Critical Thinking QuestionsCase 2-1Your friend Riley knows that you have a lot of experience with proofreading works cited pages, as you have a background from your time as a graduate student and now as a professional researcher. Riley brings to you the research paper on which she is currently working. Which of the following is a correct and complete citation for a book?
a. Connors, Jack. Dreaming of Jeannie. 4th edition. Volume 2. 2010.b. Santos, Matthew, and Joshua Lyman. How to Run (and Win) a Presidential Campaign. Houston: GOP Publishing, 2011.c. Shelly, Gary B. "How a GPS Works." Computing in Today's World March 2011: 34-42.d. Hutton, Laura. Effective Management for the 21st Century. Albuquerque: Manhattan Publishers.

What will be an ideal response?


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following is a variable declaration statement?

a. int total; b. import java.util.Scanner; c. public static void main(String args[]) d. // first string entered by user

Computer Science & Information Technology

What element contains each item in an ordered or unordered list?

a. item b. li c. dd d. dt

Computer Science & Information Technology

One reason for using an alias is when you are joining a table to itself.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is true about database access control?

A. to access a database the SQL Server login must be mapped to a database user B. members of the sysadmin server role don't have access to databases by default C. once a user logs in to the SQL Server, they have automatic access to underlying database objects D. the database user login name must be different from the server login name

Computer Science & Information Technology