1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentina_108 [34]
3 years ago
10

How will you cite information that is common knowledge in your research paper?

Computers and Technology
1 answer:
bagirrra123 [75]3 years ago
8 0
Unlike quotations or paraphrased ideas, information that's considered "common knowledge" doesn't need to be cited. "Common knowledge" is information that's considered widely known or easily verified. These likely don't need to be cited for the average American audience, since most people will already know or easily be able to verify them as facts.

Common knowledge can change depending on your culture, geographic location, age, or other factors. For example, information about American presidents might be common knowledge in the United States, but might not be common knowledge in another country. 

Common Phrases or Idioms

Common phrases or idioms might be quoted often, but these don't need to be cited. Often, we don't know who first said them, or they've been repeated for so many years that they've become a common part of our vocabulary. The following are some examples of common American English phrases that don't need to be cited.
 

You might be interested in
Type the correct answer in the box. Spell all words correctly. What is the default margin width on all four sides of a document?
Sergeu [11.5K]

1 inch (2.54 cm

the default top and bottom margins were 1 inch (2.54 cm), but 1.25 inches (3.17 cm) were given at the left and the right.

That's standard for document size by default.

7 0
3 years ago
1. How many column can you insert in a MS Word in maximum?
tigry1 [53]

Answer:

63 columns

Explanation:

In Microsoft Word you can insert a table with up to 63 columns, that is the limit to the number of columns allowed in a Word document.

<em>brainliest</em><em>? </em><em>plz! </em>

3 0
3 years ago
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
3 years ago
What is the output of the following program segment?
marissa [1.9K]

Answer:

5

Explanation:

The operator 'x++' is called the post increment operator, it is assign first and then increment.

The operator '++x' is called the pre increment operator, it is increment first  and then increment.

So, both are increment operator which increment the value by one.

initially the value of x is zero,

++x increase the value to 1 and than assign to x.

then, x++ it assign to x first then increment by 1 means x=2

and so on.....

Their are five increment operator are used. so, the result is 5.

3 0
3 years ago
The statistically multiplexed wan technology that is specifically designed to carry multiple kinds of traffic (data and voice is
Flura [38]
To manage and organise multiple kinds of traffic, the wide area network statistically multiplexed technology that could be used would be the ATM. Also known as the asynchronous transfer mode, this type of connection using fixed cells in encoding data with regards to the situational traffic.
5 0
3 years ago
Other questions:
  • With respect to the general classes of computers, a ________ is the most expensive and most powerful kind of computer, which is
    7·1 answer
  • If you wish to maintain a consistent style to all the documents you create, it would be helpful to use a _____.
    10·1 answer
  • Given half a chance other people at work will take advantage of you
    11·1 answer
  • What is one way to measure technological progress?
    5·1 answer
  • Please help I really need it
    7·1 answer
  • What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
    10·2 answers
  • Google Glass, glasses that allow you to take pictures and search online by speaking commands, are introduced at a technology tra
    8·1 answer
  • _________ media must be downloaded in its entirety to the user's computer before it can be heard or seen
    5·1 answer
  • What is gained by increasing the ritation speed of a disk or cd?​
    9·1 answer
  • A health care provider approaches Accenture to help them increase their efficiency through an advanced data science platform.Wha
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!