1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Galina-37 [17]
3 years ago
14

Describe the Say It, Cover It, Resay It method.

Computers and Technology
2 answers:
bazaltina [42]3 years ago
7 0
You read it aloud to whilst looking at the word, then it when you are confident enough you cover up the word and repeat saying it aloud
kozerog [31]3 years ago
4 0

Explanation:When reading a difficult text, use the Say It, Cover It, Resay It method: Read aloud a sentence or chunk of text with difficult vocabulary. Cover the text or look away from the text. Resay the text using your own words.

You might be interested in
Create a button to play the playlist <br><br> Java, netbeans
Pavel [41]
I'm not sure but maybe one of the two websites can help you
.
http://wiki.netbeans.org/MusicAppUsingRESTRemoting

https://mukeshscience.wordpress.com/2014/05/26/adding-audio-to-java/

6 0
3 years ago
Read 2 more answers
Which of these number formats would you want to apply to a cell showing the total sales for the month? Currency, Number, or Perc
ollegr [7]

Answer:

Currency

Explanation:

Since sales are in money, and currency shows money, Currency is our answer

3 0
3 years ago
Read 2 more answers
Consider the following definition of a recursive method. public static int mystery(int[] list, int first, int last) { if (first
ozzi

Answer:

c. 27

Explanation:

  • In recursion method, a method calls itself until a condition becomes true and returned back. In mystery(), at first time, first is 0 and last is 4. Condition is checked and 0!=4 so else part is executed in which again mystery is called with first as 1 and last 4. This will go again and again until first=4.
  • When first=4 it is also equal to last so if part is executed and alpha[4] is returned which is 9, now it comes alpha[3] +9 which is 8+9 =17 .
  • It is returning values to its previous calls that is why it will reduce to alpha[0]+alpha[1]+alpha[2]+17 which is nothing but sum of all elements of a alpha
  • Then, 1+4+5+8+9=27.
5 0
3 years ago
Which design principle will help me add an element of interest in my poster by avoiding confusion and monotony?
Rasek [7]

Answer:

You could add pictures to help convey the viewer, while capturing their attention. It will provide great interest as well.

Explanation:

Me being a viewer, I love to see pictures. They help explain the topic, while keeping my attention.

7 0
3 years ago
Suppose you want to find a specific piece of hardware at the lowest price, and you don't mind if it's used. Which type of purcha
tino4ka555 [31]

Answer:

consumer-to-consumer auction site

Explanation:

The best type of purchase for this scenario would be a consumer-to-consumer auction site. These sites allow anyone to make a publication selling their product. This publication can be seen by anyone around the world. It is the best way of finding the cheapest prices for a specific item. The condition of the items on these sites can vary. The majority of the time they are used items in good conditions, but can also be new items or very worn out items being sold for parts.

7 0
3 years ago
Other questions:
  • Rose has a list of two columns of information separated by tabs. She wants to input this information into a table. What is the f
    15·2 answers
  • 2. Consider a 2 GHz processor where two important programs, A and B, take one second each to execute. Each program has a CPI of
    12·1 answer
  • Home communication involves controlling systems such as heating, cooling, and security.
    11·1 answer
  • Which of the following statements is true of intrapreneurs
    15·1 answer
  • NEED HELP NOW 25 POINTS WILL MARK BRAINLIEST!!!!!!!
    8·1 answer
  • Which statement accurately describes DTP programs?
    11·1 answer
  • What subsection of the Internet requires specialized browser to access and is frequently used by cyber criminals and underground
    10·1 answer
  • The _______ of a secondary storage device indicates how much data the storage medium can hold.
    13·1 answer
  • What is the meaning of antimonographycationalis​
    9·2 answers
  • For a business that is properly using a social media information system, the system can
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!