1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
max2010maxim [7]
4 years ago
5

Isaac is researching Abraham Lincoln’s life for a social studies report. He finds an encyclopedia that includes original letters

and articles found in historical journals. The type of source he is using is
primary.
first.
secondary.
tertiary.
Computers and Technology
2 answers:
choli [55]4 years ago
8 0

Answer:

secondary.

Explanation:

In primary soruces we found the sources that were the closest to the events, primary sources would be diary entries or journalistic articles about Abraham Lincoln, since he is not studying that, he is reading from a encyclopedia that has already summarized and interpreted those documents his sources is a secondary source, because secondary sources take the primary sources and study them or summariz them.

cestrela7 [59]4 years ago
7 0
The answer is D) Tertiary because encyclopedias use both primary and secondary sources. 
You might be interested in
Which key should you press to change the cell contents to your typed data ? ​
Andreyy89

Answer:

You should press the Enter key to change the cell contents to your typed data.

Explanation:

4 0
3 years ago
When you record a macro, you can assign it to run from a button or from the _____.
arsen [322]
Depends on what software you use and how you set it up. But yea it’s possible
3 0
4 years ago
Read 2 more answers
What does a close observation of the painting reveal? the people's enjoyment of fishing as a pastime the people's reliance on th
Lana71 [14]
The peoples reliance on the sea industry
6 0
4 years ago
Read 2 more answers
The Government Information Security Reform Act (Security Reform Act) of 2000 focuses on management and evaluation of the securit
krok68 [10]

Answer:

True

Explanation:

In the above scenario about the Government Information Security Reform Act of 2000 is that concentrates on maintaining and evaluating an unidentified and homeland security programs. In other words, It concentrates on the Rights Division for the peoples of the nation by maintaining and protecting the security for the systems of their homelands.

3 0
4 years ago
A company wants to implement a wireless network with the following requirements:
jarptica [38.1K]

Answer:

PEAP is the correct answer to the given question .

Explanation:

The  PEAP are implemented to meet the demands because it is very much identical to the EAP-TTLS design also it includes the server-side PKI authentication .

  • The main objective of  PEAP is to establish the protected TLS tunnel for protecting the authentication process, as well as a server-side encryption authentication.
  • The PEAP  is also used for validating the application it validating her process with the help of the TLS Tunnel encryption between the user and the verification.
  • All the other options are not suitable for the  to meet the requirements of the design that's why these are incorrect option .
3 0
3 years ago
Other questions:
  • Retail price data for n = 60 hard disk drives were recently reported in a computer magazine. Three variables were recorded for e
    13·1 answer
  • What is an activity that can help you enhance the appearance of your computer’s desktop?
    12·2 answers
  • Which item is essential to know before sketching a navigation menu flowchart? template specifics, such as horizontal or vertical
    12·1 answer
  • Write a program that scores a blackjack hand. In blackjack, a player receives from two to five cards. (The player decides how ma
    5·1 answer
  • Write a program that prompts the user to enter the number of integer numbers you need to enter, then ask user to enter these int
    5·1 answer
  • The IT Department already has been testing Windows Server 2012 R2, and some time ago purchased licenses to convert all of its Wi
    14·1 answer
  • Although implementations vary, reader–writer locks usually block additional readers if a lock is already held in read mode and a
    13·1 answer
  • Windows displays a(n)
    11·1 answer
  • Why do we use compliment method?
    13·2 answers
  • When using a self-contained recovery device on a cfc, hcfc, or hfc system with an operating compressor, technicians must?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!