Match the following terms with their use or definition:

I. bibliography
II. works cited
III. citation
IV. parenthetical citation
V. copyright law

A. protects authors of original works
B. list of sources used in a paper
C. list of sources in MLA style
D. reference in a text to the source of the information
E. source cited in an abbreviated manner


B, C, D, E, A

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 1-1Maxwell made a presentation to his class about the importance of computer memory. After his presentation was over, he was asked several questions. Select the best answer for each question. Which of the following holds the computer's startup routine?

A. ROM B. microprocessor C. RAM D. hard disk

Computer Science & Information Technology

What happens if you forget to supply an argument to the lu program? What happens if the argument is null (as in, lu "")?

What will be an ideal response?

Computer Science & Information Technology

A sublayer of the OSI seven-layer model, the _________________ describes the function of a NIC that talks to the network operating system, places data into frames, and creates the CRC on each frame.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When using public/private keys for authentication, after the initial steps of generating the keys and sending the appropriate key to the server, what does the client do every time it connects to the server?

What will be an ideal response?

Computer Science & Information Technology