1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
just olya [345]
4 years ago
13

What is the purpose of citations?

Computers and Technology
1 answer:
Elina [12.6K]4 years ago
6 0

Answer: Citiations areto show where you got information from.

Explanation:

You might be interested in
Which type of password provides the highest level of permissions in bios?
OLEGan [10]
<span>Which type of password provides the highest level of permissions in bios? = Supervisor provides the highest level of permissions in the BIOS</span>
6 0
3 years ago
Communication is used to satisfy instrumental goals, which means ________ .
Ann [662]
Communication comes in lots of types, therefore, it also has lots of goals and purposes. One of the purpose of communication is to satisfy instrument goals. Instrument goals here refers to the goal that focuses on convincing others to act in an appropriate way. This is most applicable in situations when someone had to deal with others. 
3 0
3 years ago
Read 2 more answers
Plz help!!!!!!!!!!!!!!!!111
Y_Kistochka [10]

This question stuns me. Not sure which answer it is, but my best choice right now is probably the one you have selected in the image. A line graph would show the rate of plant growth over the course of a certain amount of days, resulting in which had the highest rates within that period. Might be wrong, but I hope you do well.

4 0
3 years ago
What purpose would tracking changes be most useful for?
olya-2409 [2.1K]
So, you can be able to make a prediction and understand the cycle.
6 0
4 years ago
Session Hijacking refers to the exploitation of a valid computer session where an attacker takes over a session between two comp
noname [10]

Answer:Weak session ID generation algorithm

Explanation: Session hijacking is the hacking by disguising as the authenticated user and illegally exploit the particular computer session. IP packets are invoked by the disguised attacker into the active session between the legal computer user. It is also called session key.

It gives the hacker to use the data and services of the computer in an unauthorized manner. It arises due to the session of communication are not secure and strong,key used for session is weak etc.

5 0
3 years ago
Other questions:
  • EXPLAINING A URL
    15·1 answer
  • What is the fundamental problem producers and consumers face?
    12·1 answer
  • What are characteristics of the Advanced Calendar options in Outlook? Check all that apply.
    9·1 answer
  • .in the array based list implementation of the ADT what is the worst case time efficiency of the getEntry method?
    14·1 answer
  • Given an int variable k, an int array incompletes that has been declared and initialized, an int variable nIncompletes that cont
    6·1 answer
  • What is an Apple Pen?
    5·2 answers
  • When creating an electronic slide presentation, Lee should avoid
    8·1 answer
  • Elizabeth has an assignment to complete. in her internet search, she got 5,006,321 hits. to narrow the search, she would convert
    11·2 answers
  • Write the application of computer in education and communication​
    9·1 answer
  • Life without internet points
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!