1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paladinen [302]
3 years ago
6

Which of the following can you use to judge source legitimacy?

Computers and Technology
2 answers:
FinnZ [79.3K]3 years ago
8 0
Well, I think it would depend... I would say it's B. since if it's a popular author, people must know that person as being a certain way, such as if they are credible, or they are a satire source. It could technically be date too, but I feel like it's more logically to go with B. the popularity of the author.
Sholpan [36]3 years ago
3 0

Answer:

The answer is A

Explanation:

To judge a sources legitimacy is to find factual evidence on a page. Does the page use sources as well? Does the source come from a domain such as: .edu .gov etc.? Does the author show non opinions? If the answer to these questions is yes then your credible resource is accurate.

You might be interested in
I need help!! I decided to go back to college this year and am taking Intro to Logic and Programming. I have an assignment due t
Artist 52 [7]

Answer:

Monday Video: 5.4.20 Section 18.5

Work due: 18.5 Worksheet

CW

Tuesday Video: 5.5.20 Section 18.6

Work due: 18.6 Worksheet

HW

Wednesday Video: 5.6.20 Section 18.7

Work due: 18.7 Classwork

CW

Thursday Video: 5.7.20 Section 18.7

Work due: 18.7 Homework

HW

Friday Video: 5.8.20 Section 18.5-18.7

Work due: Textbook page 615 #5-19 (not #13)

HWaccuracy

Explanation:

7 0
3 years ago
Pleases Help ME An example of a _________________ impact is when a product is back ordered and the business contacts the custome
igomit [66]

Answer:

positive

Explanation:

it shows good customer service

8 0
3 years ago
Which of the following is NOT a major type of crime reported to the IC3.
mezya [45]
I believe malware fraud, c. 


5 0
4 years ago
Select the correct answer from each drop-down menu.
tia_tia [17]

Answer:

<dd> tag is used

Explanation:

The <dd> tag is used in HTML document to explain set of terms. The <dd> tag list is used in conjunction with the <dl> term. Inside a <dd> tag we can insert text, sentence, paragraph or links. There are 4 primary tags to build any website. Every HTML document begins and ends with HTML tag.

6 0
3 years ago
Which kind of file would be hurt most by lossy compression algorithm
Eduardwww [97]

Answer: an audio file containing speech

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following Statements accurately describes the legality of telemarketing
    12·1 answer
  • HELP! ASAP I KNOW IT'S QUITE A HANDFUL BUT I NEED THIS ANSWER!!
    10·1 answer
  • assume an int array, candy, stores the number of candy bars sold by a group of children wherecandy[j] is the number of candy bar
    7·2 answers
  • What kind of software is Microsoft Outlook??
    15·2 answers
  • Assume that you have created a class named DemoCar. Within the Main() method of this class, you instantiate a Car object named m
    12·1 answer
  • An invisible path determining the way of travel from one place to another.
    10·1 answer
  • Write a program in qbasic to accept a character and check it is vowel or consonant​
    14·1 answer
  • Which of the following is NOT a type of insurance fraud?
    14·2 answers
  • After Alexandra installed new software, she set it up to perform in a certain way. She is _____. changing the peripherals linkin
    10·1 answer
  • What is the relationship between agile teams and project requirements
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!