Answers

Answer 1

Answer:

The tendency for humans to spread false information has to do with human behavior; according to research, humans are attracted to events and information that are surprising and new, and, as a result, causes high-arousal in the brain. Besides, motivated reasoning was found to play a role in the spread of fake news.


Related Questions

What ethical concerns might arise from applying new IT to law enforcement?

Answers

Answer:

One ethical concern that might occur is the rise of bias in the police department. It would be possible for a disgruntled or frustrated cop to lean into new IT and be able to take advantage of a past suspect or an "enemy" of theirs such as a neighbor or even a coworker.

Where can you get information on receiving financial help?

Answers

Answer:

You can find financial help on gogle

Pls i need help asap

Answers

Answer:

sorry for that I don't know it's answer sorry

¿Cuántos motores tiene el Toyota Prius y que características poseen?

Answers

Answer:

yo no se busca en gogle amiga

what is memory?
How many type of memory in computer system?​

Answers

What is memory?

Memory is the process of taking in information from the world around us, processing it, storing it and later recalling that information, sometimes many years later. Human memory is often likened to that of a computer memory.

How many type of memory in computer system?

two types

Memory is also used by a computer's operating system, hardware and software. There are technically two types of computer memory: primary and secondary. The term memory is used as a synonym for primary memory or as an abbreviation for a specific type of primary memory called random access memory (RAM).

Hope it helps you my friendHave a great day aheadGood morning friend

question of Computer science​

Answers

Answer:

a)None

b)All

this is ur answer from my opinion

WAP to find the area of cuboid​

Answers

Answer:

from the top make it drop

Explanation:

to find the area

just mesing hear is ur answer

What an RRD in computer?

Answers

Answer: RRDtool (round-robin database tool) aims to handle time series data such as network bandwidth, temperatures or CPU load. The data is stored in a circular buffer based database, thus the system storage footprint remains constant over time.

Explanation:

question of computer sciences​

Answers

Answer:

a ans is cyber crime

b ans is hacking

c ans is cracker

d ans is computer ethics

e ans is phishing

who are your favorite You tubers mine are the Dobre Brothers

Answers

Answer:

mine are H2O delerious and Lazar beam

Explanation:

I enjoy watching watching whatever comes up on my recommended page   :)

What can be done to create new jobs in an economy where workers are increasingly being replaced by machines?

Answers

Answer:

Remove some machine by only giving the machines the works humans can not do and the ones humans can do should not be replaced by robots

advantage of computer

Answers

Explanation:

Computers help increase user productivity, and users become more productive at everything you do on the software running on the computer with a good understanding. For instance, when you have work on an Excel worksheet with a basic understanding, you can create, edit, delete, store, calculation, and print documents and letters. With all pre-existing technologies, all of these things were either impossible or much slower.One of the most useful advantages of computers is able to store and access vast amounts of data, which can be retrieved in the future. For example, a computer system and devices like eBook readers have enough storage capacity as they can store hundreds or thousands of books. Also, you can store movies, pictures, songs digitally, and documents on the computer, and can quickly find data accordingly and share information between devices. It reduces plastics and paper requirements that are used to make non-digital versions of the media.A computer has the ability to connect you to the network or the Internet. Once you connected, you can search for any type of information and can download audio, video, movies, documents, and more.Computers help you to connect with your friend, family, or other relatives with long-distance through e-mail and social networking.

How can get a cup stain off my Chromebook top? Like I tried everything. And I start school on the 1st of September. Plz help me

Answers

Answer:

Try using vinegar or baking soda and water. There's also products for your problem.

when data is collected and turned into information, it is called​

Answers

Answer:

its called data processing

Explanation:

...

Explanation:

When data is collected and turned into information, it is called program .

The specific instructions that a computing device needs to boot up and control the hardware
Motherboard
Hardware
Peripherals
Firmware

Answers

Answer:

Firmware

Explanation:

After 4 years of night school and nearly half a year waiting for the results of the bar examination, you have been admitted to practice law in your state. You decide that you have to keep your current government job while, hopefully, establishing your law practice. To do a first class job for the client, you need first class equipment i.e., good computers and printers, fax machines, etc. You stay late at the office each day to complete work on your pleadings, and you create a database on your computer to keep track of your contacts and cases. Is this an acceptable temporary solution

Answers

Answer:

yes

Explanation:

because it will make the lawyer to keep track of all is client cases without any stress

All keyboards are made up of the main ______ area, the ______ keys and the _______ keys.

A. Typing, Number, Symbol
B. Letter, Number, Control
C. Typing, Function, Control

Answers

Answer:

A.

Explanation:

All keyboards are made up of the main Typing area, the Number keys and the Symbol keys.

What is the role of UPS in Computer security?
4 marks answer​

Answers

Answer:

UPS is used to protect hardware like computers, data centers, telecommunication equipment or other electrical equipment where an unexpected power disruption could cause injuries, serious business disruption or data loss

What are the function of PowerPoint?
10 points please ​

Answers

PowerPoint is a presentation program that allows you to create dynamic slide presentations. These presentations can include animation, narration, images, videos, and much more.

hope this helps <3

Answer:

Powerpoint is a software package designed to create electronic presentations consisting of a series of separate pages or slides.

It allows you to catch your audience's attention using visual effects. PowerPoint is also highly recommended for speakers that may find presentations stressful. One other way that PowerPoint can be important to the presenters is by using the slides as keynotes and control the flow of the presentation.

Explanation:

Hope this helps! Thanks.

a force from water that brings water to your house​

Answers

Answer:

hydroenergy hope that will help you in the future

Which of the following is a necessary step prior to replacing the removable battery pack in a laptop computer?
a. Remove the laptop keyboard bezel, and if needed, remove the keyboard.
b. Verify the computer system is configured in sleep mode.
c. Verify the laptop system is powered off and configured for Ship Mode.
d. Confirm the replacement battery is recommended by the laptop manufacturer.

Answers

Answer:

number c is the correct answer

Into how many types is qbasic statement classified?

Answers

Answer:

two types

Explanation:

1)numeric variable

2)string variable

State the Limitations of the first generation of computers​

Answers

Answer:

The limitations of the first generation of computer are:-

•The operating speed was very low.

•Power consumption was very high.

•They required large space for installation.

Hope it helps you.

Write a QBASIC program to calculate and display the simple interest.​

Answers

Answer:

see and write

Explanation:

cls

start

enter"principle"

enter"time"

enter"rate"

p×t×r/100

display result(output)or ans

stop

Manufacturing, transportation, communications, advanced very quickly.
Education improved


A. middle age
B. renaissance
C. industrial revolution
D. information

Answers

Answer:

renaissance

Explanation:

which type of software is created on user dimension​

Answers

Answer:

Application and system software is created on user dimension.

what is a compter crime?​

Answers

Answer:

Cy***rcrime, also called computer cr**me, the use of a computer as an instrument to further illegal ends, such as committing fr4ud, traf**icking in child por****graphy and intellectual property, stealing id

If your computer won't connect to the internet, which of these is most likely to be the problem?

Answers

Answer:

nic is the answer.... .....

help me to solve please​

Answers

Explanation:

Pendrive - small external hard disk

ROM - read only memory - cannot be changed info

printer - produces the hard copy output

mouse - points and selects GUI

ALU - mathematical calculations

Answer:

Explanation:

mouse:points and selects GUI objects.

printer:It produce the hard copy output.

ALU:performs mathematical calculations.

ROM:the instructions stored in it can not be

changed by user.

Pendrive:it can be considered as a small external

hard disk.

What are the main reason for incerasing cyber crime?​

Answers

Answer:

Let's explore three of the key factors that compromise cyber security and increase the likelihood of cyberattacks.

Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security. ...

System vulnerabilities. When cybercriminals spot a weakness, they pounce on it. ...

Assessing risk.

Answer:

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.3.Assessing risk.

1.Lack of security assistance. Too few people are aware of the simplest steps to increase cyber security.2.System vulnerabilities. When cybercriminals spot a weakness, they pounce on it.3.Assessing risk.please brainlist

Other Questions
Solve for x.XI need the. Value please what are the different types of migration you buy 4 video tapes for 14.99 each and 3 dvds for 19.99 each find the total cost of the movies The answer if any body knows it Multiply -7/-6 x 7 x 1/3 write in simplest form what were the major divisions of the old Roman empire? where was each located? write each fraction number as a decimal write each fraction number as a decimal -7 8/45 WILL GIVE BRAINLIEST AND 100 POINTSPROJECT: COMMUNICATION LOGHow many times do you communicate with someone each day? What kinds of communication do you have most often? This project gives you an opportunity to answer these and other questions about your communication habits.OBJECTIVESMonitor, analyze, and classify communication interactions.List and define the types of communication.VOCABULARYintrapersonal communication with oneselfinterpersonal interacting with one other person or in a small groupsmall group communication interaction between two or more people for the "project" proposed, such as solving problems, sharing ideas and experiences, relating, and exerting influencepublic communication a process by which one person or a group presents a message to another group in a formal mannerperception the process of using our beliefs, thoughts, and observations to gather information about surroundings and peopleVocab ArcadeInstructions:Keep a log of the different types of communication activities in which you engage during the rest of the day. Categorize each activity according to the type of communication it was and the purpose(s) of the communication. Report your findings in the space provided below.Be prepared to discuss your findings with your teacher or fellow students. Consider the following questions in light of your report:Did the variety of communications surprise you?Did you find that you were more involved in one type of communication than others?Which one(s) were you most involved in, and why do you think it happened that way? Carolyn's therapist told her to relax and spontaneously say whatever thoughts or images came to her mind. Her therapist was using the psychoanalytic technique of: Governments are important because _____.1. they control every aspect of the population2. they eliminate the need one for participation in national decisions3. they enforce rules that control conduct within a population Compare and Contrast: Myths and Cultures (Continued)Short WritingActivePromptWrite an analysis that compares one important feature and contrasts one important feature of the cultures of two myths.Select the links below to view the readings for referencebeThe Raven and the First MenThe Mon What is the relationship between the 6s in 675,002 and 385,621? If a = b, then a^2 = b^2What is the proof of this statement? Write the vector in component form. 4. A craft store offered sewing classes on 12 of the 30 days in November.What decimal is equivalent to the fraction of days in Movember that classes wereoffered at the restaurant?A0.4C. 0.5B.0.6D. 0.3 What is How are you formal in spanish help ------------------------- Which sentence is more formal?There are some things that Ms. Anderson wants to bring up at the next citycouncil meeting.Ms. Anderson has several important proposals to discuss at the next citycouncil meeting. Need help coding this three times the difference of a number cubed and 10 in algebraic expression