1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nata0808 [166]
3 years ago
7

Jamie found the ISBN of the book she wanted to order in the Books in Print Catalog. To remember the eleven-digit number, 1977255

2901, she thought of the number as the year her best friend was born (1977) and her aunt's phone number (255-2901). Jamie was using the strategy of _____ to help her remember the ISBN number.
Computers and Technology
1 answer:
algol133 years ago
5 0

Answer:

Chunking

Explanation:

Chunking refers to the process of taking individual pieces of information (called chunks) and grouping them into larger units. By grouping each piece into a large whole, you can improve the amount of information you can remember.

You might be interested in
Describe the series of connections that would be made, equipment and protocol changes, if you connected your laptop to a wireles
Serggg [28]

Answer:

Check Explanation.

Explanation:

Immediately there is a connection between your laptop and the wireless hotspot, data will be transferred via the Physical layer that will be used for encoding of the network and the modulation of the network and that layer is called the OSI MODEL.

Another Important layer is the APPLICATION LAYER in which its main aim and objectives is for support that is to say it is used in software supporting.

The next layer is the PRESENTATION LAYER which is used during the process of sending the e-mail. This layer is a very important layer because it helps to back up your data and it is also been used to make connections of sessions between servers of different computers

5 0
3 years ago
Join my giggl PLEASE i am so bored link will be in comments
asambeis [7]

Answer:

in which app we had to join

5 0
2 years ago
Read 2 more answers
State three reasons why users attach speakers to their computer​
____ [38]

Answer:

For listening sake

To listen to information from the computer

They receive audio input from the computer's sound card and produce audio output in the form of sound waves.

8 0
3 years ago
From a neural network with 11 input variables, one hidden layer with three hidden units, and one output variable, how many param
e-lub [12.9K]

Answer:

40

Explanation:

Given that:

A neural network with 11 input variables possess;

one hidden layer with three hidden units; &

one output variable

For every input, a variable must go to every node.

Thus, we can calculate the weights of weight with respect to connections to input and hidden layer by using the formula:

= ( inputs + bias) × numbers of nodes

= (11 + 1 ) × 3

= 12 × 3

= 36 weights

Also, For one hidden layer (with 3 nodes) and one output

The entry result for every hidden node will go directly to the output

These results will have weights associated with them before computed in the output node.

Thus; using the formula

= (numbers of nodes + bais) output, we get;

= ( 3+ 1 ) × 1

= 4 weights

weights with respect to input and hidden layer total = 36

weights with respect to hidden and output layer total = 4

Finally, the sum of both weights is = 36 + 4

= 40

6 0
2 years ago
Who wants to be my tutor?
anzhelika [568]

Answer:

i would but im not big brain

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • You have been asked to create an authentication security plan for your company. Which of the following components would you inco
    14·1 answer
  • Help me Please?!! I will put you as brainliest.<br>I hope I spelled that right.
    5·2 answers
  • Which of the following is NOT something you can specify in the bullets and numbering dialog box?
    8·1 answer
  • Technological uncertainty:
    15·1 answer
  • What is the radix transformation method?
    5·1 answer
  • What is the encryption cipher that was the precursor to des??
    5·1 answer
  • An alteration threat violates information integrity. <br> a. True <br> b. False
    13·1 answer
  • L00000000000000000000000000000000000000000000000000000000l they b00ty tickled
    6·2 answers
  • This sensor is used for burglar alarms<br>A. temperature<br>b. humidity<br>c. movement<br>d. PH​
    15·1 answer
  • Professional communication must be objective,
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!