A list of cited works in a report or research paper, also referred to as Works Cited, Sources, or References, depending upon the report style.

A. Footnotes
B. Citation
C. Bibliography


C. Bibliography

Computer Science & Information Technology

You might also like to view...

Variables are created using a(n) _______ statement.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ____________________ is a network that uses a public communications infrastructure to facilitate private communication between a company LAN and remote employees.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Identity capture consists of a group of functions that facilitate the inclusion of users and their biometric data into the system. Three main functions include:

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A VPN concentrator is used for which of the following purposes?

A. MAC filtering B. Content filtering C. Secure network access D. Connectivity troubleshooting

Computer Science & Information Technology