1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oliga [24]
3 years ago
15

Why is it important to do research prior to making a purchase? What types of sources can be helpful (or not helpful!)

Computers and Technology
1 answer:
ivolga24 [154]3 years ago
4 0

Answer:

It is important to do research before making a purchase to avoid buyers remorse. It can be expensive to return an item as you can be charged shipping and restocking fees. Before jumping in and trying to find an item it is useful to stop and ask yourself "what do I want this item for?" this gives you a list of requirements to look for. Manufacturer's specifications are useful for finding out hard facts like how wide a fridge is or what colour ink a pen has. Subjective opinions on a product are also important as they can highlight common issues people are having with an item and if you are likely to encounter the same problems if you purchase the same item. The most unhelpful sources of information about an item are sponsored placements since most of the opinions presented will be a list of the manufacturer's talking points which are going to be biased towards showing the product in a positive light.

You might be interested in
The type of manager that services all requests for data is known as?
3241004551 [841]
The type of manager that services all requests for data is known as IT service management (ITSM)
8 0
3 years ago
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
Adding Objects in Outlook
skelet666 [1.2K]

Answer:

I know its kinda late, but the answer is (B. Insert) on edg 2021.

Explanation:

5 0
3 years ago
"In Windows, what two terms describe the active partition on an MBR drive, and the location where the Windows operating system i
Oxana [17]

Answer:

Boot partition and system partition

Explanation:

System partition is the primary partition that is used as the active boot partition,it saves boot files and all files that will be used.  System partition is also known as the system directory or root directory and is usually given the identifier "c"

Boot partition is the disk partition that holds the files for the operating system files Windows operating system (either XP, Vista, 7, 8, 8.1 or 10), it works with the system partition and tells the computer where to look when starting. It given the identifier of letter "D" or "E"

5 0
4 years ago
Read 2 more answers
OSHA requires that employers pay for most required personal protective equipment (PPE), including: A. Hard hats B. Logging boots
Triss [41]
Im not 100% but Im pretty sure the answer is A. Hard hats

Hope this helps :)

6 0
3 years ago
Other questions:
  • Rachel is on her way to an interview for the position of a project manager. She is trying to prepare for this interview by analy
    6·1 answer
  • Which describes how media and networks interact
    12·1 answer
  • Write an SQL statement that uses all of the SQL built-in functions on the Quantity-OnHand column. Include meaningful column name
    14·1 answer
  • A line in the Agile Manifesto reads, "____________ and _____________ over processes and tools". Please select which option best
    9·1 answer
  • Please help i have 15 mins
    5·1 answer
  • Select the best answer to the following question.
    5·1 answer
  • I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I t
    11·1 answer
  • Discuss why it is important to know the history of social media​
    10·1 answer
  • What is the extension of Photoshop file?​
    7·1 answer
  • Which join is made with the following query?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!