1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jolli1 [7]
3 years ago
15

Transforming a message into an understandable sign and symbol system is _________.

Computers and Technology
1 answer:
Nataly_w [17]3 years ago
4 0

Answer:

The correct answer to the following question will be "Encoding".

Explanation:

Encoding is the method of bringing into a standardized format a series of characters (words, figures, punctuation, and certain signs or symbols) for effective communication or storage.

The four main encoding styles are as follows:

  • Visual
  • Acoustic
  • Elaborative
  • Semantic.

Encoding aims is to translate data so that a particular system can properly interpret it, e.g. binary data to be sent via email, or displaying special characters on a website page. The aim is not to keep the information hidden but also to ensure it could be accessed properly.

Therefore, Encoding is the right answer.

You might be interested in
I watched an ad but the im button done is no where in sight, has anyone else experienced this recently. it was fine a few days a
Maurinko [17]

Answer:

This is usually just a small glitch that happens sometimes when you are seeing an ad and wanting to skip. Simple fixes to this problem include refreshing the browser or closing the application that you are in. This also would happen to me but following this fix should help with the problem.

7 0
2 years ago
A user calls your help desk to report that the files on her USB stick do not have any permissions associated with them and there
Delicious77 [7]
It is (D) because FAT 32 is the most secure option that is why it is most popular
7 0
3 years ago
Read 2 more answers
7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering personal i
beks73 [17]

Answer:

D

Explanation:

Malware can be used for many things, a click of a button can send complete access to the attacking system. Malware comes in all formes and powers.

4 0
2 years ago
Rafael needs to add a title row to a table that he has inserted in Word. What should he do? Use the alignment options. Use the M
raketka [301]

Answer:

Answer is C

Explanation:

6 0
3 years ago
Read 2 more answers
Bunch of points!!!!!!! help pls
alex41 [277]
Most likely B. Photographs.

Hope this helps!

Have a good day!
4 0
3 years ago
Read 2 more answers
Other questions:
  • 1. Describe an application where a series circuit might work better than a parallel circuit
    11·2 answers
  • A technology company only hires applicants who are under the age of 30. This company could face possibly _________ consequences
    9·2 answers
  • You resurrected an old worksheet. It appears to contain most of the information that you need, but not all of it. Which step sho
    5·1 answer
  • A computerized spreadsheet program is useful for
    6·2 answers
  • Multiple client switches and routers have been set up at a small military base. The network team decided to implement Terminal A
    15·1 answer
  • ​open-source software is​ ________.
    11·1 answer
  • This is in government
    15·1 answer
  • What is the by stander effect
    9·1 answer
  • Which insert image option allows a user to compile, modify, and add captions to images?
    5·2 answers
  • A group of two or more computer systems linked together via communication devices is called:.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!