anonymous
  • anonymous
when creating your reference page, with each reference are you supposed to write the authors out in alphabetical order or as they are displayed in the article?
Writing
  • Stacey Warren - Expert brainly.com
Hey! We 've verified this expert answer for you, click below to unlock the details :)
SOLVED
At vero eos et accusamus et iusto odio dignissimos ducimus qui blanditiis praesentium voluptatum deleniti atque corrupti quos dolores et quas molestias excepturi sint occaecati cupiditate non provident, similique sunt in culpa qui officia deserunt mollitia animi, id est laborum et dolorum fuga. Et harum quidem rerum facilis est et expedita distinctio. Nam libero tempore, cum soluta nobis est eligendi optio cumque nihil impedit quo minus id quod maxime placeat facere possimus, omnis voluptas assumenda est, omnis dolor repellendus. Itaque earum rerum hic tenetur a sapiente delectus, ut aut reiciendis voluptatibus maiores alias consequatur aut perferendis doloribus asperiores repellat.
katieb
  • katieb
I got my questions answered at brainly.com in under 10 minutes. Go to brainly.com now for free help!
anonymous
  • anonymous
in apa
anonymous
  • anonymous
I just checked with APA rep and they said to create a reference with author organization as you see it in the article. As an entire reference list, you would organize each article based on alphabet.
anonymous
  • anonymous
I am not disagreeing with you. Great resource. When listin greferences, they should be alphabetized. That wasn't the question I asked.

Looking for something else?

Not the answer you are looking for? Search for more explanations.

More answers

jagatuba
  • jagatuba
On an APA reference page your references will be listed in alphabetical order by authors' last names and names of organizations. You do use the names as they are credited in the article or the organizations name exactly as it appears. Here's a little sample: Goodin, D. (2011, September 27). World takes notice as SSL-chewing BEAST is unleashed. The Register. Retrieved from http://www.theregister.co.uk/2011/09/27/beast_attacks_paypay/ Kazienko , P., & Dorosz, P. (2004). Intrusion detection systems part 1. Retrieved October 10, 2011, from http://www.windowsecurity.com/articles/intrusion_detection_systems_ids_part_i__network_intrusions_attack_symptoms_ids_tasks_and_ids_architecture.html Microsoft Corporation. (2011). Integrity and encryption algorithms (Fact Sheet). Retrieved from Windows Server Tech Center: http://technet.microsoft.com/en-us/library/cc811537(WS.10).aspx Rothman, M. (1999, May 17). Public-key encryption for dummies. Network World. Retrieved from http://www.networkworld.com/news/64452_05-17-1999.html The SANS Institute. (2011). Information security policy templates. Retrieved from http://www.sans.org/security-resources/policies/

Looking for something else?

Not the answer you are looking for? Search for more explanations.