Question: Secondary sources such as credential verification from another facility, copies of a credential verification, or confirmation from a source that verified the credential should only
Secondary sources such as credential verification from another facility, copies of a credential verification, or confirmation from a source that verified the credential should only be used if primary source queries are unattainable.
False
True
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
