoms of the periodic table, in different combinations, make up
Nikolay [14]

Answer:

100 or so atoms of the periodic table, in different combinations, make up <u>Compounds</u>.

Explanation:

Atoms from different element in the periodic table combined together with the help of  bond and make a new product that is called compound.

<u>For example</u>

Hydrogen and oxygen are the elements of the periodic table. When one atom of oxygen and two atoms of hydrogen are combined together, a compound will be formed named as water (H20).

In another example, two atoms of oxygen and one atom of carbon combines toghther through chemical reaction and make compund named as Carbon dioxide (CO2).

6 0
3 years ago
A production house needs an operating system that captures, saves, and generates information within a specific time. Which type
bearhunter [10]
Windows and linux are best in my opinion! Linux is not used by many people but a lot of apps can't be used for linux so best is to use windows. But Mac is not bad too. Hope I helped and have a nice day!
4 0
3 years ago
Filtering removes data from the spreadsheet. A. True B. False
____ [38]
6 is false
7 is false
8 is true
5 0
3 years ago
Read 2 more answers
What is the index of 7 in this list?<br> [5, 6, 10, 7, 3, 2.51]
kotykmax [81]
5 or 7 I believe Good luck!
6 0
3 years ago
Read 2 more answers
Other questions:
  • Disk scheduling algorithms in operating systems consider only seek distances, because Select one: a. modern disks do not disclos
    13·1 answer
  • Assume the following representation for a floating point number 1 sign bit, 4 bits exponent, 3 bits for the significand, and a b
    9·1 answer
  • What economic measure is at the highest level since the Great Depression?
    12·1 answer
  • What is the slowest shutter speed?
    5·1 answer
  • . What is the relationship between frequency, wavelength and speed of a wave?
    15·1 answer
  • cpp g Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print fo
    15·1 answer
  • business information management professionals also perform duties of _ information system professionals
    11·1 answer
  • 1. Define lexemes. Give an example of an lexeme in any programming language.<br>​
    10·1 answer
  • What is generation of computer ?​
    7·2 answers
  • Compare the graphs. Find the value of h, k, or a.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!