1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill115 [55]
3 years ago
8

Which of the following activities is typical of the cognitive development level of infants and toddlers?

Computers and Technology
2 answers:
yan [13]3 years ago
8 0

Answer is- pretending that a block is a truck, they are getting to play with something that they see as not just a block but something else, they are using their imagination

Umnica [9.8K]3 years ago
7 0
Repeatedly dropping a block to see what happens. They don't understand the concept of gravity, so they don't know if it will fall every single time.
You might be interested in
Writing anything that comes to mind that may relate to your personal essay is called:
sammy [17]
My life career in computer science
7 0
4 years ago
Read 2 more answers
What is the purpose of system software?
suter [353]
"To preform specific useful computing tasks, like word processing and calculation" is the correct answer. This is the whole purpose of system software. The third answer is some other type of software(third party software?) and the fourth answer is most likely a compiler. Those are the easiest to take off. The second could also work.

The two answers I would go with are the first and the second.
8 0
3 years ago
The salespeople at hyperactive media sales all use laptop computers so they can have easy access to important data on the road.
laiz [17]

Answer:

By backing up the important information from the laptop computers to OneDrive, if a hard drive failure is to occur, assuming the salespeople have internet, they may access OneDrive and download any and all applicable data, resolving the issue.

6 0
4 years ago
For each of the following memory accesses indicate if it will be a cache hit or miss when carried out in sequence as listed. Als
nika2105 [10]

Answer:

Explanation:

Operation Address Hit? Read Value

Read 0x834 No Unknown

Write 0x836 Yes (not applicable)

Read 0xFFD Yes CO

6 0
3 years ago
Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
sertanlavr [38]

Answer:

Network

Availability is an essential part of Network security, and user behavior analysis and application analysis provide the data needed to ensure that systems are available.

7 0
3 years ago
Other questions:
  • A customer has a web server for a small business. The business uses both wired and wireless networking. A Linksys WRT300N wirele
    13·1 answer
  • An option button is a square button that enables you to make one choice among two or more options.
    15·1 answer
  • The email program shipped with Microsoft office
    15·1 answer
  • This program will convert a set of temperatures from Fahrenheit to Celsius and Kelvin. Your program will be reading in three dou
    11·1 answer
  • CAD workstations
    11·1 answer
  • "Switches break up _______________ domains and routers break up _____________ domains."
    14·1 answer
  • What are the programming concepts (within or outside the scope of IT210) that you would like to strengthen and delve into furthe
    11·1 answer
  • What are potential problems with using nanorobots ?
    14·1 answer
  • Edhesive intro to CompSci Test 7 answers pls
    5·1 answer
  • 3.2.3 What major al able to do? 3.2.4 What major advantage would Printer X have for Tembi who want documents printed? 3.3 If Tem
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!