1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dem82 [27]
3 years ago
9

Motivation is best defined as

Computers and Technology
2 answers:
Paha777 [63]3 years ago
7 0

Answer:

The reason to acheve a goal

Explanation:I just did it

Talja [164]3 years ago
4 0

Answer:

a

Explanation:

the reason to achieve a goal

You might be interested in
Andrew has data in cell E14 and the cell should be blank. Andrew should _____.
denpristay [2]
Use the mouse to click on cell E14 and press delete
4 0
3 years ago
Read 2 more answers
In the Word 2016 window, where is the Status bar located?
Ludmilka [50]

Answer:

The Word status bar is displayed at the bottom of your document window. Just click it. You can customize if needed, just right click on the status bar.

Explanation:

6 0
3 years ago
Which describes the third step in visual character development
allsm [11]

I would say 3-D model!!!! not 100% sure but this sounds most correct!

5 0
3 years ago
Read 2 more answers
What is a characteristic of a wan hub-and-spoke topology?
olga nikolaevna [1]

The characteristic of the WAN hub and spoke topology is that it is considered to be a branch site or composed of the branch site in which they are likely to be connected to a site that is central and that is through the point to point links.

8 0
3 years ago
Using the Caesar cipher, "HELLO" is encrypted to "OLSSV" by applying a shift of 7. The number 7 is considered the __________
Semenov [28]

Answer:

The offset

Explanation:

In the question, we understand that the original text is HELLO and the encrypted text is OLSSV.

It should be noted that O replaced H, L replaced E, S replaced L and V replacement O.

This is made possible by a term refered to as offset.

The offset is used to determine the character that will replace another when it is encrypted.

7 characters after H is O; this is same for every other characters in the text.

8 0
3 years ago
Other questions:
  • Which topology enables only one person, at one time, to send data to others on the network?
    6·1 answer
  • Crashing almost always accelerates the schedule while increasing project risk, whereas fast tracking almost always accelerates t
    10·1 answer
  • This type of connection uses radio waves to connect devices on a network.
    15·2 answers
  • A trench is a narrow excavation in which the depth is greater than the width and the width does not exceed 15 feet. A. False B.
    13·2 answers
  • Interest assessments are always accurate. True False
    5·1 answer
  • A technician has been notified of a problem on the network. After investigation, the technician determines that a specific inter
    7·1 answer
  • Evaluate the following expression with precedence of operator:<br> ​ X = 2* 3/ 5 + 10 //3 – 1
    13·1 answer
  • Sales representatives want to capture custom feedback record details related to each Account. The sales reps want to accomplish
    12·1 answer
  • Cuales son las funcione basica de la computadora​
    9·1 answer
  • Launa is reviewing several videos from her friends doing the latest dance challenge before they are published on their own
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!