A list of cited works in a report or research paper, also referred to as Works Cited, Sources, or References, depending upon the report style.
A. Footnotes
B. Citation
C. Bibliography
C. Bibliography
You might also like to view...
Variables are created using a(n) _______ statement.
Fill in the blank(s) with the appropriate word(s).
A(n) ____________________ is a network that uses a public communications infrastructure to facilitate private communication between a company LAN and remote employees.
Fill in the blank(s) with the appropriate word(s).
Identity capture consists of a group of functions that facilitate the inclusion of users and their biometric data into the system. Three main functions include:
Fill in the blank(s) with the appropriate word(s).
A VPN concentrator is used for which of the following purposes?
A. MAC filtering B. Content filtering C. Secure network access D. Connectivity troubleshooting