1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LenaWriter [7]
3 years ago
14

in a famous experiment a dog drool at a sound that is made just before meals. This is considered a(n)-------------------- respon

se
Computers and Technology
1 answer:
nataly862011 [7]3 years ago
4 0

Answer:

Conditioned response

Explanation:

In a famous experiment a dog drool at a sound that is made just before meals. This is considered a(n) conditioned response.

The dog has been conditioned to respond to the constant sound before his meal is served by drooling(salivating ) with the expectation of eating almost immediately after the sound had been made .

You might be interested in
Which product is made using bacteria?<br>O A. Maple syrup<br>O B. Cork<br>O C. Latex<br>D. Yogurt​
yarga [219]

Answer:

The answer is D

Explanation:

5 0
3 years ago
What is control structure write it's types​ .
MAXImum [283]

Answer

<u>Defination</u><u>-</u><u>:</u>

A control statement is a statement and a statement whose execution its control.

<u>Types-:</u>

  • Selection Statement
  • Iteration Statement
  • Unconditional branching Statement
4 0
3 years ago
Which of the following is NOT true about adjustment layers? brainbuffet
otez555 [7]

Answer the adjustment layers can not be used a lot?

Explanation: i think that was it

6 0
3 years ago
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
4 years ago
Name an analog quantity other than temperature and sound
liq [111]
I know that this might be wrong but is it light?
6 0
4 years ago
Other questions:
  • In order to protect your computer from the newest virus, which of the following should you do after you've installed a virscan s
    9·1 answer
  • What happens when a returntype, even void, is specified as a constructor in Java?
    14·1 answer
  • An automated search feature used by search engines to find results that match your search terms is called a spider or ?
    5·1 answer
  • What letter names the drive where windows most commonly stores data and files
    13·1 answer
  • There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
    5·1 answer
  • Research shows that a passive close to a cover letter leads to more interviews. Please select the best answer from the choices p
    8·2 answers
  • Why might you complete a 1040 instead of a <br> 1040ez
    11·2 answers
  • Which practice is the safest way to sit at a desk while typing on the computer?
    12·1 answer
  • 12. How many different documents can<br> you have open at one time?
    8·1 answer
  • Write a subclass called SavingsAccount that extends Account and adds an interest rate variable. Write a constructor with 3 argum
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!