1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sholpan [36]
3 years ago
9

The computer program that Josh is working on presents him with a sentence in which a word has been underlined. Josh has to indic

ate the part of speech represented by the underlined word. After receiving feedback about the correctness of his response, Josh is given another sentence with an underlined word. This description best illustrates what type of computer-based instruction (CBI) program?
Computers and Technology
1 answer:
Phantasy [73]3 years ago
4 0

Answer:

Drill and Practice

Explanation:

<em>Drill and Practice</em> is a type of Computer-based Instruction (CBI) program. In <em>Drill and Practice</em>, answered questions are given immediate feedback. These problems or exercises are structured and answered on the program to provide instant feedback to the person taking the test.

<em>For instance</em>, when going through an evaluation test but you are required to provide the correct answer before moving on. Once a question is answered, the program will indicate whether correct or wrong, if the question is correct, move to the next question but if wrong you start again. This is a typical example of Drill and practice.

This is exactly what is seen in our scenario in the question.

You might be interested in
I am looking to build a pc but im on a budget of $3,000 can i have a pc part list?
Dimas [21]

Answer:

I recommend going to https://pcpartpicker.com/list/

I takes you step by step into choosing the best parts for your pc, along with comparable prices.

6 0
3 years ago
The _____ lists all of the fields that are available in a table.
crimeas [40]

What are the other options? Is this multiple choice or just fill in the blank

7 0
3 years ago
Suppose there are 2 routers in sequence between Host A and Host B, all of which use store-and-forward routing. What is the total
lora16 [44]

Answer:

Check the explanation

Explanation:

Going by the question above,there are 2 routers in a sequence amid Host A and Host B and using store-and-forward routing.

So that time would conprise of both propagation delay and transmission time

Propagation delay is nothing but the time taken for traveling.

Transmission delay is the amount of delay time from the beginning to end of transmission)

Now,

Propagation delay = distance traveled / speed of propagation

= 161200 / 2.7 *108 = 59703703.70 * 10-8 mili sec

Transmission delay:

= packet size / bandwidth

= 4 / (9.1 * 1024) = 4.2925 * 10-1 mili sec

Let us assume routers have zero (0) processing time

total time = Transmission delay by host A + Transmssion delay by router1 + Transmssion delay by router2 + propagation time

= 3 * ( 4.2925 * 10-1 ) + (59703703.70 * 10-8)

= 1.28775 + 0.5970370370 ms

= 1.884787 ms

6 0
3 years ago
A global construction client approaches Accenture to help make their decision-making processes more transparent and understandab
RoseWind [281]

Answer:

Deep-learning artificial intelligence.

Explanation:

Deep-learning artificial intelligence would be an appropriate choice because it imitates the methods of the human brain.

6 0
3 years ago
Using a Microsoft Windows system, open Internet Explorer. Click Internet Options on the Tools menu. Examine the contents of the
Novay_Z [31]

Answer:

You can restrict a user’s Internet Explorer web access by modifying the "Family" settings.

A) Content filtering tab in the Microsoft Windows Tab

From the left-hand navigation menu, select Settings > General > Advanced Features. Scroll down until you see the entry for Web content filtering. Switch the toggle to On and Save preferences.

B) to activate protection from unwanted items like cookies?

Open Internet Options | Privacy, click on the Advanced button. Place a check in "Override automatic cookie handling". Set "First Party Cookies" to Block, set "Third Party Cookies" to Block.

Cheers!

3 0
4 years ago
Other questions:
  • Write a Python program that gets a number using keyboard input. (Remember to use input for Python 3 but raw_input for Python 2.)
    8·1 answer
  • April plans on starting a perfume business and decides she needs to first
    15·1 answer
  • Consider the following two implementations of the same algorithm, each written in a different language.
    11·1 answer
  • A programmer writing code in class Point attempts to override the following inherited method:public boolean equals( Object o ) {
    12·1 answer
  • How does one select an entrepreneurial activity?
    9·1 answer
  • Explain steps in creating a main document for from letter. <br>​
    5·1 answer
  • Which of the following statements are true about the code shown below in the class named Quiz? (Select all that apply.)
    7·1 answer
  • Which of these is a standard for describing a wifi network?
    14·1 answer
  • What is operating system​
    10·2 answers
  • Write an if-else statement that assigns 0 to the variable b if the variable a is less than 10. Otherwise, it should assign 99 to
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!