![subject](/tpl/images/cats/informatica.png)
Computers and Technology, 29.10.2021 08:20 graymonky12
Heather writes an essay for language arts and receives a poor grade. To figure out why she gets a poor grade, Heather looks at the writing rubric and compares it to the comments in her essay. She asks herself two questions.
1. “Which parts of the writing rubric did I master?”
2. “Which parts did I miss and still need work on?”
What strategy is Heather using to evaluate her work?
Complete the sentence below.
Heather is using the “ blank ”
strategy
![ansver](/tpl/images/cats/User.png)
Answers: 2
![](/tpl/images/ask_question.png)
![](/tpl/images/ask_question_mob.png)
Another question on Computers and Technology
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 23.06.2019 13:00
Which of the following statements is false? a. a class can directly inherit from class object. b. if the class you're inheriting from declares instance variables as private, the inherited class can access those instance variables directly. c. a class's instance variables are normally declared private to enforce good software engineering. d. it's often much more efficient to create a class by inheriting from a similar class than to create the class by writing every line of code the new class requires.
Answers: 3
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 24.06.2019 10:50
In 2009 to 2010, how many social network users were reported as being victims of online abuse? a. 1 in 10 b. 100% c.1 in 100 d. 50%
Answers: 2
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 24.06.2019 15:30
What type of forensic evidence was recovered during the bomb set off at the new mexico facility on the video that was similar to the evidence obtained at the boston bombings and how did the evidence allow the researchers to connect other pieces of evidence to the same bomb?
Answers: 2
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 24.06.2019 18:10
Most information security incidents will occur because of select one: a. users who do not follow secure computing practices and procedures b. increases in hacker skills and capabilities c. poorly designed network protection software d. increasing sophistication of computer viruses and worms
Answers: 1
You know the right answer?
Heather writes an essay for language arts and receives a poor grade. To figure out why she gets a po...
Questions
![question](/tpl/images/cats/health.png)
Health, 05.10.2020 16:01
![question](/tpl/images/cats/geografiya.png)
Geography, 05.10.2020 16:01
![question](/tpl/images/cats/himiya.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 05.10.2020 16:01
![question](/tpl/images/cats/en.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 05.10.2020 16:01
![question](/tpl/images/cats/istoriya.png)
History, 05.10.2020 16:01
![question](/tpl/images/cats/istoriya.png)
![question](/tpl/images/cats/fizika.png)
Physics, 05.10.2020 16:01
![question](/tpl/images/cats/mat.png)
Mathematics, 05.10.2020 16:01
![question](/tpl/images/cats/mat.png)
Mathematics, 05.10.2020 16:01
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 05.10.2020 16:01
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 05.10.2020 16:01
![question](/tpl/images/cats/en.png)
![question](/tpl/images/cats/en.png)
![question](/tpl/images/cats/istoriya.png)
![question](/tpl/images/cats/istoriya.png)
History, 05.10.2020 16:01
![question](/tpl/images/cats/mat.png)
Mathematics, 05.10.2020 16:01