1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rufina [12.5K]
3 years ago
5

Diffreciate between primary source of information and secondary source of information​

Computers and Technology
1 answer:
poizon [28]3 years ago
8 0

Answer:

Primary is firsthand, secondary is viewed through articles and other materials.

Explanation:

EX: Primary account of a story, secondary view through pictures.

You might be interested in
Explain 3 categories of plagiarism​
hammer [34]

Answer:

Direct plagiarism- the word-for-word transcription of a section of someone else’s work, without attribution and without quotation marks

Self-plagiarism- when a student submits his or her own previous work, or mixes parts of previous works, without permission from all professors involved

Mosaic Plagiarism- when a student borrows phrases from a source without using quotation marks, or finds synonyms for the author’s language while keeping to the same general structure and meaning of the original

8 0
2 years ago
Read 2 more answers
Write the UPDATE command to increase the commission (column name :COMM) by 500 of all the salesman who have achieved sales (Colu
lara31 [8.8K]

Answer:

UPDATE COMPANY

SET COMM=COMM + 500

WHERE SALES> 20000;

Explanation:

The update command is used for alter the record in the database management system in the table .The update command command modify the record on the some condition in the table in the database management system.

Following are syntax for using the update command .

UPDATE table-name

SET column name 1,column name 2 .........

Where condition

  • In the given question table -name is "COMPANY" the condition is on the sales column and it update the table only when sales is more than 20000 and set the column COMM by 500.
4 0
2 years ago
NEED HELP RIGHT NOW!!! Which of the following is the definition of a privacy policy? * 5 points - A legal document that an app o
Marina86 [1]

Answer:

A legal document that an app or a website must provide to describe the rules the company and users must obey when they use the app.

6 0
2 years ago
A technique for identifying and tracking assets using technologies such as RFID and smart cards is known as electronic tagging.
Mademuasel [1]

Answer: True

Explanation: Electronic tagging is defined as the activity in which the monitoring of the things and people are done through the electronic markers or device .This process is usually done by attaching a tag sized component on the ankle of the human to monitor them.

The tracking of the good and human is done by production of the time alerts through the tag .Thus the statement given in the question is true.

4 0
3 years ago
Describe the pace of change in ICT
densk [106]

Answer:

Information and communications technology is an extensional term for information technology that stresses the role of unified communications and the integration of telecommunications and computers, as Technology Trends 2016

#1: Spreading intelligence throughout the cloud. ...

#2: Self-managing devices. ...

#3: Communication beyond sight and sound. ...

#4: Fundamental technologies reshaping what networks can do. ...

#5: Weaving security and privacy into the IoT fabric.

Explanation:

look for a question that i have answered answer it and also plz give me brainliest on this one plz

4 0
3 years ago
Other questions:
  • Which major milestones started off the progression that led to the modern computers we play games on now? What do you think affe
    14·1 answer
  • WHAT IS SQL AND HOW CAN YOU MEET THE DATA REQUIREMENTS ALSO MAINTAINING DATA INTEGRITY,AND LASTLY STATE THE FULL MEANING OF SQL
    11·1 answer
  • You are creating a database for your computer club. Most of the students live in your town, Durham. How can you make Durham appe
    11·1 answer
  • A(n) _____ is a computer program that can damage files and programs on your computer.
    6·2 answers
  • Sally needs to copy data from the first worksheet to the fifth worksheet in her workbook. Which combination of keys will she use
    6·2 answers
  • Press the _______ key to move to the next cell in a row.
    5·1 answer
  • Assume phrase= "Peter Piper picked a peck of pickled peppers", What will be returned if phrase.search(/[aeiou]/) is called?
    9·1 answer
  • 1 punto
    11·1 answer
  • Acciones de un lápiz
    7·1 answer
  • What is meant by reflection?​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!