1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jolli1 [7]
3 years ago
15

Transforming a message into an understandable sign and symbol system is _________.

Computers and Technology
1 answer:
Nataly_w [17]3 years ago
4 0

Answer:

The correct answer to the following question will be "Encoding".

Explanation:

Encoding is the method of bringing into a standardized format a series of characters (words, figures, punctuation, and certain signs or symbols) for effective communication or storage.

The four main encoding styles are as follows:

  • Visual
  • Acoustic
  • Elaborative
  • Semantic.

Encoding aims is to translate data so that a particular system can properly interpret it, e.g. binary data to be sent via email, or displaying special characters on a website page. The aim is not to keep the information hidden but also to ensure it could be accessed properly.

Therefore, Encoding is the right answer.

You might be interested in
A network administrator needs 10 prevent users from accessing the accounting department records. All users are connected to the
mojhsa [17]

Answer:

C

Explanation:

6 0
3 years ago
Read 2 more answers
____ is suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Levart [38]

Answer: a. RADIUS

Explanation:

RADIUS as developed with the idea of allowing its users or clients to be able to authenticate to a dial-in access server. So basically it is a client server protocol and he client here is the firebox and the server is the RADIUS server.  

The authentication mechanism start by user who sends a message to the RADIUS server. Then the RADIUS server upon receiving the message accept or denies it. It accepts if the client is configured to the server.

A large amount of additional information can be sent by the RADIUS server in its Access-Accept messages with users so we can say that RADIUS is uitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.

3 0
3 years ago
A usability study compares the number of page visits on a web site. Half of the participants saw Version A of the home page. The
USPshnik [31]

Answer:

d. A web analytic

Explanation:

Web analytic measure activity and behavior of a user on a website, for example: how many users visit, how long they stay, how many pages they visit, which pages they visit, and whether they arrive by following a link or not.

Ordinal data is a categorical, statistical data type where the variables have natural, ordered categories and the distances between the categories is not known.

Dependent variable rely on another variable to get a value

Independent variable are variable which can be gotten on their own without relying on another variable.

7 0
3 years ago
Molly, an end user, connects an external monitor, external keyboard and mouse, and a wired network cable to her laptop while wor
ale4655 [162]

Answer:

The answer is D and E

Explanation:

There is no much difference between a port replicator and a docking station. These two terms are used interchangeably and both serve the same purpose of connecting portable computers with other devices with little or no effort. The main difference between the two is that a port replicator provides a solution for all laptops through USB while a docking uses a propriety connector to the computer. Users can use a docking station and a port replicator to convert their laptop PCs into desktop computers when at home or in the office.

7 0
3 years ago
What is an effective technique for searching the web? Choose one.
kakasveta [241]
Option B is what i would say 

if you are searching something and want a specific answer you are going to need to be specific on how you search it
4 0
3 years ago
Read 2 more answers
Other questions:
  • How do smart watches affect the business and its position in the global marketplace?
    12·2 answers
  • What is a computer??????????????????????????????????????????????????????????
    12·2 answers
  • A complete traversal of an n node binary tree is a(n)____ "operation if visiting a node is O(1)for the iterative implementation
    5·1 answer
  • Which are valid double statements for java? double a = 0; double b = -1.0; double c = -425; double d = 6340; double e = -1.0; do
    12·2 answers
  • Technician A says that the ECT and IAT sensors can be tested by using a digital multimeter or a scan tool. Technician B says tha
    12·1 answer
  • How do emotions affect purchasing decisions?
    6·1 answer
  • Implement RandMultipByVal function, which gets one integervariable as its argument
    12·1 answer
  • In Microsoft Excel, you are working with a large worksheet. Your row headings are in column A. Which command(s) should be used t
    7·1 answer
  • Lori Redford, who has been a member of the Project Management group, was recently promoted to manager of the team. She has been
    12·1 answer
  • Set screw compression and indenter are all types of
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!