Ingrid works in the information technology department of a big company. Whenever the company hires someone new, she has to set up a new computer for them. In this scenario, Ingrid will easily be able to set up a computer because the information on how to set up the computer is stored in her Group of answer choices procedural memory. episodic memory. semantic memory. flashbulb memory.

Answers

Answer 1

Answer:

procedural memory

Explanation:

Procedural memory is a type of implicit memory (unconscious, long-term memory) which aids the performance of particular types of tasks without conscious awareness of these previous experiences.


Related Questions

to center data in a cell, click the ____ button on the ribbon.

Answers

To center data in a cell, click the center  button on the ribbon.

Data in a cell can be aligned either  horizontally or vertically .

For the  horizontal alignments, we have

against the left border, against the right border, and in the centre.

For the  vertical alignments, we have

against the top border, against the bottom border, and in the middle.

To center data, the following steps should be followed.

1.Click the cell where you want to center the data.  

2. Click "Home," then the small arrow in the bottom corner of the "Alignment" area of the ribbon.

3.Click the  drop-down box next to "Horizontal" and choose "Center." Do also for the "Vertical.

What is row and column? class 9​

Answers

Answer:

just click the picture

Explanation:

plz mark me a BRAINLEST plss I just need it

You need to replace the motherboard on a laptop. Which two items should you disconnect or remove first

Answers

Your motherboard should now be freely floating in your case—pull it out. With the old motherboard free, you'll need to remove its CPU cooler, CPU, and RAM so you can install it into your new motherboard.

A file contains 5000 bytes. Calculate the size of the file in kilobytes.
Your answer must be to one decimal place

You should show your working.

Answers

Answer:

5 Kilobytes

Explanation:

5000 bytes ÷ 1000 = 5 kilobytes

State one technique for overcoming external fragmentation in dynamic partitioning. Why is this technique of overcoming external fragmentation considered inefficient

Answers

Compaction often gives solutions to the issues regarding external fragmentation.

One technique for overcoming external fragmentation in dynamic partitioning is

Compaction.

The reason why this technique of overcoming external fragmentation may be inefficient is because:

External fragmentation may need a lot of compaction and it is an expensive operation.

The use of contiguous allocation is often hard to fit processes into memory and also it is so difficult to grow or shrink the amount of memory allocated to a process.

Compaction only takes place when relocation is dynamic, and this also is expensive.

Compaction often shuffle memory notes or contents and then put or pile them up all in free memory and in one large block.

External fragmentation takes place when free memory is removed into small blocks.

Learn more from

https://brainly.com/question/23636593

At the data science laboratory, the data scientists and data engineers are required to process millions of data every second to predict weather patterns and abnormalities. The data is then sent to all employees over a network, using a server.

State the type of computer system that is required for EACH of the following purposes..

Processing of scientific data ...........

Distribution of data over a network

Working from home .....

Answers

Answer:

the type of computer system that is required for processing of scientific data is : supercomputer

for distribution of data over a network :Client/server computing

working from home :A laptop

The computer that's needed for processing scientific data is the supercomputer.

The computer that is needed for the distribution of data over a network is the client or server computer while the computer that's needed for working from home is a laptop.

A supercomputer simply means a computer that has a high level of performance and has thousands of processors. The server computer provides functionality for other devices.

Learn more about computers on:

https://brainly.com/question/24540334

what is not an example of a changing operating space?

Answers

What is not an example of a changing operating space? A parking garage. Riley is driving down the highway when the road starts curving to the right.

Parking in garage is not an example of a changing operating space.

What is operating space?

When an operating space is said to be "changing," it usually means that the environment around your car is deteriorating or switching from an open to a closed state.

Operational Spaces are the space(s) inside the Facilities from which the Concessionaire shall have the right, privilege, and obligation to continuously and for the duration of the Term operate its concession in accordance with the terms and conditions of this Agreement.

Distractions while driving, such as texting and using a phone, driving dangerously, such as going too fast or following too closely.

Driving when intoxicated. While drinking and driving is not especially high among novices, it produces a disproportionate number of fatal crashes.

Thus, parking garage is the answer.

For more details regarding operating space, visit:

https://brainly.com/question/9339555

#SPJ6

what are the 4 types of satellite?​

Answers

Communications Satellite.

Remote Sensing Satellite.

Drone Satellite.

Ground Satellite.

using numerous computers to inundate and overwhelm the network from numerous launch points is called

Answers

Using numerous computers to inundate and overwhelm the network from numerous launch points is called: a DDos attack

John is given a laptop for official use and is on a business trip. When he arrives at his hotel, he turns on his laptop and finds a wireless accesspoint with the name of the hotel, which he connects to for sending official communications. He may become a victim of which wireless threat

Answers

Answer:

Evil Twins Attack

Explanation:

When John connects to the wireless access point with the name of the hotel, it could be a fake SSID created by a hacker. When John connects to this "evil twin" the hacker can start to steal data.

How do people get in your computer

Answers

Answer:

????

Explanation:

This is absurd, you cannot enter your computer. it is to tiny for you to fit in.

Answer:

Explanation:

I don’t know

(NOT A AND B) AND (NOT A AND NOT C) OR (B AND C) logic Gates
draw the logic circuit​

Answers

answer:

((!A && B) && (!A && !C) || (B && C))

I hope the drawing is clear enough.

can you still receive messages on messenger from a person when you deleted the conversation with them? (But not blocked them)

Answers

yes cause you didn’t block them

In the 1990s, DVDs replaced audiocassettes and floppy disks as the storage media of choice for music and computers. At which stage of the product life cycle is the DVD today

Answers

Answer:

Maturity

Explanation:

what is a drone satellite?​

Answers

Answer:

A satellite that can be controlled where to go.

Explanation:

To break a text string into several lines, which means that the text string continues on the next line, the _____ character should be used.

Answers

Answer:

To break a text string into several lines, which means that the text string continues on the next line, the backslash character should be used.

what is a collection of web pages containing text images audio and videos.​

Answers

Answer: A website..?

What type of access controls allow the owner of a file to grant other users access to it using an access control list

Answers

Answer:

Discretionary Access Control

Explanation:

The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control.

What is discretionary access control?

This is known to be a type of control that gives one a specific amount of access control to the use of the object's owner, or any other person.

Note that The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control as it only gives a little access.

Learn more about Discretionary Access from

https://brainly.com/question/20038736

#SPJ2

When you declare a method, you also need to provide the method ______________, which consists of statements that are executed when the method is called.

Answers

When you declare a method, you also need to provide the method body, which consists of statements that are executed when the method is called.

Hope this helps!

Which Windows Server 2016 core technology provides a single interface for installing, configuring, and removing a variety of server roles and features on your Windows server

Answers

Answer:

Server manager

Explanation:

Samantha wants to begin searching for a job using the Web. The best source for her online search will probably be __________.

Answers

Answer:

C) A company's website

Explanation:

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in _____ for file servers.

Answers

Answer:

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in high-volume data storage for file servers.

3
Select the correct answer.
Dan works for an automobile company. He has designed a new model of a car based on an older version. Which technology can he use to
present the model at a board meeting?

Answers

Answer:

he can use microosoft word, gooogle docs/slides, or any old tech because it will present from any

Explanation:

What is the output of the statements below? int a = 10; int b = 20; int count = 0; if (a > 5) if (b > 5) { count ++; } else count = 7;

Answers

Answer:

The output of count would be 1.

Explanation:

The first if statement is true. Since 10 > 5

The second if statement is true. Since 20 > 5

So,

count ++;  // That increments the variable count by 1

the else statement is not provoked since the if statements were correct.

is invalid in the select list because it is not contained in either an aggregate function or the group by clause.

Answers

Answer:

Column

Explanation:

Anote los tipos de direcciones de IP que existen.​

Answers

Answer:

ENGLISH PLEASE.

Explanation:

Which NTFS permission for a folder is defined as enabling you to read, write, and delete both files and subfolders

Answers

Change the perms to be you not trustedinstaler


Who plays a role in the financial activities of a company?

Answers

The chief financial officer

You want to kill all process IDs of a specific process with a single command. Which command should you use

Answers

Answer:

killall

Explanation:

How to edit an existing recipient list? class 9 for(3 marks)​

Answers

Answer:

(Archives) Microsoft Word 2003: Mail Merge: Working with the Recipient List

Last updated Monday, Aug. 31, 2020, at 10:35 a.m.

This article is based on legacy software.

For a successful Mail Merge, you will need to establish a recipient list, also referred to as the data source. This contains the information that will vary with each record, such as names or identification numbers. If you are creating a mailing list, for example, names and addresses will be included in your data source.

You can either create a new data source or use a pre-existing source, such as your Outlook Contacts. You may also wish to alter the entries in your data source without having to open it, change the appropriate entries, and then save the changes. Mail Merge allows you to specify which individual entries you want to include as well as add and delete data document entries and fields.

Creating a New Data Source

Before creating the data document, take a moment to plan out the information you want to include. While creating your data document, you can add or remove fields to tailor the document to suit your needs. Creating a new data source is an option in the third step of the Mail Merge Wizard.

Other Questions
how can we improve hydraulicity of lime? what is the golden ratio how fast will you die from carbon monoxide poisoning suppose 40% of college students plan to vote in the election. now suppose we randomly select 200 college students and ask them if they plan to vote. what is the probability that more than 75 of the 200 students sampled plan to vote? what is the slope of the line on the graph Given: f(x)= 3x-7 for x>0f(x)=-2x+3 for x Order. Administer Heparin 6,200 units subcut now.Which vial should the nurse use to administer the least volume into the injection site?10 unit vial5,000 unit vial1,000 unit vial10,000 unit vial Name the postulate or theorem that you can use to show the triangles are congruent. Then explain why the statement is true. PLEASE HELP NEED TO GET THIS RIGHT WILL GIVE BRAINLIEST A client continues to report dyspnea on exertion and overall weakness. A pulmonary artery catheter is placed and the mean pulmonary arterial pressure is 35 mm Hg. What condition is the client experiencing Research and find out about the changes in business sectors of Pakistan from 1947 to date. Give reasons for the changes you have identified. (10) Sometimes a story's setting creates the story's conflict. Which of these settings is most likely to create conflict? a grocery store a deserted island a school library a vacation cabin i will make you brain What is the value of x in this triangle? If f(1) = 5 and f(n) = 4f(n 1) - 2 then find the value of f(5). What does paragraph 1 suggest about Fuller?She is scornful of women who repeatedly excuse their husbands immoral and criminal behavior.She feels men abuse their power to control those without rights, such as women and enslaved persons.Fuller is against the institution of marriage because it does not benefit women. Fuller demands severe consequences for men who cannot financially support their families. b. Solve 3v 5 = 2v + 10 by gathering the constant terms on the left sideand the variable terms on the right side of the inequality. Calculate the molarity of a solution prepared by diluting 165 mL of0.700 M calcium chloride to 900.0 mL. Please answer the picture What is the lawin and sisiw game? What is the polar form of -9-9i sq root 3