1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill115 [55]
3 years ago
15

Encoding is the process:

Computers and Technology
1 answer:
vodomira [7]3 years ago
5 0

Answer:

Of translating an idea or a thought into a code

Explanation:

Encoding is the process of translating an idea or a thought into a code.

For example:

You want a friend to get you a gaming Laptop as a birthday gift, while describing the specification and how the laptop should look like. You visualize a fast laptop in black cover. You tell your friend it is "fast and portable". You translate your perceptions on a particular laptop into words that describe the model.

You might be interested in
What command line utility can be used to repair the bcd on a windows installation?
Afina-wow [57]
You can use the following command Bootrec /rebuildbcd
8 0
3 years ago
What will happen when users attempt to connect via Telnet or SSH for enable mode when neither the enable secret password command
vovikov84 [41]

<u>Attempt to connect via Telnet or SSH for enable mode:</u>

  • Normally telnet and SSH ism to used login to network socket. Basically to login user is prompted with password and verified.
  • Secret password is one more level to login to access the network.
  • It is used to login copy files to web server so that website pages are update. End user can copy or move the files from web server or cloud computer or UNIX servers.
  • Enable secret password if it is configured, end user login with encrypted technology and plain text format is displayed.
  • Different between enable secret and enable password is enable secret is encrypted and enable password is not encryption and plain text.
6 0
3 years ago
Which of the following is the largest measurement for the weight of a bag of dog food?
jasenka [17]

Answer:

approximately 5 lbs but no sure weight.

6 0
3 years ago
Read 2 more answers
Need answer ASAP!!
kotykmax [81]
They can also track you by your IP address which is kind of like a thumbprint for your computer. They can also find your channel and your youtube account as well. 
3 0
3 years ago
What best describes the difference between careers and industries?
Rasek [7]

Answer:

c

Explanation:

big brain

3 0
3 years ago
Other questions:
  • Application Software include programs like: MS Word, Google Docs, MS Exce ect...
    13·1 answer
  • The electric company gives a discount on electricity based upon usage. The normal rate is $.60 per Kilowatt Hour (KWH). If the n
    7·1 answer
  • 2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components
    15·1 answer
  • The main purpose of a service panel in a house is to
    11·1 answer
  • Which of the following types of software applications would open a file
    15·1 answer
  • How should I do it Please code for Java
    15·1 answer
  • Question #6
    9·2 answers
  • There is a feature that allows you to lock the document, to avoid others making changes. True or False
    6·1 answer
  • SOMEONE PLEASE HELP ME OUT WITH THIS!!!!!!
    12·2 answers
  • In Python write a program that reads a list of integers into a list as long as the integers are greater than zero, then outputs
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!