You are going to buy a computer, but first you want to do some research to help you select the best model for your need. Where should you look for the fairest and most reliable information?

A. Advice from a salesperson in a computer store who earns commissions on sales.
B. The website of a popular computer company.
C.An independent consumer education website that reviews and rates computers.
D. Advertisements that a computer company puts in a computer magazine.

Answers

Answer 1
The answer to this question is c
Answer 2

The thing that you should look for is an independent consumer education website that reviews and rates computers.

What is a computer?

A computer is commonly described as an electronic machine that often makes our work easy and fast.

Based on the above scenario,  one should look for the fairest and most reliable information as it pertains to  an independent consumer education website that reviews and rates computers and thus one will have a reliable source.

Learn more about computer from

https://brainly.com/question/24540334

#SPJ2


Related Questions

Which of the following things should you do first when planning your career?

A. Have a mock interview with a family member or friend.
B. Sign up for an internship.
C. Apply for as many jobs as possible.
D. Make a list of your job preferences and skills.

Answers

Definitely D, if you want a career that will make you happy you should make a list of your job preferences and skills

Answer:

D. Make a list of your job preferences and skills.

Explanation:

When planning your career the first thing you need to do is to make a list of your job preferences and skills because before deciding your career plans you have to find out what you like and what are you good at to be able to choose a career in which you will be able to be successful and then, plan your next steps to accomplish your goal.

Aaron wants to download a new program from the internet and install it on his computer. What is the safest way for him to do this

Answers

First, ask friends and family if they have gotten infected by a possible virus (It is most common on .exe files)
Seccond, use a file scanning service like spybot or Avast to check to see if the file is infected, if so, delete it ASAP
Third, good luck with web safety

Which error produces incorrect results but does not prevent the program from running?

Answers

The logic error produces incorrect results but does not prevent the program from running. The other name for the logic error in computer programming is bug. When present , this type of error does not terminate (crash) the program, but cause the program to operate incorrectly. Bugs are very hard to find in a program. 

Modern ssds use a technique called "____" to spread write operations around the storage medium, thus evening out the impact of destructive writes and extending the storage device's useful life.

Answers

The question above has multiple choices as below;

a.      Wear aggregation.

b.      Wear mitigation.

c.      Wear prevention

d.      Wear leveling

The answer is d) Wear leveling.


This technique by some SSD controllers to increase the memory’s lifetime is called wear leveling. The mechanism for this principle is simple: distribute the entries for all the blocks evenly so that they will wear out evenly. Flash controller typically manages wear leveling and uses a wear leveling algorithm to control which physical block to use.







What is the maximum amount of memory that vmachine1 can use in its current configuration with startup ram set to 1024 megabytes?

Answers

The answer is 1024MB.

I am really not in a position to answer this question fully since the lab is not provided but according to the research conducted online, the answer is 1024MB. According to the book, based on the physical memory installed on the PC, the current system shows 1.06GB which is equivalent to 1060MB. Thus, it is able to use all 1024MB.






Which best describes which careers would work in offices? Marketing Information Management and Research, Distribution and Logistics, and Marketing Communications and Promotion employees can work in offices.

Answers

Distribution and Logistics. Hope this helps, sorry if i'm wrong.

The best describes which careers would work in offices are Answer: a) Marketing Information Management and Research.

Which are pathways withinside the advertising and marketing income and carrier profession cluster?

The advertising and marketing, income, and carrier cluster incorporate seven professional pathways: shopping for and merchandising, distribution and logistics, e-advertising and marketing, control and entrepreneurship, advertising and marketing communications and promotion, advertising and marketing statistics control and research, and expert income and advertising and marketing.

Marketing Information Management and Research, Distribution and Logistics, and Marketing Communications and Promotion employees can work in offices.

Read more about Marketing:

https://brainly.com/question/25754149

#SPJ2

HURRRRYYYY

Which of the following is an example of revolving credit?
A.
A loan that uses collateral
B.
A loan that doesn't use collateral
C.
A credit card
D.
A single-payment loan

Answers

Answer:

C.

A credit card

Explanation: Correct on EDGE 2021

The example of revolving credit is a credit card.

Therefore, option C is the correct answer.

Given,

Example of revolving credit.

Here,

A revolving credit line is a credit account that lets an individual borrow and repay multiple times up to a maximum limit. A revolving credit line is also called a revolving line of credit or a revolving account.

Know more about revolving credit,

https://brainly.com/question/32056870

#SPJ6

If you commit retail theft your drivers license will be ? A. Revoked, B. Suspended, C. Cancelled or D. Restricted

Answers

B.suspended because revoked only happens when it's a felony or reckless,and not cancellations because it would have to be false information.

Your license will be suspended if you commit retail theft

Bailey wants to add file protection to a document she has created. She wants to restrict users from changing the content she has created, while allowing users to add comments about it. What sequence of commands should she click?

File, Permissions, Encrypt with a Password, then enter her password

File, Permissions, Restrict Editing, Editing Restrictions, Comments, Start Enforcement, then enter her password

File, Permissions, Formatting Restrictions, Comments, Start Enforcement

File, Save As, Encrypt with a Password, then enter her password

Answers

Id say (B) File, Permissions, Restrict Editing, Editing Restrictions, Comments, Start Enforcement, then enter her password

However much you may want your reviewers to make comments and suggest changes in a document, there may be times when you want to restrict them from changing the content you have created. To restrict formatting in a document, you can click restrict formatting in the protect section of the review tab and follow the procedure in the answer above.


File, Permissions, Restrict Editing, Editing Restrictions, Comments, Start Enforcement, then enter her password is the answer

Which attack intercepts communications between a web browser and the underlying computer?

Answers

The question has the below multiple choices

A. Man-In-The-Middle (MITM)
B. Man-In-The-Browser (MITB)
C. Replay
D. ARP poisoning

The answer is B

As compared to the Man-In-The-Middle attack, the Man-In-The-Browser attack intercepts communications between parties to manipulate or steal data. This attack seeks to intercept and steal or manipulate communication that exists between the browser and the underlying computer. It begins with a Trojan infecting the underlying computer and installing an extension into the web browser configuration.







Devin has noticed that his computer now takes much longer to start up than it used to and runs almost every program a bit slower than he feels it should. What is a likely cause of his problem?

A. System is not updated
B. He is missing a patch for this operating system
C. Data has not been backed up recently
D. Too many programs running at start up

Answers

The answer is D) Too many programs running at start up

By default, a computer runs several apps as soon as it boots.However, running too many programs on startup can slow down your computer. These programs will continue running in the background of your computer and will result to the computer running slowly. 

You can use the task manager to stop currently running applications or completely disable programs which are automatically launched upon boot up.






Which soft skill involves the ability to work harmoniously with your colleagues and improve productivity?
A. conflict resolution
B. teamwork
C. strategic thinking
D. presentation skills
E. creative thinking

Answers

B.Teamwork is a soft skill involves the ability to work harmoniously with your colleagues and improve productivity. It is the collaborative effort of a team to complete a task or to achieve a common goal in the most effective and efficient way.  

 


Which specific attribute of a team player helps remove ambiguity from tasks?

Answers

The attribute of a team player that helps remove ambiguity from tasks is clear and effective communication, which includes clarifying roles and expectations to define clear objectives.

The specific attribute of a team player that helps remove ambiguity from tasks is clear and effective communication. A team member adept in clarifying roles and expectations can address a task's ambiguity and define clear objectives. Understanding team design characteristics, such as knowledge, skills, abilities (KSAs), and personality traits, is critical in team formation and ensures that all members are qualified for their roles.

Utilizing knowledge in conflict resolution, motivation, planning, and leadership can significantly bolster a team's effectiveness. Moreover, in circumstances where precise details of assignments may be lacking, team players who can deal with ambiguity by asking the right questions and moving to clarify expectations can help the team overcome barriers and achieve its goals.

Which activity might require you to provide your social security number

Answers

Starting a new job

-------------------

Which of the following is not true about managing your privacy settings? (select all that apply)

Question 3 options:

Someone can find your location based on a photo that you post


The things that you post online become public information


Colleges use social media profiles during admissions process


Items posted online can be removed at any time


Employers screen job candidates based on social medias

Answers

(Items posted online can be removed at any time) You may take it off of the website it was on but that doesn't mean it's gone completely

You disassemble and reassemble a desktop computer. when you first turn it on, you see no lights and hear no sounds. nothing appears on the monitor screen. what is the most likely cause of the problem? explain your answer.
a. a memory module is not seated properly in a memory slot.
b. you forgot to plug up the monitor's external power cord.
c. a wire in the case is obstructing a fan.
d. power cords to the motherboard are not connected

Answers

d. power cords to the motherboard are not connected

Answer:

Option d power cords to the motherboard are not connected

Explanation:

A motherboard is a hardware attached to many components inside the computer such as central processing unit (CPU), memories and peripherals. If the power cords to the motherboard are not connected, there is no way the computer can start and boot the operating system even though the power supply is turned on.

The rest of the options are not true as the computer will still be turned on even if one of those cases happens in reality.

Which answer best describes the Court’s decision? The confession cannot be used, because Alvarado believed that he could not leave. The confession can be used, because Alvarado was not in custody. The confession can be used, because Alvarado thought that he could leave. The confession cannot be used, because Alvarado did not know his rights

Answers

B. The confession can be used, because Alvarado was not in custody. 

Just answered this and got it right

Answer

B. The confession can be used, because Alvarado was not in custody.

Explanation

In criminal law, confession is a statement in which a person acknowledges that he is guilty of committing one or more crimes. If voluntarily given it is admissible as evidence in a criminal prosecution. The trial judges will determine the issues connected and its voluntary state. The confession could be admitted into evidence if the judge determines that it was made voluntarily.



Suppose MV = 60 & PQ = 120. Suppose Q and V are held constant. This means ________.
A. both M & V must double
B. V must double
C. M must double

Answers

The correct answer is C. M must be doubled. The quantity theory of money assumes that both V and Q are stable and hence will be constant. Therefore, when V an Q are constant in the equation MV=PQ, M will be directly proportional to P. Using that theory M must be double for it to be equal to P.

What is a premium?

A. The most you have to pay for health care in a full year.
B. The amount you pay the health insurance company every month for coverage.
C. A fixed fee you pay for specific medical services.
D. The amount you are personally required to pay before you health insurance covers your medical costs.

Answers

Answer:

B. The amount you pay the health insurance company every month for coverage.

Explanation:

The insurance premium is the amount of money that the policyholder has to pay after the insurance contract to formalize the coverage of the risk since once the company charges it it is automatically obliged to comply with the insurance policy.

A medical insurance includes a whole series of services, coverages or benefits that, depending on the option of insurance contracted, may be greater or lesser, so that the contracted health insurance would finally resemble the services that can be found in public health.

The price of the medical policy is therefore the price we will pay for health care insurance and that will be higher or lower depending on the coverage or services that it includes.

All services of a private nature include two conditions fundamentally: on the one hand it is necessary to take into account what is known in most cases as the benefits or services that the products offer.

A premium in health insurance is the monthly amount a policy-holder or their sponsor pays to a health plan for coverage. It is different from a deductible or a co-payment. The correct answer is B.

This cost is typically paid every month.

Here's a breakdown of related terms:

Premium: The monthly amount paid for health insurance coverage.Deductible: The amount you must pay out-of-pocket before your health insurer starts to cover costs.Co-payment: A fixed fee you pay for specific medical services or visits before your insurer pays the remainder.

Based on this, the correct answer is: B. The amount you pay the health insurance company every month for coverage.

What is a partition gap, and how might it be used to hide data?â?

Answers

Partition is a logical drive.  Large disks have to be partitioned in order to be structured. Knowing what partition is, partition gap refers to the unused space between partitions. It is also "Inter-partition space" which can be used to hide data on a hard disk. In this case a disk editor utility is used to access the hidden data in the partition gap.

Answer:

Partition gap is a method in which to create different spaces within a disk so that it is as if there were actually more than one hard disk, something that you can use to store data or install other operating systems.

Explanation:

A partition is the name given to each division present in a single physical data storage unit. To be understood, having multiple partitions is like having several hard drives on a single physical hard drive, each with its file system and working differently.

Partitions can be used for several purposes. On the one hand, you can have one dedicated to saving sensitive data with security measures that do not interfere with the rest of the system, as well as backups, although you can also use it to install different operating systems. In some of them, such as those based on GNU / Linux, you can also structure the disk into partitions for the different types of files used by the operating system and even to hide information.

That is why one of the tasks performed by computer forensics is the investigation of hard disk partitions in search of hidden information.

Which tab provides commands for the most commonly used elements in Word software? File Home Insert Page Layout

Answers

Your Answer would be Home

When a device is having a problem and/or might not be installed properly, which icon is displayed for it in the device manager?

Answers

When a device is having a problem and/or might not be installed properly, the Red X icon  is displayed for it in the device manager. In the Windows device manager this icon means that the device is disable and the hardware has not assigned resources which means that it is not allowed to be used. The Red X icon is used to quickly check the status of a device.
Final answer:

In Windows Device Manager, a device with problems or improper installation is marked with a yellow exclamation mark on its icon, indicating potential issues like missing or incorrect drivers, or hardware conflicts.

Explanation:

When a device is having a problem and/or might not be installed properly, the Device Manager in Windows will display a yellow exclamation mark on the device's icon. This is an indication that the device may have issues such as missing drivers, incorrect drivers, or hardware conflicts. To resolve these issues, you can right-click on the device and select properties to find more details about the problem. In some cases, updating the driver or checking the hardware connections can resolve the issue.

What is the automotive name for the large wires that allow more electrical current to flow ?

Answers

Large wires or measurement? I think the answer might be gauge.

what are the four basic operating principles of the information processing cycle?

Answers

Answer: Input, Processing, Output, Storage

Explanation:

Final answer:

The four basic operating principles of the information processing cycle are input, processing, output, and storage.

Explanation:

The four basic operating principles of the information processing cycle are input, processing, output, and storage.

Input: This is the stage where data is collected or entered into the computer system. It can be done through various input devices such as a keyboard, mouse, or scanner.Processing: In this stage, the computer system processes the data that has been inputted. It performs calculations, manipulates the data, and executes instructions.Output: Once the data has been processed, the computer system produces output. This can be in the form of text, images, sound, or any other form that can be perceived by humans or other devices.Storage: Finally, the processed data is stored for future use. It can be stored in various storage devices such as hard drives, solid-state drives, or cloud storage.

In what decade did the Internet begin to be used widely by the public and not just government entities?

Question 1 options:

1980's


1990's


2000's


2010's

Answers

In the 1980's the internet was open to the public
But it wasn't until the 2000's that it started to be widely used
Your answer is C 2000's
Actually, the answer is the 1990s, not the 2000s
so the real answer is B.

What are two options for using Find and Replace?

Find whole words only and Match case
Match case and Find fragments only
Match language and Show revisions
Find fragments only and Find whole words onl

Answers

Find whole words only and Match case

"use the ______ element to create logical areas on a web page that are embedded within paragraphs or other block formatting elements."

Answers

Answer:

"use the span element to create logical areas on a web page that are embedded within paragraphs or other block formatting elements."

Explanation:

The question is associated with HTML and web pages. As span is a type of function in HTML.<span> element is actually a generic in-line tool/container which is used for content phrasing. Its functionality is much like a <div> element but <div> is a block-level element and on the other hand <span> element is in-line element.

<span> element groups elements for styling purposes, but it does not represents anything inherently.

it is safe to tell an online acquaintance (someone you have never met in person) your
A. Full name
B. Address
C. Phone number
D. Favorite music

Answers

It is safe to give out information that the other user can't use to track you. Generally, these include favorite music, favorite bans, hobbies.

It is never safe to give our personal and identifying information about yourself. This includes your full name (in most cases), place of residence, or any other contact information you may have - such as social media information.

D. Favorite music
Hi!

The correct answer is D. Favorite music 

You never want to share any sensitive personal information to anyone online especially to someone you don't know. Doing so can lead to your identity being stolen and used in ways which can be harmful to you or someone else.

What kind of writing is the product of the information age?
A.Casual writing
B.Cuneiform
C.Microstyle
D.Academic texts

Answers

The real answer is microstyle :)

Answer:MICROSTYLE

Explanation:

What does the CMYK tab let you do

Answers

CMYK means cyan, magenta, yellow, and key (black). They are the four color model used in color printing or printing color images. It lets you subtract the colors on the image. CMYK partially or fully masks colors on a lighter view. 

CMYK stands for Cyan, Magenta, Yellow, Key (Black) and is a subtractive shading model. A subtractive color model works precisely inverse from an added substance shading model (RGB,) it works by somewhat or altogether veiling certain hues from white. 
So as opposed to adding light to accomplish a shading, CMYK is utilizing ink to subtract shine from white. Accordingly, Cyan, Magenta, and Yellow joined is black– the nonappearance of brightness. 
CMYK is likewise a device dependent color mode, yet it is most as often as possible used right up 'til the present time as the principle shading mode utilized as a part of printing, regardless of whether it's blurbs, handouts, business cards, books, or magazines.
Other Questions
H2+I2= 2HI+3 kcal Based on the reaction given above, as the temperature decreases, the formation of the reactants will: A. decrease B. increase C. remained consistent D. indeterminate What is the atomic nucleus made of ?only neutronselectrons only protons nucleons Kelly broke a lamp and was told that she had been bad. later that evening, she was told that her parents were getting a divorce. she thought that her breaking the lamp had caused the divorce. this is an example of what kind of reasoning? You and your friend are selling tickets to a charity event. You sell 4 adult tickets and 11 student tickets for $148. Your friend sells 7 adult tickets and 5 student tickets for $145. What is the cost of a student ticket? Position statements are usually written _____. a. to distract b. to tell a story c. to dishonor d. to persuade Why did conflict in Italy continue even after unification? When in Australia is there not a seasonal climate change?A. QueenslandB. The Northern Territory C. Western Australia D. Outback What four things can happen after a bill has been approved by both houses of congress and goes to the president? how did president franklin d roosevelt increase the powers of the presidency Austin is using a funnel shown to fill a glass bottle with colored sand Estimate the volume of the funnel number 21 please If a person could not digest food anymore, what would probably happen to that person? The hypotenuse of the right triangle ABC shown below is 17 feet long. The cosine of angle C is 35. How many feet long is the segment AC? He utilitarian approach proposes that actions and plans should be judged by their consequences. research reveals that stakeholders who have the ability to affect the company have ________; whereas stakeholders that have ________ have a legal or moral claim on company resources.he utilitarian approach proposes that actions and plans should be judged by their consequences. research reveals that stakeholders who have the ability to affect the company have ________; whereas stakeholders that have ________ have a legal or moral claim on company resources. Two identical parallel plate capacitors A and B connected to a battery of V volts w/ the switch S closed. The switch is now opened and the free space between the plates of the capacitors is filled w/ a dielectric of dielectric constant K. Find the ratio of the total electrostatic energy stored in both capacitors before and after the introduction of the dielectric. The sum of three consecutive even numbers is 48. What are the smallest of these numbers? Jen picked 3/4 of a gallon of strawberries in half an hour. If she keeps picking strawberries at the same rate, how many gallons will she have picked in 2 hours. What's significant about romantic painter John Constable's rural landscapes? A. They're a celebration of the oppressed rising against tyranny. B. They're his commentary on social justice issues of the time. C. They represent life's transience. D. They portray human relationships to nature. Mark for review (Will be highlighted on the Why didn't formal churches benefit from the revivals of the great awakening? what inferences can you draw from the fact that more that 26000 nominations came in for a women to be honored on a new $10 bank note you want to read about Web journals. which keywords would best help you find this information?bookmarkweb Not journalblogsweb or journal