1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorC [24]
3 years ago
13

In what way are the constitution of New York and United States alike and different

Social Studies
2 answers:
Len [333]3 years ago
8 0
Governments and how crowded it is
iren [92.7K]3 years ago
6 0
Different federals , governments.
You might be interested in
Give examples of situations that illustrate the following:
Alona [7]

Answer:

Explanation:

1. Selective attention is the process of directing our awareness to relevant stimuli while ignoring the irrelevant. For example: when you pay attention to a professor in a class or doing your homework. A distraction defined by the Cambridge dictionary is “the state of being bored or something that prevents someone from giving their attention. For example, cellphones are a distraction when you are in school. Divided attention is when you perform two tasks at the same time. For example: when you watch a movie with subtitles or watch the tv while eating. Attentional capture is when an irrelevant item that is unique in some way affects the time to detect a target. For example: trying to find a seat at the cinema even though your friend is waving at you and you don’t notice. Scanning is reading a text quickly in order to find specific information. For example: A DMV employee needs to scan your information to get the details necessary.

2. The procedure consisted in turning down a volume of either one of the 4 sources that were available; or attenuate 3 in order to attend the fourth one. In the process they found that the participant could process the meaning of attend messages. Also, participants could still be able to identify the context of unattended messages; indicating they could identify both attended and unattended messages. The cocktail party effect is when you focus on a single speaker in any environment, even though the voice is surrounded by other noises. It demonstrated the capability of the human being to understand a speech if they really focus; listening to it and leaving all the distractions behind.

3. The broadbent’s model wanted to see how people were able to focus their attention (selective) by deliberately overloading them with stimuli. One of the ways was to send a message to one ear and a different message to the other. It is called the early selection model because it was one of the pioneers of creating a model who uses selective attention.

6 0
3 years ago
In which way has the agriculture industry shifted?
Tcecarenko [31]

Answer:

b: from many small farms to fewer large farms

Explanation:

did the assignment

4 0
4 years ago
When solid water (Ice) melts into liquid water, what type of energy movement is taking place?
lana66690 [7]
Exothermic...........
6 0
3 years ago
What impact did the breakdown of chiefdoms in early native American cultures eventually have.
Arlecino [84]
The impact of the breakdown of chiefdoms in early native American culture is : The Development of Native American societies
These societies is no longer single handedly controlled by the chief and much more reflected out normal societies

hope this helps
6 0
3 years ago
The act of recording noteworthy security events that transpire on a network or computing device is known as a(n)________________
tekilochka [14]

Audit

The act of recording noteworthy security events that transpire on a network or computing device is known as an audit.

The act of mapping and inventorying your network's hardware and software is known as network auditing. Identifying network components manually is a fairly difficult undertaking. Network auditing tools may occasionally be able to automate the process of identifying the network-connected devices and services. Auditing should cover security records such user accounts, groups, and permissions in addition to hardware and software.

Network security plays an exceptionally large role in the auditing process. Some clients may choose to briefly touch on cybersecurity while others create detailed project scopes entirely on the subject.

To know more about Network auditing here

brainly.com/question/28084850

#SPJ4

8 0
2 years ago
Other questions:
  • Middle eastern country is a example of a monarchy
    15·1 answer
  • Deindividuation is related to mobs in the same way that _______ is related to groups.
    7·2 answers
  • What was the experiment that was conducted that lead to desegregation of schools?
    10·1 answer
  • HELPPP!!! 25 POINTS!! 9 MINUTES LEFT Which of the following is not a step in the Scientific Method?
    12·2 answers
  • What is an ordinance?
    10·1 answer
  • Why did dancer Katherine Dunham announce she would no longer be performing in Louisville, Kentucky?
    9·1 answer
  • What types of companies changed to the production of wartime products?
    7·1 answer
  • What question does having a plan for communication answer?
    13·1 answer
  • Which type of mental health professional can prescribe<br> medication for patients in all 50 states?
    11·2 answers
  • The aztecs had a government
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!