1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aliun [14]
3 years ago
10

A list of sources used for in-text citations that appears at the end of a document is called:

Computers and Technology
1 answer:
jolli1 [7]3 years ago
5 0
The correct answer is Works cited page
You might be interested in
The company’s computer network is down. Who should you contact to correct this problem? Information Technology Associate Master
vekshin1

Answer:

Information Technology Associate

Explanation:

Because they use technology and computers uses technology also and that specific company knows how to fix the problem

8 0
3 years ago
Assslainsdffddsvvdesdssbhasasco5m
alexandr402 [8]
Hahahahaha I wanna was the day I wanna was the last time I got to
8 0
3 years ago
Read 2 more answers
Which option represents the location of the Data Table function?
hichkok12 [17]

Answer:A

Explanation:

8 0
3 years ago
question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
erma4kov [3.2K]

The correct answer is MAC (Media Access Control).

<h3>What is MAC?</h3>

The Media Access Control (MAC) protocol is a data link layer protocol that defines the process by which local area network (LAN) devices interface with upper network layer protocols, such as the Internet Protocol (IP).

The MAC protocol is responsible for controlling access to the shared communication medium of the LAN and for providing a reliable link between devices on the LAN. It does this by defining a set of rules and procedures for how devices on the LAN can detect and avoid collisions when transmitting data, as well as for how they can recover from errors that may occur during transmission.

The MAC protocol is typically implemented in hardware, such as in the network interface controller (NIC) of a computer, and is an essential part of the LAN communication process.

To Know More About MAC, Check Out

brainly.com/question/29388563

#SPJ1

6 0
2 years ago
Microsoft is interested in customers' perceptions of Windows 8, its new PC operating system. Since the research goal is rather s
Fantom [35]

Answer:

The answer is "Option c"

Explanation:

An Online questionnaire is a research study, that can be conducted across the internet by the targeted audience. It is the primary use for web-based ways to store feedback, and analyses by statistical apps and other choices were wrong, which can be described as follows:

  • In option a, It is wrong because experimental is used in factor manipulation.
  • In option b, It is not a secondary part of survey, that's why it is incorrect.
  • Option d and Options e is used to in survey, but it's not correct.  

5 0
3 years ago
Other questions:
  • Which of the following was the first commercial software package to incorporate WYSIWYG as a feature?
    15·1 answer
  • True or false: Sony is the company behind the creation of the ‘Super Mario Bros.' franchise.
    8·2 answers
  • Worksheet titles and subtitles should be as wordy as possible.<br> a. True<br> b. False
    9·2 answers
  • On the piano, the pitches/notes used on the bass clef are located on what part of the keyboard?
    9·2 answers
  • Data from RAM may be placed where to free up space?
    7·1 answer
  • Given the 32-bit binary number:
    13·1 answer
  • "queries are questions", true or false?
    8·2 answers
  • Which work habits should you follow to increase work efficiency and avoid health issues?
    6·1 answer
  • In 1956, the unit byte was coined by American statistician and computer scientist John Tukey
    11·1 answer
  • What are the benefits and drawbacks of a desktop utilising virtualisation and a server?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!