1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WINSTONCH [101]
3 years ago
6

While researching ideas for cutting energy costs is his company. Hector watches an online video in which a business expert says,

"Going green puts more green in your wallet". He loves the saying and wants to use it in his report. Which is the best way for Hector to do this?
A). Use the statement as if he made it up; no one will know
B). Put the statement in quotation marks, and identify the source
C). Put the statement in a list of works cited
D). Type the statement on a separate line, and identify the source
Computers and Technology
2 answers:
Nataliya [291]3 years ago
6 0
B. Put it in quotes if it is directly quoted as is and cite the source. You should likely also list the source in the works cited but not the phrase itself.
Akimi4 [234]3 years ago
4 0

Put the statement in quotation marks, and identify the source

~apex

You might be interested in
Which of the following is an example of a consumer service? computer builder motorcycle manufacturer cabinet maker air condition
Zanzabum
Motorcylce manufacturer
6 0
3 years ago
Read 2 more answers
1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your
enyata [817]

Answer:

The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.

It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.

Explanation:

Solution

One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.

The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.

As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options

4 0
3 years ago
If a company gave you a free version of their software and encouraged you to try and improve it and share it with the only commu
dimulka [17.4K]

Answer:

Explanation:

crm

8 0
3 years ago
A blank operates as a standalone device and is shared by multiple users
Sedbober [7]
B.s. Hugh gingham thigh hangman
8 0
3 years ago
Read 2 more answers
Which of the following is a public location that sells Internet access? Internet café Extranet Intranet LogMeIn,
Goshia [24]

Answer:A) Internet cafe

Explanation: Internet cafe is the place that provides the internet service to the public and helps them to access the internet .These cafes can be used by the public who are travelers, people who don't have access at home etc.This internet cafe works on the basis of the hourly rate that it takes from the public.

Rest of the options are incorrect  as intranet and extranet are types of network and LogMeIn is a desktop service .thus, the correct option is option(A).

8 0
3 years ago
Other questions:
  • Explain how buyers and sellers factor into setting the stock price for a company’s shares.
    13·1 answer
  • USB keys can store terabytes of data. Of the five key factors that contribute to the increasing vulnerability of organizational
    13·1 answer
  • What is microsoft excel
    12·1 answer
  • 1. [2 points] Write a function to compute the volume of a sphere, given its radius. 2. [2 points] Write a recursive function to
    7·1 answer
  • In python:
    14·1 answer
  • What is one of the most effective security tools available for protecting users from external threats?
    15·1 answer
  • 4.17 LAB: Varied amount of input data ( C++)
    5·1 answer
  • Customizing ads to people who had earlier visited the site is
    14·1 answer
  • Why we call the standard deviation of the sample statistic asstandard error of the statistic?
    14·1 answer
  • Do yall think I should be lonely and quit life!!
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!