1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
2 years ago
9

What makes a source credible?

Computers and Technology
2 answers:
g100num [7]2 years ago
4 0

Answer:

C It is believable or trust worthy

Alex787 [66]2 years ago
3 0

Answer:

It's C: It is believable or trustworthy.

Explanation:

I got it right.

You might be interested in
What command do you type in the search box to access the command line intrface in windows?
Whitepunk [10]
Cmd.exe



------------------------------------------
3 0
3 years ago
Suppose that a program asks a user to enter multiple integers, either positive or negative, to do some calculation. The data ent
KatRina [158]

Answer:

d) An alphabetic character

7 0
3 years ago
Question 16 (1 point)
Lana71 [14]

Answer:

C) the world wide web.

Explanation:

if you where to google the question it is the definition of the WWW

5 0
3 years ago
Who developed the Great Compromise ​
Nostrana [21]

Answer:

Roger Sherman

The solution came in the form of a compromise proposed by statesmen Roger Sherman and Oliver Ellsworth of Connecticut. The Great Compromise created two legislative bodies in Congress.

Explanation:

comment how it helps

7 0
2 years ago
What is the first thing you should do when you discover a computer is infected with malware? The second thing?
Goshia [24]

Answer:

Quarantine the computer.

Explanation:

Malware can be characterized with negative software capable of causing various damages to a computer, such as theft of data and information, in addition to damage to devices.

In order to avoid having your computer infected with malware, it is essential to have installed reliable malware-checking software, in addition to taking all appropriate security measures when accessing the internet and never clicking on unknown or suspicious links.

Therefore, when realizing that the computer has been infected by malware, it is necessary to quarantine the computer and immediately disconnect from a network so that it does not infect other computers. The quarantine acts as an action where the infected file is moved to an encrypted folder where the malware cannot be executed and spread by the operating system.

3 0
3 years ago
Other questions:
  • 1. Which sign-in method requires users to press Ctrl+Alt+Delete before signing in?
    5·1 answer
  • Choose the risks from the options below to presenting yourself differently online than offline?
    12·1 answer
  • What are the two most popular applications of theInternet?
    7·1 answer
  • Which style did Jack use on the vocabulary words in reports?
    14·2 answers
  • If you could make another device "smart" and have
    12·1 answer
  • + Use for loop to print numbers from 100 to 10
    11·1 answer
  • About C header files of C programming
    8·1 answer
  • Can someone pls do a toradora,Mha or princess jellyfish rp I'm open for anyother rp's
    11·2 answers
  • How to square a number in java.
    15·1 answer
  • Question 7 Consider the following code:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!