1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anika [276]
2 years ago
9

Why are wiki's not secure​

Computers and Technology
1 answer:
Nookie1986 [14]2 years ago
7 0
Wikipedia is not a reliable source for citations elsewhere on Wikipedia. Because, as a user-generated source, it can be edited by anyone at any time, any information it contains at a particular time could be vandalism
You might be interested in
Describe the conceptual design.
drek231 [11]

Answer:

Conceptual design is the first stage that involves defining a concept.

Explanation:

In the conceptual design phase it is important to understand the needs, doing research and find out how to meet them defining models and plans. In this stage, you have to define the steps you will need to take to develop the design and identify the challenges you may face in order to be prepare.

7 0
3 years ago
Read 2 more answers
If you posted an advertisement for your research study on marriage on the Internet and the couples who responded (i.e., the coup
WITCHER [35]

Answer:

B. volunteer bias.

Explanation:

-Experimenter bias is when the expectations of the experimenter in regards to the outcome are communicated to the participants in any form.

-Volunteer bias refers to a situation in which the people that volunteer to take place in a study doesn't represent the general public.

-Research bias is when the experimenter influence the result to get a specific outcome.

-Social desirability bias is when the people taking part in a study give their responses in a way that is viewed as favorable.

According to this, the answer is that the situation would be an example of volunteer bias.

3 0
2 years ago
What specific database stores local user accounts on local computers, and allows users to sign in to and access resources only o
Yuki888 [10]

Answer:

The Security Account Manager

Explanation:

The Security Account Manager (SAM), This is a database file found in Windows Operating Systems.... Windows XP, Windows Vista, Windows 7, 8.1 and 10 that stores users' passwords. It can be used to authenticate local and remote users. It is  an important and vital component of how Windows stores passwords locally on the computer.

5 0
3 years ago
Create a presentation on “Pets” and customize your presentation in the following ways:
DaniilM [7]

Answer:

I used Microsoft PowerPoint 2010 to create my presentation. I created five slides on the topic of “Pets” and then customized the presentation.

Theme: I selected the Hardcover theme from the Design tab.

Slide Master: The Slide Master consists of all the design elements that I want for my slides. Therefore, I used the Slide Master option from the View tab. It gave me a view of all my slides in the form of thumbnails (on the left side) as Master Layouts. From the thumbnails list, I clicked on the top-most one (larger thumbnail) to edit it. On this master slide, I changed the background design, color scheme, and positioning of the placeholders.

Animation: There were certain slides for which I wanted to add animations. I individually selected those slides and clicked on the Animations Tab. I selected the Zoom animation style for the entry and exit of my text for particular slides.

Slide Layout: Within my presentation, I wanted a slide (slide number 5) to stand out from the rest. This slide would talk about the various pet stores in the vicinity. First, I used the Insert Layout option while being on the Slide Master view. Next, I used the Insert Placeholder option and selected Picture. Then, I had to drag the cursor to create a placeholder on the slide. I right clicked the thumbnail of this new slide and selected Rename Layout to change the name of this custom layout to “Pet Stores.”

Explanation:

This is the answer for Plato

5 0
3 years ago
A technician needs to configure wireless Internet access in an open warehouse environment. After installing the equipment, the t
ValentinkaMS [17]

Answer:

Change the antenna placement.

Explanation:

At times, varying signal strengths can be as a result of wrong antenna position. However, this can be addressed by changing the position of the antenna.

4 0
3 years ago
Other questions:
  • Sleeping is an effect of _______ , but agitation may cause a person to wake up
    7·2 answers
  • Checking tire pressure should be performed:
    11·2 answers
  • Draw a project network from the following information. What activity(ies) is a burst activity? What activity(ies) is a merge act
    7·1 answer
  • Which type of graph or chart will you use to show changes in data points?
    5·1 answer
  • Jabari is writing a program which prompts a user for a value with a decimal. Which function should he use? float() int() print()
    9·2 answers
  • Suppose barriers to entry exist in the telecommunications industry. This best describes a _____ market.
    12·1 answer
  • Among the following, which is the best protection against ransomware?
    8·1 answer
  • When troubleshooting firewalls, you should never attempt to repeat the problem because you could do more damage. T/F
    6·1 answer
  • WILL GIVE MORE POINTS, PLEASE HELP!!!
    11·1 answer
  • .WAP to enter monthly sale of Salesman and give him commission i.E. If the monthly sale is more than 500000 then commision will
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!