1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
2 years ago
9

What makes a source credible?

Computers and Technology
2 answers:
g100num [7]2 years ago
4 0

Answer:

C It is believable or trust worthy

Alex787 [66]2 years ago
3 0

Answer:

It's C: It is believable or trustworthy.

Explanation:

I got it right.

You might be interested in
Why do computers need system software?
Marina86 [1]
<span>Computers don't need system software. System software is used to automate many tasks so the user can achieve more. Actually, one of the ideas of computer programming is to avoid needless repetition. The system software will prepare the computer for the user.</span>
5 0
3 years ago
What source ip address does a router use by default when the traceroute command is issued?
maw [93]

When sending an echo request message, a router will use the IP address of the exit interface as the source IP address.

<h3>What is traceroute IP address?</h3>

Traceroute, also called tracepath or tracert, is a network tool used to determine the “path” packets take from one IP address to another.

It provides the hostname, IP address, and the response time to a ping. Enter the IP address that you want to lookup.

Traceroute ensures each hop on the way to a destination device drops a packet and sends back an ICMP error message.

This means traceroute can measure the duration of time between when the data is sent and when the ICMP message is received back for each hop—giving you the RTT value for each hop.

To learn more about IP address, refer

https://brainly.ph/question/4632300

#SPJ4

4 0
2 years ago
Which of the following is NOT a way to build on your strengths?
N76 [4]

Answer: the answer is B

Explanation: You can't raise your strengths if you only do sports you are good at:)

8 0
3 years ago
Read 2 more answers
9.6 Code Practice: Question 1
worty [1.4K]

Answer:

  1. import java.util.Random;
  2. import java.util.Arrays;
  3. public class Main {
  4.    public static void main(String[] args) {
  5.        int n = 10;
  6.        int [] myArray = new int[n];
  7.        buildArray(myArray, n);
  8.        System.out.println(Arrays.toString(myArray));
  9.    }
  10.    public static void buildArray(int[] arr, int n){
  11.        for(int i=0; i < arr.length; i++){
  12.            Random rand = new Random();
  13.            arr[i] = rand.nextInt(90) +10;
  14.        }
  15.    }
  16. }

Explanation:

Firstly, create a method buildArray that take two inputs, an array and an array size (Line 12). In the method, use random nextInt method to repeatedly generate a two digit random number within a for loop that will loop over array size number of times (Line 13-15). The expression rand.nextInt(90) + 10 will generate digits between 10 - 99.

In the main program, call the build array method by using an array and array size as input arguments (Line 8). At last, print the array after calling the buildArray method (Line 9).

8 0
3 years ago
What is the difference between spyware and adware
stepladder [879]
Spyware<span> is considered a malicious program and is similar to a Trojan Horse in that users unwittingly install the product when they install something else. ... </span>Spyware <span>works like </span>adware<span> but is usually a separate program that is installed unknowingly when you install another freeware type program or application.</span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following matching is true concerning the Protocol Data Unit (PDU) and its corresponding OSI layer location?
    15·1 answer
  • . Html documents are created by adding what to text?
    13·1 answer
  • A large IPv4 datagram is fragmented into 4 fragments at router 1 to pass over a network with an MTU of 1500 bytes. Assume each f
    15·1 answer
  • Different video files and ______ can cause compatibility issues to arise between computer systems.
    8·1 answer
  • Suppose that a is declared as an int a[99]. Give the contents of the array after the following two statements are executed: for
    15·1 answer
  • Help me due on literally 9mins
    6·1 answer
  • 1 punto
    5·1 answer
  • Imagine that you are preparing a multimedia presentation. What are the four things you need to consider when getting started?
    14·2 answers
  • Your friend really likes talking about owls. Write a function owl_count that takes a block of text and counts how many words the
    9·1 answer
  • write an assembly program that uses the output compare function of a timer to toggle an led every second
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!