The Mark Citation button is used to create a(n) ____.

A. Table of Authorities
B. Table of Contents
C. Bibliography
D. Index


Answer: A

Computer Science & Information Technology

You might also like to view...

The chain of custody accounts for the handling of evidence and documents that handling

Indicate whether the statement is true or false.

Computer Science & Information Technology

The Terrorism Information Awareness Program's effort at achieving total information awareness was a resounding success

Indicate whether the statement is true or false.

Computer Science & Information Technology

Known as the ping service, ICMP is a(n) __________ and should be ___________.

A. essential feature, turned on to save money B. common method for hacker reconnaissance, turned off to prevent snooping C. infrequently used hacker tool, turned off to prevent snooping D. common method for hacker reconnaissance, turned on to save money

Computer Science & Information Technology

The hierarchical file system tree used in Linux begins at the ____ directory.

A. usr B. / C. lib D. bin

Computer Science & Information Technology