1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zarrin [17]
4 years ago
15

What can you look for on a website to indicate that the information it presents is reliable?

Computers and Technology
1 answer:
dybincka [34]4 years ago
5 0

There are several things you can look for on a website to help you figure out if the information is reliable. The first thing you should evaluate is the audience that the website is intended for. Is it intended for academics? School children? The general public?


The next thing you should look at is the author of the website. Is the author identified? Is the author an expert in their field? Can you establish the author's credibility? Is the author affiliated to an academic institution or credible organisation?


Look at the accuracy of the website. Check for spelling errors, proper grammar, and well-written text. Are there any sources cited? Are those sources credible?


You should also check to see when the information was published. Is the information up to date? Are all of the links up to date and functioning?


There is one last thing you can look at, and this is the domain of the website. Domains like .edu and .gov are more credible than .com or .net domains.

You might be interested in
____ takes the idea of breaking down a program into separate and reusable functions to the next level by focusing on the encapsu
STALIN [3.7K]
The answer is Object-oriented programming (OOP). This is a type of programming language model on the concept of "objects", which may comprise of data, in the form of fields, often known as attributes; and code, in the form of procedures, often known as methods. The first step here is to classify all the objects the programmer wants to work and how they relate to each other, this is known as data modeling. Once an object has been identified, it is generalized as a class of objects which describes the type of data it comprises and any logic sequences that can manipulate it.
6 0
4 years ago
A(n) ________ moves over the spinning platters to retrieve data from the hard disk.
larisa86 [58]
<span>read/write heads should be the answer (:</span>
3 0
3 years ago
Which media device uses the characteristic continuous?
notka56 [123]
The media device that uses characteristics continuous is the Screen.
In Continous characteristic 
is where there is timing relationship between source and destination.
4 0
3 years ago
Write a method named numUnique that accepts a sorted array of integers as a parameter and that returns the number of unique valu
SVEN [57.7K]

Answer:

The method in Java is as follows:

public static int numUnique(int list[]) {  

int unique = 1;  

for (int i = 1; i < list.length; i++) {  

 int j = 0;  

 for (j = 0; j < i; j++) {

  if (list[i] == list[j])  

   break;  

 }

 if (i == j)  

  unique++;  

}  

return unique;  

}  

Explanation:

This line defines the numUnique method

public static int numUnique(int list[]) {

This initializes the number of unique elements to 1

int unique = 1;  

This iterates through the list

for (int i = 1; i < list.length; i++) {

The following iteration checks for unique items

 int j = 0;  

<em>  for (j = 0; j < i; j++) { </em>

<em>   if (list[i] == list[j]) </em><em>If current element is unique, break the iteration</em><em> </em>

<em>    break;  </em>

<em>  } </em>

 if (i == j)  

  unique++;  

}

This returns the number of unique items in the list

return unique;  

}  

3 0
3 years ago
Which of the following would be done outside of a control room?
LenKa [72]

Answer:

a

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Select the correct answer.
    8·2 answers
  • A rectangular box that displays information or a program is called
    13·1 answer
  • 6.67
    5·1 answer
  • What is the most common way for computing systems and devices to authenticate a person’s identity? citi
    10·1 answer
  • A.<br> Post-It note<br> b.<br> notebook<br> c.<br> tutor<br> d.<br> spell check
    14·1 answer
  • A document that summarizes your employment history and qualifications
    9·1 answer
  • Explain the differences between apple and android
    14·2 answers
  • 100POINTS!!!!
    9·2 answers
  • what is the name of the program that enables the device and operating system to communicate with each other?
    7·1 answer
  • Write a program in c# that simulates the roll of two six sided dice.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!