1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Art [367]
3 years ago
14

A search for reliable information is a search for what?

Computers and Technology
1 answer:
Nadusha1986 [10]3 years ago
8 0

Answer:

For information you can trust

Explanation:

You might be interested in
Which of the following is not an important consideration before a business invests in a particular technology?
Sergio [31]
When investing in technology there are four types of feasibility to look for, economic feasibility which determines if the benefits outweigh the costs, operational feasibility which determines if the system is used the way it is intended, technical feasibility which determines if the technology exists to make the new system work, and schedule feasibility which determines if the technology can be implemented in a timely manner.

The only answer that does not fit one of these feasibilities is C) How does it look?
6 0
4 years ago
5. How is shutter speed generally measured? What do the measurements mean?
Leokris [45]
Shutter speed<span> is </span>generally measured<span> by the scientific symbol “s”. The </span>measurement means<span> that the </span>measurements<span> in "s" is the reciprocal of the number when the denominator is put on the numerator side instead. ... Aperture is </span>measured<span> by f's.</span>
6 0
3 years ago
Read 2 more answers
Using your choice of C# or Java (NOT in Pseudocode), write an abstract class Vehicle. The Vehicle class contains at least these
vodka [1.7K]

Answer:

public abstract class Vehicle

   {

       private int  id;

       public int  ID

       {

           get { return id; }

           set { id = value; }

       }

       private string model;

       public string Model

       {

           get { return model; }

           set { model = value; }

       }

       public abstract string VehicleDetail(int id, string model);

   }

   public class Car : Vehicle

   {

       public Car()  {  }

       public Car(int id, string model)

       {

           ID = id;

           Model = model;

       }

       public override string VehicleDetail(int id, string model)

       {

           return $"{id} - {model}";

       }

   }

   public class Bus : Vehicle

   {

       public Bus(int id, string model, string make)

       {

           ID = id;

           Model = model;

           Make = make;

       }

       public string Make { get; set; }

       public override string VehicleDetail(int id, string model, string make)

       {

           return $"{id} - {model}" - {make};

       }

   }

Explanation:

7 0
4 years ago
Read 2 more answers
Kak cheat clans royale
labwork [276]
Um, what? I don't get what you are saying what is your question?
5 0
3 years ago
Betty took her friends bowling. they rented 4 lane. 10 people need rent shoes and
bogdanovich [222]
First there are two groups, members and non-members, so you know that there are 4 people who are members, if you subtract 4 from ten that would mean 6 people are non-members. now, for the cost of the members would be (7.50 × 4) + (2.95 × 4) = 41.8$
for the non-member group or would be (9.75 × 6) + (3.95 ×6) = 82.2$ now add 41.8 to 82.2 which equals 124.0$ in total
4 0
4 years ago
Other questions:
  • You will use the _____
    15·2 answers
  • If a suspect is not read his or her Miranda rights, then nothing the suspect says can be used at trial, even if the suspect volu
    11·1 answer
  • Which of the following is a Federal law that provides a definition of the term cyberterrorism and under which young people prima
    7·1 answer
  • In 1–2 sentences describe how you would insert a row in a spreadsheet.
    11·1 answer
  • The number of semi skilled workers in an industry find themselves out of work, when improvements in technology render their jobs
    15·1 answer
  • An individual posing as an online gamer accesses information stored in an unsuspecting user’s computer by placing a program in h
    11·1 answer
  • _________________ component defines the correct granularity for access controls and oversees the relationships between identitie
    13·1 answer
  • Write a program that assigns values to
    15·1 answer
  • How do i make a comment on brainly?
    15·1 answer
  • Gnome ____ are small programs available on the gnome panel that are designed to give you quick access to useful applications.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!