1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
3 years ago
9

What makes a source credible?

Computers and Technology
2 answers:
g100num [7]3 years ago
4 0

Answer:

C It is believable or trust worthy

Alex787 [66]3 years ago
3 0

Answer:

It's C: It is believable or trustworthy.

Explanation:

I got it right.

You might be interested in
If a fuse block or holder has tree fuses, it may be termed a...
umka21 [38]
<span>C.three-position holder</span>
8 0
3 years ago
What layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for defining a way to interpret
sweet-ann [11.9K]

Answer:

The data-link layer

Explanation:

The physical layer and data-link layer are often confused a lot especially in terms of what they do in the TCP/IP 7 layer protocol. The physical layer as the name suggests represents the physical devices like the cables and the connectors that join or interconnect computers together. This layer is also responsible for sending the signals over to other connections of a network. The data-link, on the other hand, translates and interprets these sent binary signals so that network devices can communicate. This layer is responsible in adding mac addresses to data packets and encapsulating these packets into frames before being placed on the media for transmission. Since it resides in between the network layer and the physical layer, it connects the upper layers of the TCP/IP model to the physical layer.

3 0
4 years ago
What characteristics of IT careers can be a challenge for employees
IRINA_888 [86]

It is essential to continually be learning about new technology.(APEX VERIFIED)

8 0
3 years ago
Read 2 more answers
The purpose of the img element's ________ attribute is to provide a method for a browser to display different images depending o
shusha [124]

Answer:

srcset

Explanation:

8 0
3 years ago
A user is trying to log into windows on her notebook computer. she enters the correct password for her user account, but the sys
ASHA 777 [7]
Try restarting the PC. I have the same issue on Windows 10 sometimes generally its a network error because Windows 10 has a lot of internet required features... 
7 0
4 years ago
Other questions:
  • Which of the following steps in enumeration penetration testing extracts information about encryption and hashing algorithms, au
    13·1 answer
  • Beside homework, what products can you use for personal use? Identify three uses and briefly describe.
    15·1 answer
  • When you ____ a method, you write multiple methods with a shared name but different parameter lists?
    10·1 answer
  • Fredrick wants to revise an employee policy. If he wants to inform all of the employees of the change, what type of document wil
    10·2 answers
  • Software that protects confidentiality by screening outgoing documents to identify and block transmission of sensitive informati
    12·1 answer
  • What is responsible for what you see on the monitor?
    13·1 answer
  • Ways on how to conserve energy.
    15·1 answer
  • I am trying to do a python code quiz for school, the basic requirements for the quiz are: the quiz MUST have 10 questions
    15·2 answers
  • Collection activities acquire and extract data from the operational environment such that Processing and Exploitation can conver
    14·1 answer
  • which command entered without arguments is used to display a list of processes running in the urrent shell
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!