1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stealth61 [152]
3 years ago
8

What information is required for a complete citation of a website source?

Computers and Technology
2 answers:
Llana [10]3 years ago
7 0

Answer:

The correct answer is C) the responsible person or organization, date accessed, and URL.

Explanation:

Reference making is always dependant on the rules and patterns the institutions, journals, magazines, among others, are having as their main source pattern. However, most of them have in common the pattern explicit in letter C, for they all expect to have sources with detailed informations about the responsible person or organization for the website, the date of the last access to the website, and the URL for the website. All other options are lacking in some way or are not specifically about website source references.

Vlada [557]3 years ago
5 0
The correct answer is D!
You might be interested in
Network layer protocols specify the _______ structure and processing used to carry data between hosts.
kari74 [83]

Network layer protocols specify the  <u>packet structure</u> and processing used to carry data between hosts.

<h3>What is the Network layer protocols  about?</h3>

The header, payload, as well as the trailer of a network packet are its three component pieces. The underlying network architecture or protocol employed determines the format and size of a network packet. A network packet resembles a package in concept.

Therefore, Network layer protocols define the packet format and processing needed to transfer data from one host to another host, in contrast to the Transmission layer (OSI Layer 4), which controls the data transport between the programs operating on each end computer.

Learn more about Network layer from

brainly.com/question/14476736
#SPJ1

3 0
11 months ago
Which of the following would you use to search a table in Excel?
snow_tiger [21]

Answer:

<em>Which function would you use if you wanted to count the number of values, but ignore the cells that have text or are empty</em>

<em>Which function would you use if you wanted to count the number of values, but ignore the cells that have text or are emptya COUNT</em>

<em>Which function would you use if you wanted to count the number of values, but ignore the cells that have text or are emptya COUNTb. COUNTA</em>

<em>Which function would you use if you wanted to count the number of values, but ignore the cells that have text or are emptya COUNTb. COUNTAc. COUNTBLANK</em>

<em>Which function would you use if you wanted to count the number of values, but ignore the cells that have text or are emptya COUNTb. COUNTAc. COUNTBLANKd. COUNTVALUES</em>

3 0
2 years ago
Read 2 more answers
github Portfolio Balances An investor opens a new account and wants to invest in a number of assets. Each asset begins with a ba
OLEGan [10]

The following code will be used to determine the maximum amount invested

<u>Explanation:</u>

long maxValue(int n, int rounds_rows, int rounds_columns, int into rounds)

{

   // Define the variable to store

   // the maximum amount invested.

   long max = 0;

   

   // Define an array of size n,

   // to store the n investments.

   long *investments = (long*)malloc(sizeof(long)*n);

   int i=0;  

   // Initially set all

   // the investments to 0.

   for(i=0;i<n;i++)

   {

       investments[i] = 0;

   }

   i=0;

   // Run the loop to

   // perform the rounds.

   while(i<rounds_rows)

   {

       // Get the left value

       // of the current round.

       int left = rounds[i][0];

       

       // Get the right value

       // of the current round.

       int right = rounds[i][1];

       // Get the contribution

       // for the current round.

       int contribution = rounds[i][2];

       // Since the user uses 1-based

       // indexing, subtract 1 from left

       // and right as the program uses

       // 0-based indexing. That is, the

       // investments in the array start

       // from 0 and not 1.

       right = right - 1;

       int j=0;

       // Run the loop to add the

       // contribution to all the investments

       // between left and right, both inclusive.

       for(j=left; j<=right; j++)

       {

           investments[j] += contribution;

       }

       i++;

   }

   // Traverse the investments array

   // to find the maximum element.

   max = investments[0];

   for(i=1; i<n;i++)

   {

       if(investments[i]>max)

       {

           max = investments[i];

       }

   }

   // Return the

   // maximum investment.

   return max;  

}

6 0
3 years ago
Develop a simple food receipt (Python coding)
wlad13 [49]
I am progressing on learning Python, gonna get back to you and complete what you ask as a practice.
7 0
3 years ago
In your own words, what is your definition of cybercrime and computer forensics?
mr_godi [17]

Answer:  

Cyber crime is also known as computer crime in which the illegal activities are done by the computer and many mobile devices. There are many types of crime but the cyber crime are associated with the computer crime by hacking personal documents and email spamming.

To resolve these type of cyber crime there is special type of police which is known as cyber cell. Data theft, cyber stalking and accessing other user data without there permission is all comes under the cyber crime.

Computer forensics is type of application that are used in investigation purpose and gathering the information from the computer.

The main aim of computer forensic is to perform and maintain the various type structured investigation and also maintain the systematic documents for the evidence.

7 0
3 years ago
Other questions:
  • Two electronics technicians are looking at the piece of testing equipment shown in the figure above. Technician A says that this
    8·2 answers
  • Was the big blue button thing a good decision or bad?<br> *I think it was a bad idea.
    15·2 answers
  • Which of the following is another term for a subfolder?
    9·1 answer
  • Which of the following statements about personality are true? Check all of the boxes that apply.
    7·1 answer
  • i know this not school related but my grandmothers RCA RCT6272W23 tablet is saying type password to decrypt storage and i dont k
    5·1 answer
  • A data flow cannot go directly back to the same process it leaves. There must be at least ________ other process(es) that handle
    15·1 answer
  • 5. Which of the following views is used to run a PowerPoint presentation?
    11·2 answers
  • The purpose of a software design is to enable programmers to implement the requirements by designating the projected parts of th
    14·1 answer
  • A small but growing advertising business hires a new secretary. Until now, the computers have been directly connected, and all t
    12·1 answer
  • Select the correct answer from each drop-down menu.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!