Credible sites contain___________information,
a.
Accurate
c.
Reliable
b.
Familiar
d.
All of the above


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer 1

Answer:

C:  Reliable

Explanation:

Credible sites are not always accurate. Credible sites are sites you trust and usually have a resume of being correct.

For example, if you like a news website that you trust and are usually correct, you could say that's a Reliable source.

Answer 2

Credible sites contain "accurate, reliable and familiar" information. this makes the correct answer D: All of the above.

What are Credible sites contain?

A Credible sites includes the date of any information, cite the source of the information presented, are well designed and professional.

Some example of credible site are; the site of an university , while a non-credible site is a site that wants to sell you something by sending you repeated email.

A Credible sites are not always accurate

Also, Credible sites are sites you trust and usually have a resume of being correct.

Hence Credible sites contain "accurate, reliable and familiar" information. this makes the correct answer D: All of the above.

Learn more about the similar question;

https://brainly.com/question/3235225

#SPJ2


Related Questions

Within the the Assignment05.java file, you must define the following static methods. In the main method, you may program any code that wish to test the methods you have been asked to define.
1) Write (define) a static method named displayGreeting, that takes no arguments and returns no value. When this function is called, it should print the text "Hello, and welcome!".
Example:
displayGreeting() will print Hello, and welcome!
2) Write (define) a static method named displayText, that takes a single String argument and returns no value. When this function is called, it should print the value of the argument that was passed to it.
Examples:
displayText("Hello") will print Hello
displayText("123") will print 123
displayText("abc" + "123") will print abc123
3) Write (define) a static method named printTotal, that takes three int arguments. When this function is called, it should print the sum of the three arguments passed to it. This function should return no value.
Examples:
printTotal(0, 0, 0) will print 0
printTotal(0, 1, 3) will print 4
printTotal(100, 23, 2) will print 125
4) Write (define) a static method named getTotal, that takes three int arguments. When this function is called, it should return the sum of the three arguments passed to it as an int.
Examples:
getTotal(0, 0, 0) will return 0
getTotal(0, 1, 3) will return 4
getTotal(100, 23, 2) will return 125
5) Write (define) a static method named getAverage, that takes three int arguments. When this function is called, it should return the average of the three arguments passed to it as a double.
Examples:
getAverage(0, 0, 0) will return 0.0
getAverage(0, 1, 3) will return 1.33333...
getAverage(100, 13, 7) will return 40.0
6) Write (define) a static method named averageLength, that takes three String arguments. When this function is called, it should return the average length (number of characters) of the String arguments passed to it as a double.
Examples:
averageLength("a", "abc", "ab") will return 2.0
averageLength("hello", "goodbye", "monday") will return 6.0
averageLength("wednesday", "tuesday", "monday") will return 7.33
7) Write (define) a static method named lengthOfShortest, that takes two String arguments. When this function is called, it should return the length (number of characters) of the shortest String argument passed to it as an int.
Examples:
lengthOfShortest("abc", "ab") will return 2
lengthOfShortest("hello", "goodbye") will return 5
lengthOfShortest("thursday", "friday") will return 6
8) Write (define) a static method named stringOfStars, that takes one String argument. When this function is called, it should return a String of asterisks (*) that is the same length as the string argument passed to it.
Examples:
stringOfStars("abc") will return "***"
stringOfStars("Hello, world!") will return "*************"
stringOfStars("0123456789") will return "**********"
9) Write (define) a static method named maxStringOfStars, that takes two String arguments. When this function is called, it should return a String of asterisks (*) that is the same length as the longest string argument passed to it.
Examples:
maxStringOfStars("a", "abc") will return "***"
maxStringOfStars("hello", "goodbye") will return "*******"
maxStringOfStars("thursday", "friday") will return "********"
10) Write (define) a static method named midStringOfStars, that takes three String arguments. When this function is called, it should return a String of asterisks (*) that is the same length as the string argument with the length that would be in the middle if the lengths of the arguments were arranged in ascending order.
Examples:
midStringOfStars("a", "abc", "ab") will return "**"
midStringOfStars("hello", "goodbye", "yes") will return "*****"
midStringOfStars("123456", "12", "1234") will return "****"

Answers

import java.util.Arrays;

public class Assignment05{

   public static void displayGreeting(){

       System.out.println("Hello, and welcome!");

   }

   public static void displayText(String txt){

       System.out.println(txt);

   }

   public static void printTotal(int a, int b, int c){

       System.out.println(a+b+c);

   }

   public static int getTotal(int a, int b, int c){

       return a+b+c;

   }

   public static double averageLength(String a, String b, String c){

       return (a.length() + b.length() + c.length())/3;

   }

   public static double getAverage(int a, int b, int c){

       return (a + b + c)/3;

   }

   public static int lengthOfShortest(String a, String b){

       if (a.length() > b.length()){

           return b.length();

       }

       else{

           return a.length();

       }

   }

   public static String stringOfStars(String txt){

       String newTxt = "";

       while (newTxt.length() < txt.length()){

           newTxt += "*";

       }

       return newTxt;

   }

   public static String maxStringOfStars(String txt, String txt1){

        String newTxt = "";

       if (txt.length() >= txt1.length()){

         

           while (newTxt.length() < txt.length()){

               newTxt += "*";

       }

           return newTxt;

       }

       else{

             while (newTxt.length() < txt1.length()){

           newTxt += "*";

       }

           return newTxt;

       }

   }

   public static String midStringOfStars(String a, String b, String c){

       String arr[] = {a, b, c};

       Arrays.sort(arr);

       String txt = "";

       while (txt.length() <  arr[1].length()){

           txt += "*";

       }

       return txt;

   }

   public static void main(String[] args){

       displayGreeting();

       displayText("hello");

       printTotal(1,2,3);

       System.out.println(getTotal(2,2,43));

       System.out.println(getAverage(100,13,7));

       System.out.println(averageLength("a", "abc", "ab"));

       System.out.println(lengthOfShortest("abc", "ab"));

       System.out.println(stringOfStars("abcd"));

       System.out.println(maxStringOfStars("a", "bbbbb"));

       System.out.println(midStringOfStars("aaa","aa", "abcedas"));

       

       

   }

}

I hope this helps!

write a program to find whether the given number of three digits is an integer such that the sum of the cubes of its digits is equal to the number itself. For example, 371 is since 3**3 7**3 1**3

Answers

Answer:

Written in Python

userinp = int(input("Input: "))

strinp = str(userinp)

total = 0

for i in range(0, len(strinp)):

    total = total + int(strinp[i])**3

if userinp == total:

    print("True")

else:

    print("False")

Explanation:

This line prompts user for input

userinp = int(input("Input: "))

This line converts user input to string

strinp = str(userinp)

This line initializes total to 0

total = 0

The following iteration sums the cube of each digit

for i in range(0, len(strinp)):

    total = total + int(strinp[i])**3

This if statement checks if the sum of the cube is equal to the user input

if userinp == total:

    print("True") This is executed if true

else:

    print("False") This is executed if false

How many keys are required, if you are to ensure a secret communication for every possible pair of communicating parties

Answers

Answer:

7140 pairs of key

Explanation:

In calculating the number of pairs of keys required, the formula to be used is

n * (n−1) / 2

So for example, if we're to consider 120 users. This means our n is 120, and thus applying it in the formula would yield the calculation

120 * (120-1) / 2 =

120 * 119 / 2 =

14280 / 2 =

7140 key pairs.

Therefore, we boldly state that be number of pairs of key required is 7140

What type of tool enforces access privileges and helps verify that systems are not being accessed by the unauthorized, or in suspicious ways

Answers

Answer:

Access control tools

Explanation:

Access control tools are used to enforce security measures in the use of computers and computerized systems. These tools ensure that unauthorized people are not allowed to get access to systems or certain places.

Passwords, biometrics, and security tokens are some means that help to regulate access to reserved places and systems. These tools evaluate the identity of users authenticate them and either grant or deny them access to the sites they wish to gain entrance to.

Which type of evidence should victims collect to help officials catch cyber bullies ?

-home addresses
-birthdays
-social media
-usernames user
-passwords

Answers

Answer:

Social media

Explanation:

Social media and usernames user so that they can find them without any problem : D

When Nico di Angelo met Mr. D he talked on and on about what?

Answers

Answer:

his mythologic game

Explanation: idk i think

Answer:

The first time he met Mr. D, he called him "The Wine Dude", which irritated the god, but he forgot about it soon after as Nico complimented him.

Which feature transfers a slide show into a word-processing document?
O Video from Website
O Broadcast Slide Show
O Create Handouts
O Format Painter
Hurry
I need help

Answers

Answer:

Create Handouts

Explanation:

Answer:

C    Create Handouts

Explanation:

IM JUST BUILT DIFFRENT

Question #3
Dropdown
What type of data is the result of each of the following lines of code?

str(2.34)
O float
O this causes an error
O int
O string

int('2')
O float
O this causes an error
O int
O string

float(2)
O float
O this causes an error
O int
O string

Answers

Answer:

string, int, float

Explanation:

just took it. have a good one!

Answer: string, int, float

Explanation: got it right on edgen

Hexadecimal representation of a code word CAB

Answers

Answer:

(434142)16

Explanation:

__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.

Answers

Answer:

Traffic padding

Explanation:

Traffic padding is a way of inserting draw randomly in such a manner that it would be difficult to make traffic analysis by any intruder. It hides the traffic pattern through the insertion of dummy traffic into the network and then the intruder sees it as a different traffic pattern. But what the intruder observes is a cover mode which actually hides the systems real operation mode.

A ____ database is a storage model in which common entities are stored within separate tables that use unique key identifiers to build relationships among these entities. a.network b.hierarchical c.flat d.relational

Answers

Answer:

Relational Database

Explanation:

The above description explains the relational database. Hence, from the list of given options, option D answers the question.

Analyzing each options:

Flat database makes use of text files to store data

Hierarchical database makes use of tree like structure

Network database makes use of nodes

Only the relational database database organize data in form of table

Suppose there are two links between a source and a destination. The first link has transmission rate 50 Mbps and the second link has transmission rate 10 Mbps. If the only traffic in the network comes from the source, what is the throughput for a large file transfer?

Answers

Answer:

10 Mbps

Explanation:

In this situation, the throughput for a large file transfer would be 10 Mbps. This is because in situations where there are more than one entries going into a single destination the throughput will be the lowest transmission rate as this rate would be the one that is bottlenecking the entire transfer. That is because the other links would be able to handle the speed of the lowest transmission rate but the lowest rate cannot handle the speeds of the other links, thus limiting the throughput.

define operating system

Answers

Answer:

the software that supports a computer's basic scheduling tasks.

Answer:

The software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.

Explanation:

Suppose your user entered a weight of 115.6. What will be the result of the following code?

strWeight = input("Enter your weight in pounds: ")
weight = int(strWeight)
print (weight)

115

115.6

116

An error occurs.

Answers

The answer is 115.

An integer cannot contain decimals points and it rounds down to the nearest whole number.

Answer:

An error occurs.

Explanation:

Answer on edge 2020

Which type of competition features many firms, some variety of goods, low barriers to entry, and little control over prices?

Answers

Answer:

Monopolistic competition

Monopolistic competition is characterized by many firms, some variety in products, few barriers to entry, and little control over prices.

Explanation:

Answer: pure competition

Explanation:

Write a function convert (int n, int base) that uses stack to convert a positive integer n to any base between 2 and 9. You may use simple iteration continually divides the decimal number by base and keeps track of the remainder by using a stack. Please use the methods from ADT Stack below. Write a program to test your function.

Answers

Answer:

import java.util.*;

public class DemoStack {

  public static void convert(int n, int base) {

      Stack<Integer> st = new Stack<Integer>();

      int temp = n ;

      while(n !=0) {

         st.push(n % base);

         n = n / base ;

      }

      System.out.printf("The number %d in base %d : ", temp, base);

      while(!st.isEmpty()) {

          System.out.print(st.pop());

      }

  }

  public static void main(String{} args) {

      Scanner sc = new Scanner(System.in);

      System.out.print("Enter number : ");

      int n = sc.nextInt();

      System.out.print("Enter base : ");

      int base = sc.nextInt();

      convert(n, base);

  }

}

Explanation:

Code is written in JAVA.

This code displays:

1) Enter number : 'x'

2) Enter base : 'y'

3) The number 'x' in base 'y' : abcdefg

The Apple iPhone includes a settings menu where you can toggle various accessibility options on or off:
Bold Text
oo
Button Shapes
What is the minimum number of bits that can represent those 2 options?

Answers

The minimum amount of bits that can represent these two options is 2 bits.

The minimum amount of bits that can represent the two options is 2 bits.

What are accessibility options?

This is known to be the various accessibility features such as text-to-speech, etc. that can be found on any system or mobile phones.

Conclusively, there is the use of these features in a lot of technologies as it serves as  assistive technology. Note that lowest amount of bits that can represent these two options above is 2 bits as that is the only lowest point it can go.

Learn more about bits from

https://brainly.com/question/19667078

A computer program checks to see if the user of a software program has clicked on a photo. This is an example of a requirement that can be evaluated in
a string statement.
a goto statement.
a global statement.
a conditional statement.

Answers

Answer:

A conditional statement

Explanation:

I just took the review and got it right

Answer:

A conditional statement

Explanation:

I took the test

Write a program that accepts the names of three political parties and the number of votes each received in the last mayoral election. Display the percentage of the vote each party received.

Answers

Answer:

Written in Python

parties = []

votes = []

total = 0

for i in range(0,3):

    party = input("Party: ")

    vote = int(input("Vote: "))

    parties.append(party)

    votes.append(vote)

    total = total + vote

for i in range(0,3):

    print(parties[i]+"\t\t\t"+str(votes[i])+"\t\t\t"+str(round((votes[i])*100/total,2))+"%")

Explanation:

This declares an empty list for parties

parties = []

This declares an empty list for votes

votes = []

This initializes total votes to 0

total = 0

The following iteration allows user to enter details for party and corresponding votes

for i in range(0,3):

    party = input("Party: ")

    vote = int(input("Vote: "))

    parties.append(party)

    votes.append(vote)

This calculates the total vote

    total = total + vote

The following iteration prints the required details

for i in range(0,3):

    print(parties[i]+"\t\t\t"+str(votes[i])+"\t\t\t"+str(round((votes[i])*100/total,2))+"%")

Anna is a high school senior who plans to go to UT in the fall. Her parents have saved up some money
for her college education, but it will not be enough to pay for her tuition all four years. She does not
believe she will qualify for need based assistance. What advice would you give Anna?

Answers

Since Anna  does not believe she will qualify for need based assistance, the  advice that I would  give Anna is that she should be hopeful and not worry and then I will tell her also that since her parents cannot afford the fees, then she is more than qualified for it.

What is a need-based aid?

If you have a financial need and meet other eligibility requirements, you may be eligible for need-based funding. More need-based aid than what you actually need is not permitted.

Therefore,   the best advice one can give a person who is having financial issues is that they need to be confidence and also have the courage to believe that when they source for college funds, they will get it.

Learn more about assistance from

https://brainly.com/question/26641539
#SPJ1

PLEASE HURRY!!!
Look at the image below!

Answers

The correct answer is overweight

Which programming language hides the complexity of data objects and provides a simplified interface?
A.
machine language
B.
assembly language
C.
procedural language
D.
object-oriented language
E.
RAD

Answers

Answer:

D. Object-Oriented Langauge

Explanation:

Answer:

Your answer is D!

Explanation:

From PLATO!

write a function that will prompt the user for his/her age, // weight, and midicholrean count. Then calculate and return their // jedi level (returns a double). Remember to assign the retuned value // to the variable 'jedi_level'.

Answers

Answer:

Explanation:

Assuming that the jedi_level is calculated by adding the age and weight of the individual and then dividing by the midicholrean count we can use the following Java function to grab all the required info from the user and calculate and return the jedi_level.

public static double JediLevel () {

           Scanner in = new Scanner(System.in);

           System.out.println("Enter age: ");

           double age = in.nextDouble();

           System.out.println("Enter weight: ");

           double weight = in.nextDouble();

           System.out.println("Enter midicholrean count: ");

           double midi = in.nextDouble();

           double jedi_level = (age + weight) / midi;

           return jedi_level;

       }

(100 Points!)
The ___ search engine is the most common in use today.
A Boolean-based
B Crawler-based
C algorithm-based
D government-based

Answers

Answer:

B

Explanation

just did it on egd 2020

Answer:

Crawler-based

Explanation:

Just took the review

Question 3 (1 point)
What function would you use to find the average rating I gave a video?
Count
Max
Sum
Min
Average
I think it's average but I want to double check

Answers

It says average in the question so it’s most likely not that, and is probably min.

: process that monitors system traffic and adds resources as needed, within set limits


: process that allocates tasks to resources to increase efficiency and to avoid overloading any one resource


: process to determine what volume a system can handle by comparing its performance to standards in the industry

Answers

Process that monitors system traffic and adds resources as needed, within set limits : Auto scaling

Process that allocates tasks to resources to increase efficiency and to avoid overloading any one resource:  Load balancing

Process to determine what volume a system can handle by comparing its performance to standards in the industry : Benchmarking

What is performance?

Performance is the measure of how effectively a particular task is done or in other words maximum output can be obtained from the input.

The process which monitors system traffic and adds resources as needed, within set limits is called as Auto scaling.

Process that allocates tasks to resources to increase efficiency and avoid overloading any one resource is known as Load balancing.

Process to determine what volume a system can handle by comparing its performance to standards in the industry termed as Benchmarking.

Thus, all the terms are defined.

Learn more about performance.

https://brainly.com/question/15466511

#SPJ2

Write C11 statements that accomplish the following. (6, 7) a. Declare int variables x and y. Initialize x to 25 and y to 18

Answers

Answer:

int x, y;

x = 25;

y = 18;

Explanation:

Programming language: C++

This line declares both variables

int x, y;

This line initializes x to 25

x = 25;

This line initializes y to 18

y = 18;

Has protection for proprietary software gone too far, as some critics suggest? (b) If not, why? (c) If so, what are the implications for innovation and competition in the computer industry? (d) How can we achieve an appropriate balance between those who hold legal rights to proprietary information and ordinary users who wish to access, share, and communicate that information? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your "theoretical" rationale in support of your responses. (knowledge)

Answers

Answer:

In the clarification section following, the definition of the query is mentioned.

Explanation:

I acknowledge with maybe some opponents that patent security has gone too far. As tech manufacturers say, they already lost a lot of money in future sales in developed countries owing to software piracy. In reality, most consumers living in developed countries also couldn't manage to spend the rates set by certain tech firms, so firms did not lose any actual sales because, even in some developing countries, their pricey tech would essentially not sell mostly on the free market.So then, due to the extremely insufficient need for individuals, the consequences for creativity and competitiveness in the computing industry are restricted. Only the owners of copyright as well as the users with the resources to manage to offer for the pricey software have the opportunity to use it, as both a consequence of increasingly innovating, the market is restricted and weak.We ought to defined as the tendency doctrines: equal use as well as the first sale, to reach an acceptable compromise between someone who has legitimate rights to confidential information against common people who want to view, distribute, and interact the information. The first selling happens after the artist's concept has indeed been purchased out during the first occasion, during which stage the rightful owner loses ownership of the act's work.

In recent times, innovators including adversaries have focused on the use of reverse engineering, supported either by the reasonable-use doctrine of both the copyright Act.

Explain how it would give a potential intruder an additional advantage if he can spend a week stealthily watching the behaviors of the users on the computer he plans to attack.

Answers

Normally, the attack comes from an intruder who already studied the victim's behavior.

> The attacker can create a database from the history of browsing of the possible victim and then create an attack based on the victim's behavior of browsing.

> If the attacker has access to the user directory he can put the executables files in those folders.

> If the wi-fi is not secured, the attacker can check the network in order to spread a possible worm.

It is possible to see that are several ways which the attacker can use in order to obtain more information from the victims. But that depends on how deeply the attacker studied the victim.

If an  attacker had watched the behaviors of the users on the computer and has plans to attack, they can:

What is an intruder in cyber security?

The person called an Intruder is known to be a kind of online vulnerability scanner that is said to be a form of cyber security weaknesses that a person may have an exposed systems and  data breaches.

Learn more about attacker from

https://brainly.com/question/24956493

Lauren and her parents reviewed the lesson information on how to stay safe online. When Lauren told her parents that she had been using the password "Computer1” for all of her online accounts, her mother suggested that she change it.

Why did Lauren’s mother suggest she change her password?

It could be easily guessed.
It contained personal information.
It contained only one number.
It contained too many letters.

Answers

it could be easily guessed , the first one

Answer:

A): it could easily be guessed

Explanation:

I got it right thanks to the other person! give them brainiest, please!

Other Questions
what is 2 divided by 10 plus 5 the hot dog is a sandwich yes or no (a b) c = a (b c) What is the equation of the line that passes through the point (3, 2) and has a slope of - 5/3 What is the first step needed to solve ? (1 point)(03.04 LC)What is the first step needed to solve (3/4)x - 3 = 18Select one:a. Add 3 to both sidesb. Subtract 18 from both sidesc. Multiply both sides by 3d. Divide both sides by 4 Lan mailed a package that weighed 5.63 pounds. What are the first 2 steps in rounding the number to nearest 10th? What is 5.63 rounded to the nearest tenth? PLZ keep it simple for me to understand What can be concluded from the scientist Luis Coloma's statement that the extinction of frogs is "the same magnitude event as the extinction of the dinosaurs?" PLEASE HELP ME ON THIS QUESTION Evaluate 2d + 7e 12 for d = 8 and e = 6.The value of the expression is If one measurement of a golden rectangle is 5.4 inches, what is the other measurement?a.8.737b.7.018c.1.618d.3.782 Find the distance between the two points rounding to the nearest tenth (if necessary).(-9, -2) and (-1,0) Michael reaches the end of his route and slowly comes to a stop, reaching 1 poina final velocity of O m/s and ending his 2 m/s run. If it took him 4 seconds tocome to a stop, what was his acceleration? Don't forget units anddirections if appropriate?Your answer Use a translation rule to describe the translation that is 8 units to the left and 1 unit down1. (x, y) --> (x + 8, y + 1)2 .(x, y) --> (x + 1, y + 8)3. (x, y) --> (x - 8, y - 1)4. (x, y) --> (x - 1, y - 8) Type the correct answer in the box. Spell all words correctly.Convert calories to joules.3 calories is ____ joules 0.158g of barium halide is completely reacted with H2So4 and 0.124g of BaSO4 is collected. Whats the identity of X for this barium halide What event is best represented below?Roosevelt's use of the Sherman Anti-trust ActRoosevelt's feelings towards the League of NationsRoosevelt's attitude towards ImperialismThe United State's position towards World War I Whats the unit rate The graph shows the amount of money paid when purchasing bags of candy at the zoo: A graph is shown. The x-axis is labeled from 0 to 12 and the y-axis is labeled from 0 to 12. The four points are shown on the graph are ordered pairs 0, 0 and 1, 2 and 2, 4 and 3, 6. These points are joined by a line. The label on the x-axis is Bags of candy. The title on the y-axis is Total cost in dollars. What is the constant of proportionality? one-half three-fourths 1 2 hi can yall plzzzzz help meWhat value of n makes this equation true? What are the Articles of confederation?