1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastovalidia [21]
3 years ago
12

When typing the Works Cited in a report, set a .5" ______ indent. *

Computers and Technology
1 answer:
Romashka-Z-Leto [24]3 years ago
8 0

Answer:

Hanging indent

Explanation:

When writing citations, the list of references are formatted using hanging indents. The interpretation of this is that, the first line of the reference will start at the 0" level of the left margin but subsequent lines will start at the 0.5" margin.

To create an hanging indent, you start by highlighting the text on the second paragraph or you set your cursor to the start of the cited text.

Then goto paragraph (under the home tab)

Select indent and spacing

Go to special

Select hanging

Select 0.5"

Click 0k

You might be interested in
One cost of starting your own business is _____.
Harman [31]
One cost of staring your own business is the loan payments on the small business loan.

Revenue is clearly not an issue, and escrow just straight up doesnt make sense.
So our answer is clearly the fact that you have to pay back the loan you took out originally for your business!
4 0
3 years ago
In 1-2 sentences, describe how to use the thesaurus in the Word Processor you have used.
jasenka [17]
Thesaurus is a tool use to find the synonym of the of a word.
Here's the way to use the thesaurus in the word processor.
=> highlight the word, then right-click, Navigate to synonyms and the words will  display.
3 0
3 years ago
Read 2 more answers
What is data called that is input into a cryptographic algorithm for the purpose of producing encrypted data?
labwork [276]
<span>A key is data called that is input into a cryptographic algorithm for the purpose of producing encrypted data. There are two types of cryptography, the public key and the private key. The public key uses public keys to encrypt data and private key uses private key to decrypt data. They are produced by a group of algorithms. </span>
8 0
4 years ago
Heads or tails
Pani-rosa [81]

import random

heads = 0

tails = 0

i = 0

while i < 1000:

   rnd_value = random.randint(1, 2)

   if rnd_value == 1:

       heads += 1

       print("heads")

   else:

       tails += 1

       print("tails")

   i += 1

print("Heads appeared {} times and tails appeared {} times".format(heads, tails))

I hope this helps!

5 0
3 years ago
What is the tendency for an individual to have better memory for information that relates to oneself in comparison to material t
Elena-2011 [213]

Answer:

The answer is "Option c".

Explanation:

The self-reference will affect the appears, that enables the people to transmit data separately, as per their degree of knowledge, If people are willing to identify the information, the frequency of recalling may be increased if it is linked in some way to ourselves, and other options are wrong, that can be described as follows:

  • In option a, It is used to store information for a long time, that's why it is not correct.
  • In option b, It is used for both, input and receives sensory register and the long-term store, that's why it is not correct.
  • In option d, It provides cognitive interference that's why it is not correct.
4 0
3 years ago
Other questions:
  • Two technicians are discussing engine valve timing. Technician A says that the optimum valve timing is found through experimenta
    13·1 answer
  • Which if the following is an example of tangible property?
    7·1 answer
  • Which diagrams represent how roles can affect careers and lifestyles
    11·1 answer
  • How do you bookmark a website in each of the internet browsers?
    9·1 answer
  • How do assembly language different from machine language?
    15·1 answer
  • The _device provides a means of communication between a computer and outer world.​
    14·1 answer
  • What problem is http solving?
    6·1 answer
  • If you used a peach as a model of an animal cell, what would the peach's skin represent? A.nucleus B.cell wall C.cytoplasm D.cel
    10·2 answers
  • What is Smart Content Profits all about?
    10·2 answers
  • how would you deploy network connectivity in the 25 classrooms, 12 faculty offices, and the common areas of the building?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!