1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
11

"The effectiveness of memory retrieval is directly related to the similarity of cues present when the memory was encoded to the

cues present when the memory is retrieved." What concept does this statement describe?a. memorability
b. registered learning
c. encoding specificity
d. accessible decoding
e. mood congruency
Computers and Technology
1 answer:
alexdok [17]3 years ago
3 0

Answer:

D

Explanation:

Cause You Have To Decode It To Get To The Memory In The First Place

You might be interested in
Brad, a project manager, wants to build a database to integrate information about employees and tasks that they handle. Brad wan
zhuklara [117]

Answer:

entities

Explanation:

3 0
3 years ago
Which would be the best and worst answer choices?
jeyben [28]

Answer:

option 3

Explanation:

4 0
2 years ago
Drag the tiles to the correct boxes to complete the pairs.
Mice21 [21]

Answer:

Operation open purpose

8 0
3 years ago
Read 2 more answers
Create a visual python quiz that pops up when you run the code
Irina-Kira [14]

Refer to the attachment!!

8 0
2 years ago
over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. you need a way to track w
Nuetrik [128]

One way to track who made these changes to the virtual machine cloud settings and when is to: D. enable cloud resource activity auditing.

<h3>What is a cloud?</h3>

In Computer technology, a cloud can be defined as the elastic leasing of pooled computer resources such as physical hardware through virtualization and over the Internet, so as to enable the storage and sharing of files and documents virtually and in real-time.

In this scenario, we can reasonably infer and logically conclude that one way to track who made these changes to the virtual machine cloud settings and when is to enable cloud resource activity auditing because it would provide a log of actions such as information about the engineer who made configuration changes.

Read more on a virtual machine here: brainly.com/question/12060797

#SPJ1

Complete Question:

Over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. You need a way to track who made these changes and when. What should you do?

A. Enable virtual machine API integration.

B. Rotate the cloud access keys.

C. Deploy an OSI layer 7 firewall.

D. Enable cloud resource activity auditing.

7 0
1 year ago
Other questions:
  • Select the most likely outcome of making only on-time minimum payments to a credit card with a balance for an entire year?
    7·2 answers
  • Why would a user want to compress a large file before sending it as an email attachment?
    13·2 answers
  • An incurred cost that cannot be recovered, which is irrelevant for all decisions about the future, is included in the projected
    14·1 answer
  • Which option should you select to ignore all tracked changes in a document? To ignore all tracked changes in a document, you sho
    15·2 answers
  • A local bank has an in-house application which handles sensitive financial data in a private subnet. After the data is processed
    15·1 answer
  • Why can't I register for Brainly?? I've been trying for months, too! I've noticed this question has been asked so many times, bu
    7·1 answer
  • On what menu in Microsoft Word can you locate the Macro feature?
    10·1 answer
  • --concept mapping--
    5·1 answer
  • Which of the following helps you plan out every step of an animation?
    12·2 answers
  • Which type of software is offered in trial form or for a limited period of time?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!