1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mr_godi [17]
3 years ago
10

Taking away iPad privileges when a student hits another child would be considered a(an) ________ principle for decreasing or ext

inguishing undesired behavior.
Computers and Technology
1 answer:
Setler79 [48]3 years ago
7 0

Answer:

A response cost principle

Explanation:

Response cost is a punishment method that entails the loss of token, privileges, or points, following the occurrence of an inappropriate or bad behavior or failure to meet some specific goal.

Response cost can be utilized as an element of a positive reinforcement program, such as a token economy. By taking away something (a favorite item, access to reinforcement) you reduce the possibility that the target behavior will appear again.

You might be interested in
where element is the Hypertext Markup Language (HTML) element and _____ pairs define the styles that are applied directly to tha
frez [133]
Not too sure what the answer the question would expect, or rather what terminology,

But I’d say key-value pairs

For example in CSS

key: value;

color: green;
3 0
2 years ago
What in Microsoft word brings up mini toolbar
Ray Of Light [21]
You right click the mouse. hope this helps 
6 0
3 years ago
What does Verizon child allow parents to do? My parents recently got the app and put it on my phone so I was wondering...
HACTEHA [7]
It allows them to turn on and turn off your internet; also if you were wondering incognito or any private browsing still countermeasures all devises they can use to access your history
4 0
3 years ago
Using a linear search to find a value that is stored in the last element of an array of 20,000 elements, ________ element(s) mus
Klio2033 [76]

Using a linear search to find a value that is stored in the last element of an array of 20,000 elements, 20,000 element(s) must be compared.

6 0
2 years ago
Client computers cannot function unless they are connected to the network because they cannot access an operating system.
Shtirlitz [24]

Answer: true

Explanation:

As the operating system cannot run from an external device and in a distributed operating system all the clients needs to be connected to the network to share resources via the distributed or network operating system.

8 0
3 years ago
Other questions:
  • Discuss what they need to consider if they wish to use their devices when they are away from home?
    6·1 answer
  • Which speaker port should you use when connecting a single speaker to a pc?
    6·1 answer
  • Of the sequences listed below, which shows the correct order of the steps in the incident management workflow: (1) authenticate
    14·1 answer
  • Which of the following is the answer?
    5·1 answer
  • Which of the following activities does an effective team do?
    15·2 answers
  • The analogy of a computer system is often used to illustrate the different parts of memory. The keyboard is where we encode new
    8·1 answer
  • Mary recently read about a new hacking group that is using advanced tools to break into the database servers of organizations ru
    14·1 answer
  • In the program below, which two variables have the same scope?
    9·2 answers
  • What is a case in programming​
    12·1 answer
  • What is the core function of an enterprise platform
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!