1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NARA [144]
2 years ago
12

13. You're doing research for a paper. When would you use an indirect citation?

Computers and Technology
1 answer:
Whitepunk [10]2 years ago
5 0

Answer:

D

Explanation:

d is the answer

You might be interested in
Discuss how a lack of infrastructure in poor communities could contribute to ill-health such as the Unrest looting.​
shutvik [7]

Answer:No service from hospital for injured people

Explanation:

Yes of course

4 0
3 years ago
An end-user device requires a specific IP address every time it connects to the corporate network. However, corporate policy doe
sesenic [268]

Answer:

DHCP reservation  is the correct answer.

Explanation:

It is the Internet Protocol assignment which is not temporary. It is the particular address of the Internet Protocol within a DHCP set, which is not temporarily assigned to a particular DHCP client for lease use.

So, the device of the last user required the address of the Internet Protocol whenever they linked to the company's server. The following reservation provides the permission to use static addresses of the Internet Protocol without affecting the company's server.

6 0
3 years ago
In excel, combining two or more selected cells into one cell is called ____ cells
n200080 [17]
The answer that would best complete the given statement above would be the word "MERGING". So here is the complete statement. <span>In excel, combining two or more selected cells into one cell is called MERGING cells. Hope this answers your question. Have a great day!</span>
4 0
4 years ago
What problems might you encounter when using the Web for research?
AfilCa [17]

Answer:

b. d. e.

Explanation:

The web is a vast and endless database of information and has become an invaluable resource for research. That being said it can also bring with it many problems, the main one being unreliable content due to undocumented sources, false testimonies, information with no evidence, etc. The amount of false information on the internet can sometimes make it very time consuming since you have to take the extra step of verifying the information you come across. Despite this, the WEB has information on every topic including current news, and with the wide array of search tools available it is very easy to find what you are looking for.

6 0
3 years ago
A(n)
Yuliya22 [10]

Answer:

A(n)  <u>Data Warehouse</u> is a central repository that contains stored or  archived data gathered from multiple databases.

Explanation:

A data warehouse is also database that is considered as central database of the company, where data of whole company is gathered and stored from multiple databases of the company. It also contains the archived data of the company that could be needed in future.

For Example

A company has several branches and franchises, each of place having own database to store the relevant information about that particular platform. The company has its own database that is linked with all platform's databases of the company. This central database is called data warehouse that gathers data from all sub data bases to analyze the operations and services of the company at different places. This database contains archive data of different databases of the company.

7 0
4 years ago
Other questions:
  • What is the difference between a pixel pitch and a dot pitch​
    12·2 answers
  • Illustrate the process of using an operating system to manipulate a computer’s desktop, files and disks.
    12·1 answer
  • What technical elements can a film director manipulate to achieve the final product, conveying his ideology and vision?
    11·1 answer
  • After reading passage “the incredible machine” why do you think the article has been titled so?
    13·1 answer
  • The program evaluation and review technique (PERT) is __________. a. a network-based technique in which there is a single time e
    15·1 answer
  • Defensive driving is when you use driving strategies to minimize risk and help avoid accidents.​
    8·1 answer
  • Explain the 2 types of network topology ​
    10·1 answer
  • Which type of application architecture has a logic tier
    15·2 answers
  • Choose the term that best matches each definition.
    7·1 answer
  • 2.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!