1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timurjin [86]
3 years ago
13

Which is an example of intrinsic motivation?

Computers and Technology
2 answers:
kkurt [141]3 years ago
5 0

Answer: allowing time to do an after-school activity once studying is done

Explanation: Motivation could be explained as any event, factors or circumstances which increases an individual's willingness, zeal or strength to do something. Motivation could also be inform of incentive or reward which one stands to gain when a certain assignment or mission is accomplished.

However, Intrinsic motivation refers to a class of motivation which are triggered naturally. When a motivation is intrinsic, there is no usually no obvious and or external source of motivation, incentive or reward attached to one's quest of doing something. In the scenario above, all other options except allowing time to do an after-school activity once studying is done have a lucid external incentive which the individual stands or aims to achieve by studying.

andrew-mc [135]3 years ago
4 0

Answer:

C

Explanation:

Doing extra study beyond what is needed to score well on the test.

You might be interested in
Privacy laws in other countries are an important concern when performing cloud forensics and investigations. You've been assigne
Klio2033 [76]

Answer:

See the explanation for the answer.

Explanation:

Australian regulations makes extremely difficult for the enterprises to move organizations sensitive data to the cloud which is storing outside the Australian network. These are all managed by the Office of Australian Information Commissioner(OAIC) which provides oversight on the data privacy regulations designed to govern the dissemination of the sensitive information.

One rule they applied under this is The Australian National Privacy Act 1988 which tells how the organizations collect, use, secure, store the information. The National Privacy Principles in the Act tells how organizations should use the people's personal information. The NPP has a rule that An organization must take the responsibility to hold the information without misuse or modified by unauthorized access. They require enterprises to put security service level agreements with the cloud service providers that define audit rights, data location, access rights when there is cross border disclosure of information.

In later time they introduced a new principle called The Privacy Amendment Act 2012. This principle gives set of new rules along with the changes in the many rules in the previous act and also this is having a set of new principles those are called Australian Privacy Principles (APP).

In this there is principle for cross border disclosure of personal information which is APP8. This rule regulates the disclosure or transfer of personal information by an agency or company to a different location outside the country.

Before disclosure the information outside they have to take responsible steps that the company outside the Australia must not breach the APP 's.

3 0
3 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
The information that a program requires in order to accomplish its objective is called the.
ivolga24 [154]

The information that a program requires in order to accomplish its objective is called input.

<h3>What is a program?</h3>

A program is a set of instructions by which the computer performs various tasks. The program is a sequence of instructions that are followed by the computer to run. An example is Microsoft Word.

A computer program comes under software. The sequence code of a program that is readable by humans is called source code. The program is run by information that is called input.

Thus, the data that a program needs in order to achieve its goal is referred to as input.

To learn more about the program, refer to the below link:

brainly.com/question/14368396

#SPJ4

8 0
1 year ago
Which of the following is not an interconnector?
igor_vitrenko [27]

The following is not an interconnector :

A wireless keyboard jack

Explanation:

  • An interconnector is a structure which enables energy to flow between networks.
  • An electrical or optical connection or cable that connects two separate devices.
  • Since a wireless device does not have a cable connecting the two, they are not an interconnector.
  • The cable that connects your monitor or hard drive to the computer system is called an interconnect.
  • Switches can be used to connect together a number of end-user devices such as workstations, or to interconnect multiple network segments.
  • A standard computer system will contain multiple interconnects.
3 0
3 years ago
What best describes the difference between plagiarism and fair use
Colt1911 [192]
The answer is ..........
 
<span>Fair use </span>

The doctrine of fair use allows the limited use of copyrighted material for certain educational, scholarly and research purposes without the permission of the copyright owner. It applies to any copyrighted material regardless of source, including the Internet. If you photocopy a page from one of your textbooks or print a page from a copyrighted Internet site for certain educational, scholarly or research purposes, your actions may fall under the doctrine of fair use. The copyright laws give you permission to copy the work<span> (with certain limitations), even though the owner of the copyright did not.


V.S

</span>Plagiarism

Plagiarism is "the representation of another's work or ideas as one's own; it includes the unacknowledged word-for-word use and/or paraphrasing of another<span> person's work, and/or the inappropriate unacknowledged use of another person's </span><span>ideas" (The Ohio State University Code of Student Conduct). This means that if </span><span>you use another person's work when completing any academic assignment,</span><span> </span><span>regardless </span>

5 0
3 years ago
Read 2 more answers
Other questions:
  • Define the method object inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids.Sample output for the g
    11·1 answer
  • In two to three paragraphs, come up with a way that you could incorporate the most technologically advanced gaming into your onl
    10·1 answer
  • Which of the following is a true statement? Question 33 options: Data entities correspond to sources/sinks on a data flow diagra
    14·1 answer
  • Hi <br> What exactly does this project want from me?thanks for riding
    5·1 answer
  • "under the control panel, what console contains print management, computer management, and event viewer?"
    11·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    6·1 answer
  • Which of the following is a strength of fiscal policy?
    15·1 answer
  • Which branch of science helps avoid or minimize stress-related injuries at workplace?
    12·2 answers
  • Please help me with this question. I don’t get it
    11·2 answers
  • There is an application which inputs hundred numbers from the user, if user enters a positive number it increments valid numbers
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!