1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paladinen [302]
3 years ago
6

Which of the following can you use to judge source legitimacy?

Computers and Technology
2 answers:
FinnZ [79.3K]3 years ago
8 0
Well, I think it would depend... I would say it's B. since if it's a popular author, people must know that person as being a certain way, such as if they are credible, or they are a satire source. It could technically be date too, but I feel like it's more logically to go with B. the popularity of the author.
Sholpan [36]3 years ago
3 0

Answer:

The answer is A

Explanation:

To judge a sources legitimacy is to find factual evidence on a page. Does the page use sources as well? Does the source come from a domain such as: .edu .gov etc.? Does the author show non opinions? If the answer to these questions is yes then your credible resource is accurate.

You might be interested in
Write down the reciprocal of 40​
pychu [463]

Answer:

The reciprocal is 0.4

Explanation:

To find the reciprocal of a fraction, switch the numerator and the denominator (the top and bottom of the fraction, respectively). So, simply speaking, the reciprocal of a/b is b/a. To find the reciprocal of a number, divide 1 by the number.

Example:

What is a reciprocal of 10?

The opposite of 10 is -10. The reciprocal of 10 is 110 or 0.1

6 0
3 years ago
Write a method swaparrayends() that swaps the first and last elements of its array parameter. ex: sortarray = {10, 20, 30, 40} b
Alexus [3.1K]
In the C programming language, you can't determine the array size from the parameter, so you have to pass it in as an extra parameter. The solution could be:

#include <stdio.h>

void swaparrayends(int arr[], int nrElements)
{
int temp = arr[0];
arr[0] = arr[nrElements - 1];
arr[nrElements - 1] = temp;
}


void main()
{
int i;
int myArray[] = { 1,2,3,4,5 };
int nrElements = sizeof(myArray) / sizeof(myArray[0]);
swaparrayends(myArray, nrElements);

for (i = 0; i < nrElements; i++)
{
printf("%d ", myArray[i]);
}

getchar();
}

In higher languages like C# it becomes much simpler:

        static void Main(string[] args)
        {
            int[] myArray = {1, 2, 3, 4, 5};
            swaparrayends(myArray);
            foreach (var el in myArray)
            {
                Console.Write(el + " ");
            }

            Console.ReadLine();
        }

        static void swaparrayends(int[] arr)
        {
            int temp = arr[0];
            arr[0] = arr.Last();
            arr[arr.Length - 1] = temp;
        }

3 0
3 years ago
Write down the pseudo code for a brute-force algorithm to compare elements in array A with elements in array B.
Thepotemich [5.8K]

Answer:

def brute_force(array1, array2):

   for item in array1:

       for element in array 2:

           if element == item:

               print(f"{element} and {item} are a match")

Explanation:

A brute-force algorithm is a direct-to-solution algorithm that searches and compares variables. It is like trying to unlock a safe but not knowing its four-digit combination, brute-force starts from 0000 through 9999 to get a match.

The python program implements the algorithm using two nested for loops. The first loop iterates over array1 while the second, over array2. For every item in the first array, the program loops through the length of the second array. For every match, the items are printed on the screen.

5 0
3 years ago
Write a python program that asks the user for two numbers. Using a for loop, add all of the numbers from the first to the second
jeka94

I included my code in the picture below.

4 0
3 years ago
Which of the following expressions is not equivalent to X ' ?
damaskus [11]

Answer:

the answer is going to be c

8 0
3 years ago
Other questions:
  • The company involved in an attack by Oleg Zezev from Kazahkstan, in which Zezev accessed computer data and copied personal infor
    12·1 answer
  • Write a class that can make comparisons between the efficiency of the common methods from the List interface in the ArrayList an
    5·1 answer
  • Andrew will use the _____ picture option to add a new image. ??
    15·2 answers
  • What is the difference between a key and a superkey?
    10·1 answer
  • The SmoothWall open source firewall solution uses colors to differentiate networks. Which color indicates the private, trusted s
    9·1 answer
  • Which of these identifies the intersection of row 16 and column D?
    14·1 answer
  • Why do you think they added the wait .5 seconds block?
    13·1 answer
  • What is the correct syntax to take the first five characters from the cell A2 and place it to its right in cell A3? =RIGHT(A3,5)
    5·2 answers
  • How do I make time go by faster?? school is so boring gosh..
    10·2 answers
  • What is geospatial technology ??​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!