1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gogolik [260]
3 years ago
7

If you quote an author from a website in a paper, it will be important to create a _____ in your writing to give them credit for

their work.
caption
citation
macro
merge
Computers and Technology
2 answers:
Alja [10]3 years ago
7 0
It would be a Citation
Phoenix [80]3 years ago
3 0

Answer:

citation

Explanation

you are supposed to cite the author, so it would be citation

You might be interested in
data is transmitted in plain text. this is a: group of answer choices brute force attack session hijacking dictionary attack cry
Anton [14]

The data that is transmitted in plain text is option D: cryptographic failure.

<h3>An established plain text only assault is what?</h3>

The known-plaintext attack (KPA) is a cryptanalysis assault type where the attacker has access to both the encrypted and plaintext versions of the data (also known as a crib) (ciphertext). These can be used to reveal additional hidden information, including code books and secret keys.

Therefore, Plaintext in the context of cryptography typically refers to unencrypted data that is being prepared for input into cryptographic techniques, typically encryption algorithms. Typically, unencrypted data transmission or storage falls under this category.

Learn more about data transmission from

brainly.com/question/10564419
#SPJ1

5 0
1 year ago
If a student is looking for the degree symbol (°) and it is not found on the main drop-down of symbols, what should the student
monitta
The student should attempt to hold down the alt key, then enter 248 on the number pad and then release the alt key. Like so: °
5 0
3 years ago
Read 2 more answers
Which of the following are computer safety techniques? Check all of the boxes that apply.Identify Computer Safety Techniques:
zvonat [6]

Answer: Protect the system with a password  

               Use spam protection.

               Avoid using questionable software.

               

Explanation:

4 0
3 years ago
:3 11 points!
Lady_Fox [76]

Answer:

If it's for school idk but I have a brothers printer and it has worked since 2009

Explanation:

7 0
3 years ago
Lindsay owns a candy store that typically makes all if its sales to tourists visiting a nearby zoo. Why might she decide to set
AVprozaik [17]
B and A. Both answers are correct
3 0
3 years ago
Read 2 more answers
Other questions:
  • How many total numbers can be represented with an 8-bit binary (base-2) system?
    9·1 answer
  • What is the output of 1101×10==11000+10
    13·1 answer
  • Quick Search lets you refine or narrow your search results using links on the right side of the screen. Do a search on nano-mate
    12·1 answer
  • Question 4 / 5
    11·1 answer
  • Microsoft's
    8·1 answer
  • We define the following terms:
    11·1 answer
  • Use the variables k, d, and s so that they can read three different values from standard input--an integer, a double, and a stri
    15·1 answer
  • If you were required to give a speech identifying the risks of using computers and digital devices, which group of items would y
    7·1 answer
  • Sean works for a company that ships hospital equipment. He needs to calculate the weight of the items being shipped. He enters t
    12·1 answer
  • Why might an algorithm created to assist in hiring decisions be biased?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!