Critical Thinking QuestionsCase 2-1Your friend Riley knows that you have a lot of experience with proofreading works cited pages, as you have a background from your time as a graduate student and now as a professional researcher.Riley brings to you the research paper on which she is currently working. Which of the following is a correct and complete citation for a book?
a. Connors, Jack. Dreaming of Jeannie. 4th edition. Volume 2. 2010.b. Santos, Matthew, and Joshua Lyman. How to Run (and Win) a Presidential Campaign. Houston: GOP Publishing, 2011.c. Sullivan, Gary B. "How a GPS Works." Computing in Today's World March 2011: 34-42.d. Hutton, Laura. Effective Management for the 21st Century. Albuquerque: Manhattan Publishers.

What will be an ideal response?


Answer: B

Computer Science & Information Technology

You might also like to view...

Turn off the option that prevents overwriting an existing file

What will be an ideal response?

Computer Science & Information Technology

Consider the FireAlarm example as written using JGroups. Suppose this was generalized to support a variety of alarm types, such as fire, flood, intrusion and so on. What are the requirements of this application in terms of reliability and ordering?

What will be an ideal response?

Computer Science & Information Technology

Adding a page _________ enables a search result to display a concise page summary, rather than simply a random passage from the web page.

A. title B. description C. header D. footer

Computer Science & Information Technology

?In which file system can you hide data by placing sensitive or incriminating data in free or slack space on disk partition clusters?

A. ?NTFS B. ?FAT C. ?HFSX D. ?Ext3fs

Computer Science & Information Technology