Generally, which website is the most reliable?
A. A.gov site
B. A .com site
C. A wiki site
D. A blog post

Answers

Answer 1
The answer should be A. A gov site. A. com site isn't really reliable because they're usually trying to sell or promote something to you. A wiki site isn't reliable because anyone can add to it incorrectly, same for a blog post.
Answer 2
 A. a gov site gov generally means government.

 


Related Questions

You can use ____ arguments to initialize field values, but you can also use arguments for any other purpose.

Answers

do you need help , i think the answer is right in tha tsentence

Is a list of variable information such as a name and address that is included in a document?

Answers

the Answer is a Data Source

Which component of a computing device drains the battery the fastest?

Answers

The LCD panel of the computing device drains the battery the fastest.This component  drains approximately 43% of the total battery life. Since the display is the biggest power drain in order to maximize the battery life of your computing device you should enable Power saver mode and make sure it's set to turn off the display quickly after inactivity. 

Which ipv6 static route would serve as a backup route to a dynamic route learned through ospf?

Answers

Router1(config)# ipv6 route 2001:db8:acad:1::/32 2001:db8:acad:6::2 200

__ is/are the amount of blank space between lines of text in a paragraph

Answers

Indents? Double Space? one of those

Answer:

The correct answer is line spacing

Explanation:

In your presentation you added a text box to?

Answers

The correct answer would be to - Cite a source

are the ways data represented and transmitted with computers law of nature or law of man?

Answers

The way in which data are transmitted and represented with computers is done through the law of man because it is the man who determines through his technological knowledge the rules that must be established for the introduction and transmission of computational data. The data are represented by the use of codes under norms and lines according to a system of which it is studied and designed with a target.

The standard character code that represents characters from multiple languages using 16 bits is called _____.

Answers

The answer is character encoding.  It is used in a way to represent charaters and in which can be used in different or even in languages that are multipled. This type of character standard uses sixteen bits in order for it to function.

With network management software, a network manager can ____.

Answers

Manage all network resources such as users, computers, printers, rights etc.

A computer ____ is a potentially damaging computer program that affects a computer negatively by altering the way the computer works without the userâs knowledge or permission.

Answers

virus










-----------------------------------

A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.

Answers

Virus                     

Which device should be used for enabling a host to communicate with another host on a different network?

Answers

A router should be used for enabling a host to communicate with another host on a different network.

What is the difference between the RAM and ROM

Answers

ROM is data that is written to the hard drive and is not erased when the comupter is shut off

RAM is temporary data that is erased when the the computer is shut off

An array of strings , names , has been declared and initialized . write the statements needed to determine whether any of the the array elements are null or refer to the empty string . set the variable hasempty to true if any elements are null or empty-- otherwise set it to false .

Answers

#Python

hasempty = False
for name in names:
   if ( not name ):
      hasempty = True
      break  # speed things up

On the home ribbon, what do you use to change the font size of characters in a cell

Answers

The font tab in the home ribbon

Someone who buys a song online and copies it for friends is violating
A)privacy rights.
B)ethical rights.
C)appropriate Internet use.
D)intellectual property rights.

Answers

Answer:

I know

I gave him a 5 star by mistake

The answer is actual D

Explanation:

Music is can be property

Because it can be owned

Leah deals with several file conversions every day.

Answers

That’s not a question but good for her

When operating a computer, a user interacts with
the operating system.
a software license.
the BIOS.
application software

Answers

When operating a computer, a user interacts with application software. Thus, option D is correct.

What is the application software?

An application is a computer software package that performs a specified job directly for an end user or, in certain situations, for another application. It is also known as an application program or application software.

An application can be a single program or a collection of applications. A computer programme that responds to user input and assists users in performing personal, professional, and educational tasks is known as application software.

This programme is frequently useful since it enables you to undertake tasks that express creativity, increase productivity, and improve communication. Application software's main function is to assist the user in doing certain activities.

Therefore, option D is correct.

Learn more about the application software, refer to:

https://brainly.com/question/29353277

#SPJ2

The Astroliner, in theory, eliminates the two solid rocket boosters on the side of the shuttle, and replaces them with a ______________________ which will ____________ the Astroliner off the ground and into the air to about 20,000 feet.

Answers

The Astroliner, in theory, eliminates the two solid rocket boosters on the side of the shuttle, and replaces them with a 747 aircraft. Which will tow the Astroliner off the ground and into the air to about 20,000 feet. 60 years ago,first demonstration of the basic concept of towing an un-powered aircraft behind a powered aircraft and then releasing it for autonomous flight. It was first accomplished with the German ME321 transport glider. 

Which commas is used to combine two or more cells together into one cell

Answers

The command is Merge & Center
This command could be easily found in the toolbar of your excel.
If you execute this command in two different cells, those cells will be merged into one larger cell and the content in that cells will be placed exactly in the middle of the combined cell (measures according to combined cells' length)

Which website can help you find antivirus software?

Answers

McAfee!!! you should get it

The awser is b. i took the testo

Which option helps you choose the design of a slide in a presentation?

A.Slide Layout
B.Shapes
C.Animation
D.Slide Transition

Answers

Hello! The slide transition helps with the transitions of slides and the animation helps out with the words appearing on the screen in a more creative way. Therefore, C and D are out. The slide layout is the part where if you click on it, slide designs are shown for you to choose from. The shapes can be used for design, but it doesn't help if you're looking for the design of a slide. The answer is A: slide layout.

The java compiler is able to find all programmer errors.

Answers

No compiler can do that. Maybe with AI, but that's beyond the scope of a compiler.

Which of the following is not an operating system?



A.Linux


B.Leopard


C.Microsoft Windows


D.Internet Explorer

Answers

D. Internet Explorer is a web browser application.

With a(n) ____ the editor, compiler, and executer are combined in the same application.

Answers

IDE, Integrated Development Environment

Alex is setting up a network for his company's computers. He installs a circuit board into each computer, enabling it to be connected to the network. This circuit board is the _____.

fiber optic
network interface card
network operating system
peripheral

Answers

If it's an ethernet network:  network interface card

A ___________ lists all possible packet switches and gives a next hop for each.

Answers

routing table A routing table is what a network device uses to figure out where packets are supposed to be sent.

Which of these can be considered data?

A.facts


B.information


C.belief


D.all of these

Answers

B.Information
can be considered data

Answer:

B) Information

Explanation:

Information is data

The number of distinct values that can be represented using 5 bits is

Answers

2 to the power of 5, ie., 2^5 = 2*2*2*2*2 = 32.

A cyberbully is someone who invades another person’s privacy by

Answers

Insulting or harassing them over the Internet
intimidating someone online with threats.
Other Questions
Carbohydrate molecules have all of the following bonds except-A.C-CB.C-NC.C-HD.C-O The first step in the oil production process which disturbes natural environments and may result in oil spills is Which needs are being met when a family promotes intellectual development by reading? A. physical needs B. mental needs C. social needs D. emotional needs Change the column heading for the row sum column which represents the total of each type of session, to total number of sessions REALLY NEED HELP PLEASE!!The Smith family rented a recreational vehicle for a seven-day vacation. The cost to rent the recreational vehicle was $560 plus $0.50 per mile. How many miles were driven if the total cost was $1350? What are 2 enlightenment ideas found in the declaration of independence? Please, can i get some help with these question? Can anyone please answer what exactly i should write? All questions.Please Assume that a mutation occurs in a human population that produces a horn (like a unicorn) in the middle of the forehead. further assume that the horn is inherited as a y-linked trait in humans. a man with the horn has a daughter who has a son with a man who has lacks the horn. what is the probability that the horned man's grandson also has a horn? annie dome worked from 8:15 am to 11:45 am and from 12:30 pm to 4:15 pm. How many hours did she work? (include steps on how to do this problem) How many ways can four stamps be attached Vicky went to the store for her mom. She bought a loaf of course bread for $2.73, a bag of cookies for $4.19, and a dozen eggs for $2.97. What was the total cost of the items? Which is a likely result of taking LSD? Which of earth's systems was most affected by fossilized dinosaurs?A. Biosphere B. HydrosphereC. Lithosphere D. Atmosphere list atleast 3 physical properties tha the professor describes of his newly discovered flubber As shown, Suzi starts her hike at an elevation below sea level.whaen she reaches the end of the hike,she still below sea level at -127 feet. What was the change in elevation from the beginning of suzi's hike to the end (Current elevation: -225 feet ) Why did the u.s. change from isolationism to a policy of imperialism during the late 19th century? Solve the system of equations. \begin{aligned} &-6y+11x = -36 \\\\ &-4y+7x=-24 \end{aligned} 6y+11x=36 4y+7x=24 Please help with this equation!!! 30 points!The following equation is shown. [tex] x^{2} - \sqrt{2.5} -l + ( -\pi + z ) = A[/tex]Solve for the variable z. Match the proper definition with the correct category: evolution, mutation, genetic drift, or migration. 8 oranges cost $1 how much do 2 dozen oranges cost? Steam Workshop Downloader