1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
3 years ago
10

Deon is required to provide the citation information for his sources. What type of information should he collect from his source

s?
Author name, title, date of publication, date of access, URL
Connections to background information
Interesting facts and statistics
Notes on important information
Computers and Technology
2 answers:
shtirl [24]3 years ago
7 0

Answer:

The correct answer is: Author name, title, date of publication, date of access, URL

Explanation:

When you cite some information in your search or report work, you have to provide author(s) name who published the paper, book or content, title of publication, date of publication, date of access (when you access this information) and URL for that publication.

However, other options as mentioned in the question are not required for citation. For example, a connection to background information is not required. when you will cite you some information with a valid source of information, if the reader wants to know more about background information that you have cited, then he can access this citation using URL to read more about it. However, you can mention important information about the source in your paragraph in text format but you can't put important information while citing the source.

For example, if you want to insert citation information about published research paper in MS word.

1. Go to the Reference tab in the ribbon

2. In the group of "Citation and Bibliography" click insert citation

3. As you click on Insert Citation, a new popup window will open

4. Click on Add new source

5. Create Source window will open

6. Provide the citation information such as Authors name, Title, Publication date, Access date, Journal name (if the type of source is journal)

7. Click ok

you will see in your document citation will be inserted there where you want to insert.

Natasha_Volkova [10]3 years ago
3 0

Answer:

a

Explanation:

You might be interested in
he IT director asks you to verify that the organization's virtualization technology is implemented securely. What should you do
Kamila [148]

Answer:

Check that virtual machines have always had the upcoming services packs as well as patches set up.

Explanation:

  • Among the very most essential preventive measures, you could even begin taking would be to download the application security relies on upon and splotches. The whole principle applies to routine OS, implementations as well as virtualization software.
  • It would not be appropriate for software applications to have been multihomed even though it will not seem to significantly boost their protection.
  • Penetration testing is being managed to complete before the implementation of virtual servers. Subnetting isn't necessary for virtual servers, and while it may improve safety. It must be factored into the equation during most of the capacity building phase.
7 0
3 years ago
Trish has bought a new computer, which she plans to start working on after a week. Since Trish has not used computers in the pas
Elenna [48]
Go on the windows sign and type in run and then type temp and %temp% or prefetch
8 0
3 years ago
Read 2 more answers
nswer the following questions concerning chapter 1:1.1 Which pair of layers are NOT peer layers?a.Transport layer in the sender
frosja888 [35]

Answer:

b.Transport layer in the sender and application layer in the receiver

Explanation:

A peer layer communication is usually used to describe the interactions of different layers among one another in the presence of system communication. If there is a single system, there will be approximately two neighboring layers such that one layer is below while the other is above. Therefore, the answer is option b.

8 0
3 years ago
You will create two classes, one for a box and one for a triangle. Each of the figures, the box and the triangle, will have an o
Softa [21]

I believe it should be

6 0
3 years ago
What is the name of a statement written to retrieve specific data from a table?
Shkiper50 [21]
The answer is b.record
4 0
3 years ago
Other questions:
  • If there is no index.html file in the root folder nothing will be displayed when you navigate to the site address
    14·1 answer
  • Claire wants to be a digital media coordinator. What requirements does she need to fulfill in order to pursue this career?
    6·1 answer
  • In Windows Server 2016, what must be running to allow you to manage a server remotely with PowerShell?
    14·1 answer
  • What online resource name does a major University end with
    7·2 answers
  • What type of control repairs the effects of damage from an attack? Physical control Technical control Corrective control Logical
    5·1 answer
  • Creating a Graphical User Interface in Java
    11·1 answer
  • Identify the type of error described
    6·1 answer
  • To override a method in a subclass, the method must be defined in the subclass using the same signature and compatible return ty
    12·1 answer
  • Question #2
    15·2 answers
  • After you have located a program name from the Start menu, in order to create a shortcut on the desktop.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!