Answers

Answer 1

Answer:

The tendency for humans to spread false information has to do with human behavior; according to research, humans are attracted to events and information that are surprising and new, and, as a result, causes high-arousal in the brain. Besides, motivated reasoning was found to play a role in the spread of fake news.


Related Questions

What is the role of UPS in Computer security?
4 marks answer​

Answers

Answer:

UPS is used to protect hardware like computers, data centers, telecommunication equipment or other electrical equipment where an unexpected power disruption could cause injuries, serious business disruption or data loss

EXERCISE
Fill in the blanks for the following sentences. (Note: This exercise will not be graded and does
not have to be handed in.)
1. The physical parts or components of a computer 2system is called
2. The provides access to the Internet, may also be internal.
3. The contains the computer's "brain," the central processing unit (CPU).
4. Software that instructs the computer how to run applications and controls the display/keyboard
is know as the
5. A/An is a series of instructions or commands that a computer follows; used to create
software

Answers

1. Hardware

2.lan

3. cu

4.utility software

5.A

What do earthquakes and tsunamis have in common?

Answers

Answer: They modify the earth's surface

Explanation:

It was the correct answer on QC. Hope this helps

Energy is released as an earthquake whenever these tectonic plates glide over, under, or past each other at the fault lines where they meet. Tsunamis are ocean waves caused by undersea earthquakes.

What are tectonic plates?

Tectonic plates are fragments of the Earth's crust as well as topmost layer mantle, collectively known as the lithosphere.

The plates are approximately 100 km thick and are made up of two types of material: oceanic crust (also known as sima from silicon and magnesium) and continental crus.

Tsunamis are ocean waves caused by: large earthquakes near or beneath the ocean Eruptions of volcanoes Landslides beneath the sea.

Large amounts of debris fall into the water during onshore landslides. Because these waves are not caused by tides, scientists avoid using the term "tidal wave."

When these tectonic plates glide over, under, or past each other at the fault lines where they meet, energy is released as an earthquake. Tsunamis are ocean waves caused by earthquakes beneath the sea.

Thus, this is the similarity between earthquake and tsunami.

For more details regarding tectonic plates, visit:

https://brainly.com/question/16944828

#SPJ2

write about the various components of Windows operating system​

Answers

Answer:

The main components of the Windows Operating System are the following:

Configuration and maintenance.

User interface.

Applications and utilities.

Windows Server components.

File systems.

Core components.

Services.

DirectX.

Explanation:

A web ______ makes a web page available to a browser that requests the page to view.

A. specializer
B. breaker
C. candidate
D. server

Answers

Answer:

D.  server

Explanation:

It is true or false Nowadays computer games are mostly available on external hard disk.​

Answers

Answer:

false

Explanation:

because we're playing it on a mobile phone and a laptop than the hard disk. the hard disk is so old to use it nowadays.

compare computer memory sizes during the 5 computer generation periods​

Answers

Answer:

The term "fifth generation" was intended to convey the system as being advanced. ... Whereas previous computer generations had focused on increasing the number of logic elements in a single CPU, the fifth generation, it was widely believed at the time, would instead turn to massive numbers of CPUs for added performance.

Explanation:

Refer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator

Answers

Answer:

Explanation:

https://examict.com/refer-to-the-exhibit-baseline-documentation-for-a-small-company-had-ping-round-trip-time-statistics-of-36-97-132-between-hosts-h1-and-h3-today-the-network-administrator-checked-connectivity-by-pingi/

how is computer in each generation distinguished from each other​

Answers

Answer:

By the electrical current flowing through the processing mechanismsWhy do scientist believe the storm is so severe.

Answer:

Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies.

Explanation:

[tex]\sf{}[/tex]

♛┈⛧┈┈•༶♛┈⛧┈┈•༶

xd ... ;)

Difference between pointer and cursor

Answers

Answer:

The difference between Cursor and Pointer. When used as nouns, cursor means a part of any of several scientific instruments that moves back and forth to indicate a position, whereas pointer means anything that points or is used for pointing. Cursor is also verb with the meaning: to navigate by means of the cursor keys.

Explanation:

Hope it helps you

Into how many types is qbasic statement classified?

Answers

Answer:

two types

Explanation:

1)numeric variable

2)string variable

____ is a technology that exists inside another device

Answers

Answer:

Embedded technology is a technology that exists inside another device.

Answer:

Embedded

Explanation:

An embedded system is a combination of computer hardware and software designed for a specific function.

What are general purpose computer and special purpose computer?​

Answers

Answer:

General purpose computers are designed to be able to perform variety of tasks when loaded with appropriate programs, while special purpose computers are designed to accomplish a single task.

Answer:

general purpose computer are designed to be able to perform variety of task when loaded with appropriate program.

special purpose computer are design to accomplish a single task.

what is the role of computer in education sector?​

Answers

Explanation:

Computer can improve the student learning and basic skill area. Computers not only improve the learning process, it also increases retention of the students. Effective and adequate teacher learning is an integral element of the successful learning program.

Which event took place in the early 1980s?

The first known hacking attempt occurred.
Hackers used spear phishing.
The internet gained popularity.
Information was shared quickly and easily.

Answers

Answer:

The internet gained popularity.

Explanation:

How many units are considered a full time student at a community college in California?

Answers

Answer:

12

Explanation:

According to Saddleback college located in California;

12 units are considered full-time student status.

You may take as little as 0.5 units or as many as 19.0 units during a single semester. To take more than 19 units you are required to obtain special permission from the Counseling Department.

who are your favorite You tubers mine are the Dobre Brothers

Answers

Answer:

mine are H2O delerious and Lazar beam

Explanation:

I enjoy watching watching whatever comes up on my recommended page   :)

UNIT 1 ACTIVITY

Troubleshooting

Part A

When your friend DaJuan turns on his computer, he hears four beeps. The computer

won't fully boot. DaJuan has a Dell computer with a quad core processor and has

recently upgraded his RAM.

Apply the troubleshooting methodology to help DaJuan understand and resolve his

problem. The steps of the methodology are listed for you. You can write directly on

the write suggestions for DaJuan at each step.

1. Identify the Problem (beeps are key here)

2. Internet Research

3. Establish a Theory of Probable Cause

4. Test the Theory

5. Establish a Plan of Action

6. Implement the Solution or Escalate

7. Verify Full System Functionality

8. Document Findings

Answers

Answer:

all of the above

Explanation:

why is default value use in ms access table ?​

Answers

Answer:

The DefaultValue property specifies text or an expression that's automatically entered in a control or field when a new record is created. For example, if you set the DefaultValue property for a text box control to =Now(), the control displays the current date and time.

1. Fill in the blanks:
a. OSS is the ____ software.
b. Pendrive is also known as _____ drive.
c. Computer is derived from ____ word.
d. Physical part of computer is called ____
e. _____ is the collection of program.​





please help me tommorow is my exam

Answers

Answer:

a) computer software 

b) flash drive

c) Latin "putare" 

d) Hardware

e) software

hope it's helpful

Answer:

a.Computer software.

b.flash drive.

c.Latin "putare".

d.Hardware.

e.Software.

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario

Answers

Answer: I gave 6 you can choose from.

Integrity

Scalability

Quality of Service

Fault of Tolerance

Powerline Networking

Security

when data is collected and turned into information, it is called​

Answers

Answer:

its called data processing

Explanation:

...

Explanation:

When data is collected and turned into information, it is called program .

Released in 1976, the Apple I was Apple Computer's first product.

O True
O False

Answers

False,
The apple was not a computer

life without internet points

Answers

You have to ask a question to get an answer

Direction: Enci
1. UNIVAC is​

Answers

Answer:

UNIVAC is Universal Automatic Calculator.

It was inveted by Presper J. Eckert and John W. Mauchly, in 90' s

Explanation:

[tex].[/tex]

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devices

Answers

Answer:

The show cdp neighbors detail command reveals much information about neighboring Cisco devices, including the IP address, the capabilities, host name, and IOS version. The show interfaces and show version commands display information about the local device.

Show the CDP neighbor's detail command should the engineer use to find the IP address information, hostname, and IOS version of neighboring network devices. Thus option D is correct.

What is a network?

A group of computers combining resources that are available on or offered by network nodes is known as a computer network. To communicate with one another across digital connections, computers employ standard data exchange.

Numerous details about nearby Cisco devices are made available via the show CDP neighbors' detail operation, including that of the Internet address, capabilities, and network address, as well as the IOS version. Details well about the local device is shown using the command show connections and show revision. Therefore, option D is the correct option.

Learn more about network, Here:

https://brainly.com/question/15002514

#SPJ2

The question is incomplete, the complete question will be :

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devicesshow version

show ip route

show interfaces

show CDP neighbor's detail

You are testing a printer you just installed, so you use the operator panel on the printer to print a test page. Later, you use the printer properties on your computer to print a test page. Instead of a normal test page, you receive several pages with garbled characters on them. What is the most likely cause of the problem

Answers

Most likely, you have the wrong driver installed.

TRUE OR FALSE
Mark I was the first working computer.
PLEASE ANSWER FaST

Answers

the answer is false, it was the ENIAC machine
The fast answer is FALSE

What are the main reason for incerasing cyber crime?​

Answers

Answer:

Let's explore three of the key factors that compromise cyber security and increase the likelihood of cyberattacks.

Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security. ...

System vulnerabilities. When cybercriminals spot a weakness, they pounce on it. ...

Assessing risk.

Answer:

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.3.Assessing risk.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.3.Assessing risk.please brainlist

what are some of the opportunities that the stem program offers?

Answers

Science, technology, engineering, and mathematics (STEM) programs open the door to many different careers, including opportunities in engineering, science, and research. STEM professionals can explore diverse fields like aeronautics and biochemistry. Some STEM students also apply their technical knowledge in law, politics, and education.

Information obtained via: https://www.bestcolleges.com/careers/stem/

Other Questions
. Each of the following has 9 as a factor exceptA) 18018 B) 18 081 C) 81 180D) 81 181 What do I need to travel to a foreign country?las fotosel chocolateel policael pasaporte EX1:Chuyn nhng cu sau sang cu bng1. We don't use this kind of cloth to makeshirts.2. My grandmother is knitting a new sweater forme.3. You mustn't use this machine after 5.30o'clock.4. Somebody has taken mybriefcase.5. Tom is writing twopoems at the moment.6. They will hold the meeting before MayDay.7. People spend a lot of money on advertising everyday.8. The teacher returned our written work tous.9. The children are going to organize a surpriseparty.10. She often takes her dog for a walk everymorning.EX2Chuyn nhng cu sau sang cu bng1. Doctor Zhang Jixian found Corona viruses in Wuhan in 2019. Corona viruses2. Dr. Martin Cooper invented the first mobile phone in 1973. The first mobile .3. The law of supply and demand should govern the prices of goods->The prices4. Khac Hung musician composed Ghen co vy song three months ago.->Ghen co vy song 5. My mom watched these films last week->These films..............................................................................................6. They will hold the meeting before MayDay.- The meeting...........................................................................................7. My teacher made us study hard for our exam. -> We were .......8. France presented the Statue of Liberty to the USA in 1876.-> The Statue of Liberty 9. We will plant more trees along this street. -> More trees 10. Huong Tram performs the song Em gai mua very beautifully.-> The song Em gai mua11. They didnt invite Nam and Minh to the party. Nam and Minh 12. They built a big villa near my house.-> A big villa..................................................................13. My sister gave me a new pair of jeans on my sixteenth birthday.-> I..................................................................................................................................14. My father planted that tree in the garden last spring.-> That tree was 15. France presented the Statue of Liberty to the USA in 1876. The Statue of Liberty .16. My mother bought this book two years ago. This book 17. His parents will send him abroad. He will .18. All the students have to take the final exam.The final exam19. They have already finished the homework.The homework ..20. They are going to build a swimming pool in this area next month.A swimming 21. They built this factory two years ago.This factory ...............................................................22. "I dont buy this book., my brother said. My brother said .. .. .. 23. All the students have to take the final exam.The final exam24. People will have to repair all the doors of the old house tomorrow.All the doors.........................................................................................25. The fire destroyed almost all the houses in the neighbourhood. Almost all the houses .. I_____ (be) sorry for the mistake I made.(fill in the blank with correct form of verb given in the blanket). Bradd stands 6km west of a flagpole, and runs towards it with a speed of 9km/h. Pitt stands 5km east of the flagpole, and runs towards it with a speed of 8km/h. At what displacement from the flagpole are they when they meet? If empirical formula and molar mass of a compound is P2O5 and 142 respectively. the molecular formula of the compound will be.... How does modern periodic table explain the cause of periodicity. I just chocked on a hot cheeto, and my throat hurts. 0n0 The Big Bang theory is closely linked to Hubble's discovery that the universe is expanding, which seems to imply that there was a time in the past when the expansion first began. Nevertheless, the Big Bang theory did not gain widespread acceptance among scientists until the 1960s. Why wasn't expansion alone enough to convince scientists that the Big Bang really happened Pls help lsplsplsplsplsplsplsplps YOU WILL GET 100 POINTS!!Y=4+9-16 lin h vic s dng k nng ni trong giao tip ca sinh vin hin nay/ anyone know how to solve these porque arte es tan aburrido? a. Find the value of sin2A, cos2A, tan2A and cot2A when sinA = 4/5 , cosA =4/5, tanA= 3/4 and cotA = 12/13 What is the simplified expression for -3(2x-y)+2y + 2(x+y)?O 8x+yO y-4xO TY- 44O -4x-y Which equation can be used to solve for x in the following diagram? beShe often ............... about being famous.3 Match the words to make sentences.1 He's not very gooda in playing chess?2 Are you interestedb of fireworks3 My sister's really keenc from the one in Brazil!4 I'm afraidd for its red buses.5 Our village carnival is different e at dancing,6 Do you get boredf on music festivals.7. We don't believeg with watching parades?8 London is famoush in monstersthenComplete the text with the best answer, A, B or C. 10 ways how man can use the environment around him 1.1 ActivationLee cuidadosamente el siguiente prrafo acerca de la contaminacin atmosfrica ambiental (contaminantes primarios y secundarios) y responde las preguntas que se te presentan.