1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikentia [17]
3 years ago
8

Read the citation example, and then use the drop-down menus to identify each part.

Computers and Technology
2 answers:
Alexus [3.1K]3 years ago
6 0

Answer:

Title, Website, Publisher, Medium

Explanation:

Just answered! <3

Lemur [1.5K]3 years ago
5 0

Answer:

im notur e

Explanation:

You might be interested in
Write at least and explain four types of escape sequences and create an example in an IDE which consist of the mentioned escape
slamgirl [31]

Answer:

- \' is used to escape a single quote in a string enclosed in single quotes like;

my_string = 'this is John\'s ball'.

- \n is used to jump to a new line, Eg;

my_string = "Johns is a good boy\nbut he hates going to school."

the next set of the string after the '\n' character is displayed on the next line.

- \t is used to add a tab space to a string.

my_string = 'Jane is \thungry'

the character adds four character spaces before the word 'hungry'.

- \r adds a carriage return (or enter in keyboards) to start a new block paragraph in a string.

my_string = "Johns is a good boy\rbut he hates going to school."

Explanation:

Escape sequences in programming are used to format strings or output syntax of a program. They always begin with the backslash. Examples of escape sequence are " \' ", "\n", "\t", "\r", etc.

5 0
3 years ago
Within the sites that support disaster recovery, ___________ is a separate and fully equipped facility where the company can mov
Dahasolnce [82]

Answer:

Hot site.

Explanation:

It seems to be a specific and completely designed functionality inside the sites which assist disaster recovery, in which the organization may travel directly during a disaster as well as continue operations.

  • It may be described as such a recovery site that is repeatedly fully operational.
  • It enables the corporation to resume normal corporate processes during a disaster, within such a limited period cycle.
7 0
4 years ago
In a _error,solution is working but not giving required results
drek231 [11]

Answer:

<h2>it is a random error </h2>

Explanation:

<h3>I HOPE THAT THIS ANSWER HELPS YOU </h3>
7 0
3 years ago
What is the impedance mismatch problem? Which of the three programming
kykrilka [37]

Answer:

The problem that created due to the difference in the model of programming language and the database model.

Explanation:

The practical relational model has three components which are as follows

1. Attributes

2. Datatypes

3. Tuples

To minimize this problem  

1. We switch low pass L-Network to high pass L-network

2. We switch high pass L-Network to low pass L-network

3. We use the impedence matching transformer

3 0
4 years ago
John travels a lot and he needs to access his documents and services on the go. Which of these technologies allows his to access
kirza4 [7]

<u>Answer:</u>

<u>Cloud computing</u><em> allow the user to access software or any document from the remote place.</em>

<u>Explanation:</u>

Let us understand what does the word cloud actually means. In simple terms, we get rain from cloud, but we don’t know actually which cloud burst to give rain.

In a similar way, <em>the cloud computing is the concept of storing files in multiple servers and multiple location</em> and it provide access when the <em>client needs the source. </em>

Cloud computing enable user to work on <em>software online</em> or to download document or <em>edit / create documents online</em>. Certain services are <em>free and few other are paid.</em>

6 0
3 years ago
Other questions:
  • Dinah is using an IDE to write, modify, and save code. Which tool should she use?
    11·2 answers
  • Your friends know that you understand a lot about computers, both the technical details of how they operate as well as informati
    12·1 answer
  • To display measurements on the ruler while changing column widths, hold down the ________ key while dragging the marker.
    13·1 answer
  • One of the most toxic components of a computer is the
    11·1 answer
  • What would be one duty of a network administrator
    12·1 answer
  • Select the correct navigational path to mark all teachers who have achieved “excellent” on their evaluations a red background.
    11·2 answers
  • The process known as "bitmapping" is defined as information in _____. PLEASE HELP FAST
    11·1 answer
  • TRUE AND FALSE
    10·1 answer
  • When talking about careers in designing game art, the unit mentioned that a good portfolio and a clear record of experience in g
    9·1 answer
  • _______________ is a computer networking protocol used by hosts to retrieve IP address assignments.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!