1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
3 years ago
10

Deon is required to provide the citation information for his sources. What type of information should he collect from his source

s?
Author name, title, date of publication, date of access, URL
Connections to background information
Interesting facts and statistics
Notes on important information
Computers and Technology
2 answers:
shtirl [24]3 years ago
7 0

Answer:

The correct answer is: Author name, title, date of publication, date of access, URL

Explanation:

When you cite some information in your search or report work, you have to provide author(s) name who published the paper, book or content, title of publication, date of publication, date of access (when you access this information) and URL for that publication.

However, other options as mentioned in the question are not required for citation. For example, a connection to background information is not required. when you will cite you some information with a valid source of information, if the reader wants to know more about background information that you have cited, then he can access this citation using URL to read more about it. However, you can mention important information about the source in your paragraph in text format but you can't put important information while citing the source.

For example, if you want to insert citation information about published research paper in MS word.

1. Go to the Reference tab in the ribbon

2. In the group of "Citation and Bibliography" click insert citation

3. As you click on Insert Citation, a new popup window will open

4. Click on Add new source

5. Create Source window will open

6. Provide the citation information such as Authors name, Title, Publication date, Access date, Journal name (if the type of source is journal)

7. Click ok

you will see in your document citation will be inserted there where you want to insert.

Natasha_Volkova [10]3 years ago
3 0

Answer:

a

Explanation:

You might be interested in
The _____________ RTN describes the overall effectof instructions on the programmer visible registers
mart [117]

Answer: Concrete

Explanation: Concrete RTN(register transfer notation) is a RTN that uses a certain set of registers and buses that are real for the completion of abstract RTN verdicts effect.They deal with the abstract RTN also for the registers transfer .They give the idea of the transferring of registers on the programmer's side and then defines the effect of it.

6 0
3 years ago
When defining a class, it is a best practice to declare ____ as private. constructors mutators nothing should be private accesso
katrin [286]

Answer:

The answer is "variables".

Explanation:

It is necessary to declare a variable privately when declaring a class because the private variable 'protects' the code while it is in operation. It may not aim to protect it at this stage from changing the codes themselves for other developers. Its purpose of the so-called "data hiding" is to hold the internal data from many other classes using the class protected.

6 0
3 years ago
A student should always read the directions to a test or question so they know what is expected of them when answering the quest
Kay [80]

I don't know why you needed to ask this but the answer is True

7 0
3 years ago
Read 2 more answers
Jim is an experienced security professional who recently accepted a position in an organization that uses Check Point firewalls.
Contact [7]

Answer: D) CCSA

Explanation: THE CHECKPOINT CCSA(CERTIFIED SECURITY ADMINISTRATOR) is a computer based certification offered by different Computer Institutions in order to equip computer experts or systems engineers on the activities or process or knowledge needed to enhance the security domain of computer systems.

Check Point Firewall is a component of the Software Blade architecture which provides advanced firewall features like VPN and mobile device connectivity.

5 0
4 years ago
What is the origin of the name “breadboard”?
8090 [49]

Answer:

Originally the word referred to a literal bread board, a polished piece of wood used for slicing bread. In the 1970s the solderless breadboard ( a.k.a. plugboard, a terminal array board) became available and nowadays the term "breadboard" is commonly used to refer to these.

7 0
4 years ago
Other questions:
  • An “evil twin” in the context of computer security is: a) A virus-laden attachment that looks just like a sincere attachment b)
    5·1 answer
  • A(n) _____ uses spatial and nonspatial data and specialized techniques for storing coordinates of networks of lines (roads, rive
    8·1 answer
  • Using data from the BITS database, define a view named TopLevelClient. It consists of the number, name, address, balance, and cr
    9·1 answer
  • Compare and contrast fair use to copyright.
    5·1 answer
  • A Homecoming Crossword Puzzle
    12·1 answer
  • Which UML relationships should be used between a subclass and a superclass? For example, suppose there is an interface or abstra
    5·1 answer
  • What determines the number of times that a condition-controlled loop will repeat?
    9·2 answers
  • Weird canvas submission, I’ve done directly what the directions say to do to submit it, but it won’t submit
    15·1 answer
  • You text file begins with the following rows. The pattern is a description of the item to be repaired, its color, and the issue.
    14·1 answer
  • Mark just finished reading the cay and must write a book report comparing events in the book to events in his life. based on eac
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!