1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrei [34K]
4 years ago
12

Which one these describe the use of the word wall technique?

Computers and Technology
1 answer:
lana66690 [7]4 years ago
8 0

A word wall is a technique or a literacy tools mainly used by the students who are creating memorable experiences like in remembering of new words in vocabulary. In schools, word wall is commonly placed on bulletin boards where a collection of words are displays in visible letters.

You might be interested in
What are the high and low temperatures on Saturn? (C)
slava [35]
Saturn contains three layers of clouds. The upper layers of ammonia ice have temperatures ranging from minus 280 F to minus 170 F. The next layer contains water ice, with temperatures from minus 127 F to 26.Temperatures in the lower layers climb as high as 134 F.
8 0
3 years ago
g Q 2 Suppose I need a data structure having the following characteristics: a) must be very space efficient, and b) I have a goo
SIZIF [17.4K]

Explanation:

a.I would choose an advanced data structure like  dispersion tables.

Scatter tables, better known as hash tables, are one of the most frequently used data structures. To get an initial idea, scatter tables make it possible to have a structure that relates a key to a value, such as a dictionary. Internally, the scatter tables are an array. Each of the array positions can contain none, one or more dictionary entries.

It will normally contain a maximum of one, which allows quick access to the elements, avoiding a search in most cases. To know at which position in the array to search or insert a key, a scatter function is used. A scatter function relates each key to an integer value. Two equal keys must have the same dispersion value, also called a hash value, but two different keys can have the same dispersion value, which would cause a collision.

B. If I eliminated the characteristic b, a possible candidate keeping the previous characteristics would be: Balanced binary trees

Balanced binary trees are data structures that store key-data pairs, in an orderly way according to the keys, and allow quick access to the data, given a particular key, and to go through all the elements in order.

They are appropriate for large amounts of information and have less overhead than a scatter table, although the access time is of greater computational complexity.

Although the storage form has a tree structure internally, this is not externalized in the API, making the handling of the data transparent. They are called balanced because, each time they are modified, the branches are rebalanced in such a way that the height of the tree is as low as possible, thus shortening the average time of access to the data.

5 0
3 years ago
Who is GodLJonathan?​50 FREE POINT$!!
Irina-Kira [14]

Answer:

i don't know..

..goo gle it ...............

6 0
3 years ago
Read 2 more answers
Which of the following views would you use to see your Web page while working on it?
geniusboy [140]

source?source?source?source?

7 0
3 years ago
Information permanently stored on a hard disk, diskette, cd-rom disk, or tape, is called ________ storage.
Olegator [25]
All of them are persistent (will survive a reboot). A CD-rom may also be immutable, if it can't be rewritten.
7 0
3 years ago
Other questions:
  • You can install several printers on your machine, but at least one must be the _______ printer.
    6·1 answer
  • I need help with question 3 I’ll give brainliest
    10·2 answers
  • Write a class Bug that models a bug moving along a horizontal line. The bug moves either to the right or left. Initially, the bu
    7·1 answer
  • A) What is the initial configuration BPDU for B4? B) What is the configuration BPDU of B3 after receiving the initial configurat
    11·1 answer
  • You are writing a program using the Java language. Which of the following is a requirement of Java syntax?
    6·1 answer
  • Host A sends two UDP segments to Server S, one to port 1234 and the other to port 2345. Host B sends one UDP segment to Server S
    8·1 answer
  • Giusp minfg gấp vs ạ đáp án thôi nhé
    15·1 answer
  • What are the two methods of creating a folder​
    11·1 answer
  • Why aren't my skullcandy bluetooth headphones connecting to my school chromebook if I turned on both the headphones and the blue
    10·2 answers
  • A program that converts a program to binary all at once and runs the entire program when finished with the conversion
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!