1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tresset_1 [31]
3 years ago
8

How do we explain the difference between fake news and facts​

Computers and Technology
1 answer:
Natalija [7]3 years ago
3 0

Answer: it depends if the news is on the news and someone rights an article about it and says some mislead details that's how u know its fake  

Explanation:

You might be interested in
Which of the following describes an executive information system (EIS)?
rjkz [21]
I think the answer is b

hope this helps :)
3 0
3 years ago
Display all the lines in unixPasswd that contain at least 10 consecutive lowercase letters. How many names are there in total th
Sladkaya [172]

Answer and Explanation:

To display 10 consecutive lower case letters in Unix, we make use of the commands below. The first command finds the letters in the file and the second command counts them line by line.

$ grep '[a-z]\{10,\}' /unixPasswd/passwd

# this command displays lines with at least 10 consecutive lowercase letters or more than 10 consecutive lowercase letters

$ grep '[a-z]\{10,\}' /unixPasswd/passwd | wc -l

# this command counts the number of lines that has at least 10 consecutive lower case letters or more than 10 consecutive lowercase letters

Note: the unixPasswd is a file in passwd file. The # is used when we want to add comments, is optional here. The $ is a prompt on the terminal that begins a new command.

7 0
3 years ago
How do I put in a micro sd card that is in a sd adapter in to my laptop to make it work PLEASE HELP
nekit [7.7K]

Answer:

You need to insert the Micro SD card into the slot of the SD card adapter. Insert the adapter card with the inserted Micro SD card into the SD card port on the laptop. If the laptop does not have a card reader with an SD card port, insert the installation disk for an external card reader into the optical drive of the laptop.

3 0
3 years ago
______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
Kitty [74]

Answer:

"IP security" is the correct answer for the above question.

Explanation:

  • "IP security" is a set of rules or protocols which are used for the communication of the network.
  • It is a protocol that is used to encrypt the data which is needed to transfer on the network.
  • It provides security for the communication and it encrypts the data which is needs o transfer on the network.
  • The above question asked about the term which is used for encryption and security. So the answer is "IP security", which is defined above.
7 0
4 years ago
Read 2 more answers
Clunker Motors Inc. is recalling all vehicles from model years 1995-1998 and 2004-2006. Given a variable modelYear write a state
DerKrebs [107]

Answer:

((model years >=1995 && model years <= 1998) || (model years >= 2004 && model years <=2006 ) ? no recall= false : no recall = true;

Explanation:

8 0
3 years ago
Other questions:
  • Rather than manually setting a print area each time you want to print a range, you can ____ the range.
    13·1 answer
  • Certain medications can increase risk of obtaining a sunburn true or false
    12·1 answer
  • A(n) _____ is a computer network that uses Internet Protocol technology to share information, operational systems, or computing
    12·1 answer
  • Why is it important to use the binomial nomenclature system?
    6·1 answer
  • Which of the following representations in two's complement notation represents the largest value?
    12·2 answers
  • Spreadsheet software can be used to do all the following except _____.
    5·2 answers
  • 1. Define what grasslands are ?
    14·2 answers
  • 1 : What format would you apply to give an entry the appearance of 12-Mar-2014
    8·1 answer
  • Selection Sort List the resulting array after each iteration of the outer loop of the selection sort algorithm. Indicate the num
    10·1 answer
  • Explain two protocols to enhance cellular networks capacity?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!