1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stellarik [79]
3 years ago
6

Does this look anywhere close to the APA Format?

Computers and Technology
1 answer:
Galina-37 [17]3 years ago
4 0
Make sure your font is set to Times. And font size set at 12. 1 in from the border. Make sure to indent your paragraphs. And site anything you used, that is not your words. I find you still did great!
You might be interested in
* what is an electronic mail ?
Vikki [24]

Answer:

Electronic mail is a method of exchanging messages between people using electronic devices. Email entered limited use in the 1960s, but users could only send to users of the same computer, and some early email systems required the author and the recipient to both be online simultaneously, similar to instant messaging.

6 0
3 years ago
Several different tunneling protocols can be used in dial-up situations. Which of the following would best be used as a VPN tunn
melomori [17]

Answer:

The answer is the point - to -point protocol, which allows user to set a secure VPN connection for client and server connectivity.

Explanation:

A virtual private network is a private-public network because of encryption and tunneling to ensure the integrity of the data. VPN requires a tunnel to work and encryption.

In VPNs, there are different protocols can be used, such as point- to - Point Tunneling Protocol (PPTP), IPSec, and L2TP.

Point to Point Protocol is a Microsoft protocol which allows user to set a connection and secure VPN destination. Point to point protocol is designed for client and server connectivity. It developed a connection between two computers. The data link layer that transmits over IP networks is used for point to point tunneling.

Such as option A is not correct because it is distracter and IPSecis primary tunneling protocol. It supports only IP networks. L2TP is not a VPN but extend VPN over the various network.

3 0
4 years ago
Haniyah drew a beautiful pencil sketch of a scenery. Her computer teacher asked her to convert it into a digital form and post i
Aleksandr-060686 [28]

Scanner.

<em> </em>A <em>scanner</em> is an input device that scans documents such as photographs and pages of text, when a document is scanned, it is converted into a digital format.

4 0
3 years ago
Marianne needs to create a version of her slide presentation that does not include all the slides and will be used for
Morgarella [4.7K]

Answer:

B is the correct answer because that's what I do

8 0
3 years ago
Read 2 more answers
To construct a histogram using excel's chart tools, choose __________ as the chart type.
CaHeK987 [17]
Column is the correct answer. Hope this helps. :)
3 0
4 years ago
Other questions:
  • What did you include in your response? Check all that
    15·1 answer
  • When used as parameters, _________ variables allow a function to access the parameter’s
    10·1 answer
  • Guidelines:
    6·1 answer
  • If you want to distribute a formatted Microsoft word document to people who don't have word save it as a __file
    5·1 answer
  • Which invention spurred the development of the digital camera?
    8·1 answer
  • Emotions can have Impact on your driving?
    10·1 answer
  • Describe the forward button​
    7·1 answer
  • Which item best describes fiber optic transmission?
    14·1 answer
  • How to make a website
    15·2 answers
  • public static String[] strArrMethod(String[] arr) { String[] result = new String[arr.length]; for (int j = 0; j &lt; arr.length;
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!