1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
2 years ago
9

What makes a source credible?

Computers and Technology
2 answers:
g100num [7]2 years ago
4 0

Answer:

C It is believable or trust worthy

Alex787 [66]2 years ago
3 0

Answer:

It's C: It is believable or trustworthy.

Explanation:

I got it right.

You might be interested in
Netflix uses ________ analytics to suggest which movies we should watch as well as to develop new content that it is confident w
marusya05 [52]

Answer:

"Predictive analytics" is the correct answer to the given question.

Explanation:

Predictive analysis is the analysis of the data. It is a type of data analytics that gives the future results by analyzing the historical data Some of the examples of predictive analytics are Machine Learning. Netflix is using the technique of Predictive analytics.

Netflix provides the services of entertainment. In Netflix, we watch the movies also it developed the new content.

6 0
3 years ago
What is meant by concentration of a solution​
Bad White [126]

Answer:

The concentration of a solution means the amount of solute present in a given or specific amount of solution. (presented in percentage)

For example, the Normal Saline solution normally used for different scientific experiment or so. The saline water has 0.9% of salt (sodium chloride). This is the concentration of solution of salt.

5 0
4 years ago
Read 2 more answers
Viruses and Malware Complete the case project on page 82 of the textbook by researching two types of viruses, two types of malwa
Naddika [18.5K]

Hi, I provided you a general guide on how to go about your writing your research paper.

<u>Explanation:</u>

Note, the current APA (American Psychological Association) format is the <em>APA 7th Edition. </em>This format details how a researcher should state the findings, sources, conclusion, etc.

Hence, you can begin writing the assigned paper only after gathering the needed data.

6 0
3 years ago
How is the Internet Simulator similar to the Actual Internet? How is it different?
masya89 [10]
The Internet Simulator is a tool developed by Code.org for our new high school Computer Science Principles class. ... The Internet Simulator was designed to be used in a classroom with students working collaboratively in-person to solve problems.
4 0
4 years ago
n a​ poll, 6767​% of Internet users are more careful about personal information when using a public​ Wi-Fi hotspot. What is the
a_sh-v [17]

Answer:

The probability that among three randomly selected Internet​ users, at least one is more careful about personal information when using a public​ Wi-Fi hotspot is 0.964

If the survey subjects <em>volunteered</em> to​ respond , then those with the strongest opinions are most likely respond. The survey sample is then not randomly selected, the survey may have a <em>response bias.</em>

Explanation:

Let P(at least one is more careful about personal information when using a public​ Wi-Fi hotspot) denote the probability that among three randomly selected Internet​ users, at least one is more careful about personal information when using a public​ Wi-Fi hotspot, then we have the equation

P(at least one is more careful about personal information when using a public​ Wi-Fi hotspot) = 1 - P(none of the selected users is more careful about personal information when using a public​ Wi-Fi hotspot)

  • If 67​% of Internet users are more careful about personal information when using a public​ Wi-Fi, then 33% of them are not.

P(none of the selected users is more careful about personal information when using a public​ Wi-Fi hotspot) = 0.33^{3} ≈ 0.036

P(at least one is more careful about personal information when using a public​ Wi-Fi hotspot)  = 1 - 0.036 = 0.964

4 0
3 years ago
Other questions:
  • Questions 6 - 9 Refer to the following code: public class WhatsIt { private int[] values; private double average; public WhatsIt
    7·1 answer
  • Use search engines and websites to research the following WAN technologies to complete the table below:
    7·2 answers
  • C++ CODE
    6·1 answer
  • When network cards are communicating, bits can occasionally be corrupted in transmission?
    5·1 answer
  • Which diagram is used as a popular technique for investigating causes and effects? 1. Cause and effect 2. Fishbone/lshikawa 3. R
    13·1 answer
  • Which is NOT a benefit of using visual aids?
    9·2 answers
  • What is wrong with the following code?
    11·1 answer
  • How is knowing how to use word or docs importamt?
    8·1 answer
  • There are some games that cannot be described by a single--or even two-- genres. Can you think of any that should be invented?​
    6·1 answer
  • You have been on the phone with a user in a remote office for 30 minutes troubleshooting their minor desktop problem. No matter
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!