1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vfiekz [6]
3 years ago
8

In an MLA style citation for an image, what information should be listed first? A. The name of the creator B. The title of the i

mage C. The name of the website where you found the image D. The words Online image
Computers and Technology
2 answers:
boyakko [2]3 years ago
7 0
The answer would be A
Hope this helped you!!!
podryga [215]3 years ago
7 0

The correct answer is A

You might be interested in
Your program Assignment Write a program that reads a sentence as input and converts each word to "Pig Latin". In one version of
xxTIMURxx [149]

Answer:

theSentence = input('Enter sentence: ')

theSentence = theSentence.split()

sentence_split_list =[]

for word in theSentence:

  sentence_split_list.append(word[1:]+word[0]+'ay')

sentence_split_list = ' '.join(sentence_split_list)

print(sentence_split_list)

Explanation:

Using the input function in python Programming language, the user is prompted to enter a sentence. The sentence is splited and and a new list is created with this statements;

theSentence = theSentence.split()

sentence_split_list =[ ]

In this way every word in the sentence becomes an element in this list and individual operations can be carried out on them

Using the append method and list slicing in the for loop, every word in the sentence is converted to a PIG LATIN

The attached screenshot shows the code and output.

5 0
3 years ago
Write a program that allows the user to navigate the lines of text in a file. The program should prompt the user for a filename
pickupchik [31]

Answer:

Explanation:

iname=input("Enter the file name: ")

inputfile=open(iname,'r')

lines=[]

for line in inputfile:

lines.append(line)

inputfile.close()

print("The file has ",len(lines)," lines")

while True:

linenumber=int(input("Enter the line number or 0 to quit: "))

if linenumber==0:

break

elif linenumber > len(lines):

print("Error: line number must be less than ", len(lines))

else:

print(linenumber, " : ", lines[linenumber - 1])

7 0
3 years ago
Which is true about SSH and Telnet?
MaRussiya [10]

Answer:

Data is encrypted on SSH

Explanation:

Telnet and SSH both are the networking protocols. These protocol are used for the security of data. In telnet data is sent over the link without any encryption. That is the reason, in telnet protocol data is less secure.

In SSH (Security Shell) protocol data has been encrypted before transmission. The encryption of data make it more secure between transmitter and receiver.

So the true statement is that, SSH has data encryption.

8 0
3 years ago
Explain the function of different flags in the 8086<br>​
posledela

Answer:

A flag is a piece of fabric (most often rectangular or quadrilateral) with a distinctive design and colours. It is used as a symbol, a signalling device, or for decoration.8086 has 16-bit flag register, and there are 9 valid flag bits.The FLAGS register is the status register in Intel x86 microprocessors that contains the current state of the processor. This register is 16 bits wide. Its successors, the EFLAGS and RFLAGS registers, are 32 bits and 64 bits wide, respectively. The wider registers retain compatibility with their smaller predecessors.

5 0
3 years ago
_____________is the act of protecting information and the systems that store and process it.A.Information systems securityB.Poli
mylen [45]

Answer:

A. Information System Security (ISS)

Explanation:

Information System security is a very important security in any organization.

The main focus of Information system security is the system itself and the information that the system possesses, processes and stores.

Information system security, or infosec for short, is the modality involved in protecting information and in making it available.

With Infosec,

1. an organization's ability to perform is protected

2. the data an organization uses is protected ensuring integrity

3. programs, applications and technology implemented on an organization's systems are safely used.

Hope this helps!

3 0
3 years ago
Read 2 more answers
Other questions:
  • How is a network printer identified on the network?
    8·1 answer
  • Assume the user types in 7 and 10. What is output by the following?
    10·1 answer
  • QUESTION
    10·1 answer
  • A user logs into Active Directory on a workstation and the user home directory does not redirect to a network share on a file se
    15·1 answer
  • Does anyone know how to fix this???
    11·1 answer
  • 20 points for ez question lol
    9·2 answers
  • Liam is at the park an would like to play soccer. He tell another kid at the park that he would hurt him if he couldn't play soc
    10·2 answers
  • I need help someone plz i need it fast ..........
    7·2 answers
  • Which one of the statements best characterizes the current state of e-commerce?
    15·1 answer
  • Difference between electrical and electronic devices
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!