1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tester [92]
3 years ago
5

Claire is trying to listen to her history professor's lecture, but her mind keeps wandering to thoughts about her plans for the

upcoming weekend. She is likely experiencing ____ noise
A) Internal
B) External
C) Expressional
D) Insistent
Computers and Technology
1 answer:
eduard3 years ago
4 0

Answer:

internal

Explanation:

its is a type of distraction causing her not to pay attention to her surroundings

You might be interested in
You've been given a network of 130.0.0.0 /16. you need to divide it into four VLSM subnets as follows:
Sidana [21]

Answer: Hello your required question is wrong as it does not tally with the data provided , attached below is the complete question

answer:

/23 /26 /27 /28   option A

Explanation:

<u>Breakdown of the last four subnet masks given to the subnets </u>

For the subnet of 500 production host the mask = /23 which will produce 512 hosts

For the subnet of 60 sales host the mask = /26 which will produce 64 hosts

For the subnet of  12 host the mask = /27 which will produce 32 hosts

For the subnet of 30 hosts the mask = /28 which will produce 16 hosts

4 0
3 years ago
Discovery of a vulnerability in a software program can potentially be sold to the government. Group of answer choices True False
enyata [817]

Discovery of any vulnerability in a software program can potentially be sold to the government: True.

<h3>What is vulnerability?</h3>

Vulnerability is any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker (hacker), in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.

This ultimately implies that, a vulnerability in a software application can potentially be sold to the government, so as to avert and mitigate any form of unauthorized access and privileges to sensitive user data.

Read more on vulnerability here: brainly.com/question/25813524

#SPJ1

4 0
2 years ago
SI TENGO: ¿R = 255, G0 =, B = 0, QUE COLOR OBTENGO?
Ymorist [56]

Answer:

Rojo

Explanation:

No, valores de otros colores 255 para rojo. Esto conducirá al color rojo.

5 0
3 years ago
Describe a situation in which a robot may have to avoid an obstacle without coming to a complete stop before turning.
Airida [17]

A robot may have to avoid an obstacle without coming to a complete stop before turning. If the robot is able to make a wide enough, long turn. instead of stopping, then turning sharply. For example if the robot were to come across an object and can sense said object before hand. it can then take action into turning before it is close enough.

3 0
3 years ago
Read 2 more answers
What is the result of expression 15 &gt; 10 &gt; 5 in C? What is the result of the same expression in Java?
Inessa05 [86]

Answer:

java: error

C: false

Explanation:

In Java the compiler understand that you are trying to compare an integer (15) with a boolean (10 > 5) this generate the next error:

error: bad operand types for binary operator  

In C the compiler convert (15 > 10 > 5) in (15>10) > (10>5) which is equal to TRUE > TRUE, the compiler can also read it as 1 > 1 (since 1 is TRUE and 0 is FALSE).  like 1>1 is false then C program return false.

5 0
3 years ago
Other questions:
  • The network ____, the person overseeing network operations, uses a server operating system to add and remove users, computers, a
    15·1 answer
  • What do you believe are the motives of a cyber criminal? Why?
    15·1 answer
  • You want to create Web pages that can easily adapt to and serve multimedia content to smartphones, tablets, gaming devices and s
    13·1 answer
  • What are two major techniques involved in green computing
    14·1 answer
  • Anyone know how to delete that I need ASAP
    13·1 answer
  • Which of the following are acceptable to share? Check all of the boxes that apply.
    13·1 answer
  • Why does computer uses 0s and 1s to procress data​
    7·2 answers
  • What influences my school my church and my leader on my society​
    8·1 answer
  • What is a benefit of an account with interest?
    5·1 answer
  • What are the tools in creating an animation?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!