1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
3 years ago
8

When you take a multiple-choice test, you are relying on ________, a means of retrieving information out of your long-term memor

y storage system that helps you choose the correct answer.
Computers and Technology
1 answer:
miv72 [106K]3 years ago
4 0

Answer:

recognition

Explanation:

<h2><u>Fill in the blanks</u></h2>

When you take a multiple-choice test, you are relying on <u>recognition</u> , a means of retrieving information out of your long-term memory storage system that helps you choose the correct answer.

You might be interested in
I got a question in computer science I don't understand, can someone please help.​
AnnyKZ [126]

Answer:

Hi, this program allows you to calculate a sphere’s area and volume depending on the radius of your choosing.

Please give brainliest, means alot!

6 0
3 years ago
If Carly wants to add wind belts for the part of the Atlantic just south of the equator, how should she draw the arrows?The arro
AnnyKZ [126]

If Carly wants to add wind belts for the part of the Atlantic just south of the equator, she should draw the arrows upward to the left. <span> At the South of the equator are trade winds which blow wind from the northeast toward the equator. </span>

4 0
3 years ago
What is not an example of a job skill
ikadub [295]

Being dishonest, irresponsible and unpunctual.Answer:

Explanation:

8 0
2 years ago
Read 2 more answers
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
3 years ago
If you type too much text on a PowerPoint slide the additional text is _____
IrinaK [193]
The text just goes out of the slide and you can't see it until you lower the font size or until you delete some of it.
3 0
3 years ago
Other questions:
  • Which binary number is equivalent to the decimal number 104?
    9·1 answer
  • It would be system unit on this test
    7·1 answer
  • PowerPoint Presentation on What type of device will she use to display her presentation and explain it to the rest of the childr
    13·2 answers
  • Consider the following class declaration: public class Square { private double sideLength; public double getArea() { return side
    13·1 answer
  • What process identifies and grants access to a user who is trying to access a system? A. Credibility
    13·1 answer
  • True or false for a given set of input values, a nand
    7·1 answer
  • Convert 128 GB into KB​
    8·2 answers
  • What is the purpose of the GETPIVOTDATA function?
    13·2 answers
  • An entrepreneur identifies and fills the gap between what the society needs and what is available is called​
    5·1 answer
  • Which programming languages is best for game development? ​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!