1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sholpan [36]
3 years ago
9

The computer program that Josh is working on presents him with a sentence in which a word has been underlined. Josh has to indic

ate the part of speech represented by the underlined word. After receiving feedback about the correctness of his response, Josh is given another sentence with an underlined word. This description best illustrates what type of computer-based instruction (CBI) program?
Computers and Technology
1 answer:
Phantasy [73]3 years ago
4 0

Answer:

Drill and Practice

Explanation:

<em>Drill and Practice</em> is a type of Computer-based Instruction (CBI) program. In <em>Drill and Practice</em>, answered questions are given immediate feedback. These problems or exercises are structured and answered on the program to provide instant feedback to the person taking the test.

<em>For instance</em>, when going through an evaluation test but you are required to provide the correct answer before moving on. Once a question is answered, the program will indicate whether correct or wrong, if the question is correct, move to the next question but if wrong you start again. This is a typical example of Drill and practice.

This is exactly what is seen in our scenario in the question.

You might be interested in
Ano ang bunga ng pagsunod sa tamang konsiyensiya?
gladu [14]

Answer:

A.

Explanation:

mapalaganap ang kabutihan

8 0
2 years ago
Read 2 more answers
The computer system for a major retail store was hacked. Many addresses, credit card numbers, and other pieces of customers’ per
drek231 [11]

Answer

Cyber Security professionals

Explanation

Cyber security professionals can help the company protect itself from hackers. They are experts who will install antivirus into the software used in the company to protect virus manipulation and prevent malware. They will further encrypt the websites of the company and reset the password of the computers into two-factor authentications to make the login requirements advanced.


7 0
3 years ago
Read 2 more answers
A user notices that a mobile device is draining power faster than is normal. What are three causes of quick battery drain? (Choo
Svet_ta [14]

Answer:

Option (a), (d) and (e) is the correct option to the following question.

Explanation:

Because most of the application is that type which consuming a lot of power because of their features and the functionality and also these applications have large in size. The mobile phones also consume power when the brightness of the mobile is set at a high level and also when its VPN is connected or connected through the WIFI.

3 0
3 years ago
What is renewable energy
Marat540 [252]
Renewable energy is energy that is collected from renewable resources, which are naturally replenished on a human timescale, such as sunlight, wind, rain, tides, waves, and geothermal heat.
8 0
3 years ago
Which page layout is most commonly used for a website with a large navigation menu?
mestny [16]

Explanation:

The Name is called, (navigation menu..)

to direct users 2 info., they look up...

7 0
2 years ago
Other questions:
  • Which is an example of a screenshot?
    7·2 answers
  • A computer’s memory is composed of 8K words of 32 bits each. How many bits are required for memory addressing if the smallest ad
    10·1 answer
  • can An intelligent workplace uses technology to allow workers to be productive whether they are in the office or working from ho
    12·1 answer
  • I know how to design it but I’m confused as to how to write a function code based on the info provided.
    10·1 answer
  • Remote wiping is a device security control that allows an organization to remotely erase data or email in the event of loss or t
    10·2 answers
  • 9
    10·1 answer
  • How does natural gas move through pipelines from the well head to the end user thousands of miles away
    5·1 answer
  • Which of these statements correctly describe aspects of testing code? Check all of the boxes that apply.
    14·1 answer
  • Difference between Data and information​
    10·1 answer
  • When you try to move the desktop icon using the click and drag method and it doesn't move, what is the reason?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!