1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
3 years ago
5

What are three ways you cite evedince

Computers and Technology
2 answers:
dsp733 years ago
8 0
 lets say your trying to sight evidence from document 1
use quotes 
say where the information came from
1)quoting
2)Paraphrasing
3)sumerizing

Wewaii [24]3 years ago
7 0
Page number, title of book, or name of person saying quote.
You might be interested in
When a linked chain contains nodes that reference both the next node and the previous node, it is called a(n)?
Nuetrik [128]

Doubly linked chain

When a linked chain contains nodes that reference both the next node and the previous node, it is called a doubly linked chain. This type of chain is often used in data structures because it provides a way to easily traverse the data in both directions. However, because each node must reference both the next node and the previous node, doubly linked chains require more memory than singly linked chains.

Learn more here:

brainly.com/question/13100699

#SPJ4

6 0
2 years ago
Ms Access is spreadsheet software.True or false​
Doss [256]

Answer: I'd say false.

Explanation: An example of a spreadsheet software would be MS Excel. Access does have an option to create a spreadsheet but it also has other uses.

6 0
3 years ago
Read 2 more answers
What is the first step in devising security services and mechanisms?
N76 [4]

Solution:

The first step in devising security services and mechanisms is to develop a security policy.

A security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.

This is the required answer.

4 0
3 years ago
Read 2 more answers
Create a parameter query where the user will enter a value to use as the criterion
Pepsi [2]
Click in the Criteria row in the InsuranceType column and type [Enter Insurance Type]. Click the Run button. Type dental when prompted. Click OK.
6 0
2 years ago
Marie and Jean-Pierre want to share their work with each other easily to collaborate on a school project. What is the BEST way f
Sedbober [7]

Answer:

Upload the files to an online storage application and give both of them access

Explanation:

Multiple individuals can collaborate on a common files by uploading the shared documents to an online repository and providing access credentials to the documents to both the individuals. The two individuals, Marie and Jean-Pierre in this case, can then take turns to contribute their portion of school project until it gets to the final state ready for submission.

7 0
3 years ago
Other questions:
  • The instant pivot button is displayed in the statistics and visualization tabs when a _______ search is run.
    15·1 answer
  • A) A cable that is mainly used in the cable television network
    11·1 answer
  • I have to make a online presentation, which program is the best
    10·2 answers
  • Given an array of integers and the size of the array, write a function findDuplicate which prints the duplicate element from the
    11·1 answer
  • Given a constant named size with a value of 5, which statement can you use to define and initialize an array of doubles named ga
    12·1 answer
  • Question 1(Multiple Choice Worth 5 points)
    9·1 answer
  • You and a friend have just started a small business. How could you use the Internet to make your business successful?
    15·2 answers
  • The Ntds. dit file is a database that stores Active Directory data, including information about user objects, groups, and group
    7·1 answer
  • Answer for 3.4.8 rectangle code HS
    9·1 answer
  • a) consider the binary number 11010010. what is the base-4 representation of (11010010)2? (there is a way to do this without con
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!