1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liono4ka [1.6K]
3 years ago
10

Jelena is studying in her apartment when suddenly the power goes out. She has to walk to the kitchen to get a flashlight and is

surprised by how well she "navigates" without bumping into anything in the dark. She is able to do this because she has formed a(n) __________.a. ​conditioned response
b. ​cognitive map
c. ​unconditioned response
d. ​mental proposition
Social Studies
1 answer:
sweet [91]3 years ago
5 0

Answer:

b. ​cognitive map

Explanation:

A cognitive map also known as mental map is a kind mental or visual representation which helps an individual code, decode and recall information about locations in their environment. In other words, cognitive maps help an navigate their environment. There are no visual rules nor restrictions needed to be obey with cognitive map.

You might be interested in
Hello please I really need help with this please help me with this please please
KATRIN_1 [288]

Answer:

7 Types of Cyber Security Threats

Cyber security professionals should have an in-depth understanding of the following types of cyber security threats.

1. Malware

Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is activated when a user clicks on a malicious link or attachment, which leads to installing dangerous software. Cisco reports that malware, once activated, can:

Block access to key network components (ransomware)

Install additional harmful software

Covertly obtain information by transmitting data from the hard drive (spyware)

Disrupt individual parts, making the system inoperable

2. Emotet

The Cybersecurity and Infrastructure Security Agency (CISA) describes Emotet as “an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware.”

3. Denial of Service

A denial of service (DoS) is a type of cyber attack that floods a computer or network so it can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates from a computer network. Cyber attackers often use a flood attack to disrupt the “handshake” process and carry out a DoS. Several other techniques may be used, and some cyber attackers use the time that a network is disabled to launch other attacks. A botnet is a type of DDoS in which millions of systems can be infected with malware and controlled by a hacker, according to Jeff Melnick of Netwrix, an information technology security software company. Botnets, sometimes called zombie systems, target and overwhelm a target’s processing capabilities. Botnets are in different geographic locations and hard to trace.

4. Man in the Middle

A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party transaction. After interrupting the traffic, they can filter and steal data, according to Cisco. MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers insert themselves between the visitor and the network, and then use malware to install software and use data maliciously.

5. Phishing

Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number. “The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine,” Cisco reports.

6. SQL Injection

A Structured Query Language (SQL) injection is a type of cyber attack that results from inserting malicious code into a server that uses SQL. When infected, the server releases information. Submitting the malicious code can be as simple as entering it into a vulnerable website search box.

7. Password Attacks

With the right password, a cyber attacker has access to a wealth of information. Social engineering is a type of password attack that Data Insider defines as “a strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into breaking standard security practices.” Other types of password attacks include accessing a password database or outright guessing.

Explanation:

6 0
3 years ago
Dr. Martinez believes that people who lack a strong social support network have a higher risk of developing CVD because they are
KengaRu [80]

Answer:

Health Behavior Explanation

Explanation:

An action to maintain, attain, or regain good health and to prevent illness

5 0
3 years ago
A Temporal Investigation of Crash Severity Factors in Worker-Involved Work Zone Crashes: Random Parameters and Machine Learning
Nostrana [21]

A Temporal Investigation of Crash Severity Factors in Worker-Involved Work Zone Crashes: Random Parameters and Machine Learning Approaches:

Reason:

In the context of work zone safety, worker presence and its impact on crash severity has been less explored. Moreover, there is a lack of research on contributing factors by time-of-day. To accomplish this, first a mixed logit model was used to determine statistically significant crash severity contributing factors and their effects. Significant factors in both models included work-zone-specific characteristics and crash-specific characteristics, where environmental characteristics were only significant in the daytime model. In addition, results from parameter transferability test provided evidence that daytime and nighttime crashes need to be modeled separately. Further, to explore the nonlinear relationship between crash severity levels and time-of-day, as well as compare the effects of variables to that of the logit model and assess prediction performance, a Support Vector Machines (SVM)

What is meant by machine learning approach?

Machine Learning is an AI technique that teaches computers to learn from experience. Machine learning algorithms use computational methods to “learn” information directly from data without relying on a predetermined equation as a model.

Learn more about random parameter approach:

brainly.com/question/13739642

#SPJ4

6 0
2 years ago
How did the Constitution change the United States? Support your answer with evidence from the text.
fredd [130]
The constitution changed the United States by giving the people the right to vote.
6 0
3 years ago
What tense is used to describe physical mental and emotional states in the past?
Alina [70]
The tense that is applicable when describing physical, emotional and mental states in the past would be an IMPERFECT tense. Imperfect tense is usually used in other languages and comprises of past tense and and imperfective aspect. One language that uses this tense is the Spanish language.
6 0
3 years ago
Other questions:
  • In his classroom, mr. palinco introduces activities that build on his students' current thinking, challenging their incorrect wa
    9·1 answer
  • Tina is introducing her topic by saying, "today i will be talking about the fundamental emotional bond that develops between the
    5·1 answer
  • In The Federalist 78, Alexander Hamilton argued that the federal judiciary "is beyond comparison the weakest of the three depart
    9·1 answer
  • How can political parties be reformed​ ?
    7·2 answers
  • Which of the following programs is paid for partly by the federal government and partly by the states?a) Social securityb) Medic
    5·1 answer
  • The Democratic Party traces its beginnings to the campaign of Andrew Jackson. The Jacksonian Democrats were a party that advance
    12·1 answer
  • Which of the following BEST defines a Political Action Committee (PAC)?
    11·1 answer
  • PLS HELP I WILL GIVE BRAINLIEST !!!How have the Philippines and Indonesia become more democratic in recent decades?
    15·1 answer
  • Joaquin wants to play volleyball with his friends. Before Joaquin can play, his parents tell him that he must do the laundry, wh
    6·1 answer
  • Explain hormone secretions associated with sleep.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!