1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
3 years ago
9

What makes a source credible?

Computers and Technology
2 answers:
g100num [7]3 years ago
4 0

Answer:

C It is believable or trust worthy

Alex787 [66]3 years ago
3 0

Answer:

It's C: It is believable or trustworthy.

Explanation:

I got it right.

You might be interested in
When are computers most vulnerable to threats or damage?
valentinak56 [21]
With virus protection
8 0
4 years ago
Describe the history of the Internet and WWW
Sladkaya [172]

Explanation:

 Internet is the worldwide system that is publicly available and it interconnect various computer network in the system for transmission of data. Robert E. Kahn was the founder of internet in 1960s by the creation of Advanced research agency network (ARPANET).

WWW is the world wide web system and it is the combination of various types of resources and the users. The world wide web is the universal network that access data and uses the HTTP( hypertext transfer protocol). It is basically invented by Sir tim berners-Lee in 1989.

6 0
3 years ago
What best describes the difference between plagiarism and fair use
Colt1911 [192]
The answer is ..........
 
<span>Fair use </span>

The doctrine of fair use allows the limited use of copyrighted material for certain educational, scholarly and research purposes without the permission of the copyright owner. It applies to any copyrighted material regardless of source, including the Internet. If you photocopy a page from one of your textbooks or print a page from a copyrighted Internet site for certain educational, scholarly or research purposes, your actions may fall under the doctrine of fair use. The copyright laws give you permission to copy the work<span> (with certain limitations), even though the owner of the copyright did not.


V.S

</span>Plagiarism

Plagiarism is "the representation of another's work or ideas as one's own; it includes the unacknowledged word-for-word use and/or paraphrasing of another<span> person's work, and/or the inappropriate unacknowledged use of another person's </span><span>ideas" (The Ohio State University Code of Student Conduct). This means that if </span><span>you use another person's work when completing any academic assignment,</span><span> </span><span>regardless </span>

5 0
4 years ago
Read 2 more answers
Create a C++ program that declares, initializes, and outputs the values contained in a two-dimensional array
Kazeer [188]

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variables

int r_size,c_size;

cout<<"enter the number of row:";

// read the value of row

cin>>r_size;

cout<<"enter the number of column:";

// read the value of column

cin>>c_size;

// create a 2-d array

int arr[r_size][c_size];

// read the value of array

cout<<"enter the elements of array:"<<endl;

for(int x=0;x<r_size;x++)

{

for(int y=0;y<c_size;y++)

{

cin>>arr[x][y];

}

}

cout<<"elements of the array are:"<<endl;

// print the array

for(int a=0;a<r_size;a++)

{

for(int b=0;b<c_size;b++)

{

cout<<arr[a][b]<<" ";

}

cout<<endl;

}

return 0;

}

Explanation:

Here we have demonstrate a 2- dimensional array. In which, how to read the elements and how to print elements of array.Read the value of row and column from user.Create a 2-d array of size r_sizexc_size. then read the elements of array either row wise or column wise. Then print the elements.To print the elements, we can go either row wise or column.

Output:

enter the number of row:2

enter the number of column:3

enter the elements of array:

1 2 3

2 3 4

elements of the array are:

1 2 3

2 3 4

8 0
4 years ago
Following a security assessment, the Chief Information Security Officer (CISO) is reviewing the results of the assessment and ev
myrzilka [38]

Answer:

The correct answer to the following question is option B). Quantitative risk assessment .

Explanation:

QRA ( Quantitative Risk assessment) is the objective risk  assessment tool that is used to project threat impacts.

Quantitative Risk Assessment provides the estimate of magnitude of the consequences for each of the identified budget threats.

It set out to measure, define, provide, and predict the confidence  level of the likelihood and the occurrence of the threat impacts.

3 0
4 years ago
Other questions:
  • How do you become a hacker? Is there any good websites? Where do you begin? Preferably a white hat.
    7·1 answer
  • Which of the following plug-ins was developed by microsoft and is a software development tool used to write and run internet app
    10·1 answer
  • To minimize the invasion of privacy, _____.a.organizations should not modify data once it is entered into an information systemb
    14·1 answer
  • The combined resistance of three resistors in parallel is: Rt = 1 / ( 1 / r 1 + 1 / r 2 + 1 / r 3 ) Create a variable for each o
    15·1 answer
  • Agile methods typically use a ______ model, which represents a series of iterations, or revisions, which are based on user feedb
    7·1 answer
  • How many total cells can a worksheet window contain? If columns are labelled alphabetically, what will be the label for the cell
    15·1 answer
  • Logistic Regression is a type of __________ problem.
    13·2 answers
  • Which of the following is a method which can be used to delete a page from a publication?
    6·1 answer
  • Need help completing this coding assignment.
    11·1 answer
  • These are pictorial images displayed on a computer screen​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!