1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enyata [817]
3 years ago
13

Spoken word and written text are different because?

Computers and Technology
2 answers:
Dahasolnce [82]3 years ago
6 0
There are several differences between spoken words and written texts, among these differences are the following:
1- Spoken words have tones that show the feelings of the speaker, whereas, the written text is expressionless.
2- Spoken works might have inaccurate grammar or sentence structure, whereas, the written text has correct syntax and perfect grammar
3- Written text has a sort of a standard form that can be understood by anyone who speaks the language that the text is written in, regardless the dialect or the accent.
GuDViN [60]3 years ago
4 0
Spoken word and written text have a key, or primary, difference.

What is written text? Well, it's exactly that! It's written. You read it, right? You may not catch nearly as much of the characters voice within the text because it's only text. Does that make sense? I hope it does. Let's move on.

What is spoken word? Well, it's just that! Words from a person's mouth. We can hear it, feel the speaker's emotions, and sense personality within their tone, unlike text. 

In certain cases, text can appeal enough to the senses to create the so called "illusion" or "feel" or whatever you'd like to call it, of the character(s) personality, feelings, actions, and more. 


This is my answer and my take on your question.  I hope this helps! ^-^
You might be interested in
All of the following are examples of hardware, except:
WARRIOR [948]

Answer:

Microsoft Word.

Explanation:

Microsoft Word is an example of Software, while monitors, keyboards, and a mouse are hardware.

7 0
3 years ago
Read 2 more answers
Why are high-quality transformers wound with large diameter wire?
lesya692 [45]
So that they can lower the I2R losses
8 0
3 years ago
What name is given to any changes to the original data such as users manually modifying data, programs processing and changing d
nadezda [96]

Modification is the name given to an attack that makes changes into original data such as users manually modifying data, programs processing and changing data, and equipment failures.

In modification attacks, only changes are made to original data without deleting it completely. Modification is basically a type of attack in the context of information security. This type of attack creates annoying situations and discords by altering existing data in data files, inserting new false information in the network and reconfiguring network topologies and system hardware.

Modification attack is mainly mounted against sensitive and historical data. Modification attacks target integrity of the original data with an intent of fabricating it.

You can learn more about ha-cker attack at

brainly.com/question/14366812

#SPJ4

3 0
1 year ago
ISO 400 is twice as sensitive and ISO 100 true or false
beks73 [17]

Answer:

Quite simply, when you double your ISO speed, you are doubling the brightness of the photo. So, a photo at ISO 400 will be twice brighter than ISO 200, which will be twice brighter than ISO 100.

Explanation:

ISO most often starts at the value of ISO 100. This is the lowest, darkest setting, also called the base ISO. The next full stop, ISO 200, is twice as bright, and ISO 400 is twice as bright than that. Thus, there are two stops between ISO 100 and 400, four stops between 100 and 1600, and so on.

4 0
3 years ago
Write pseudo code that performs the following: Ask a user to enter a number. If the
CaHeK987 [17]
Answer:
BEGIN
INPUT N
IF N>0 AND N<10 THEN
OUTPUT "blue"
ELSE
IF N>10 AND N<20 THEN
OUTPUT "red"
ELSE
IF N>20 AND N<30 THEN
OUTPUT "green"
ELSE
OUTPUT "It is not a correct color option"
ENDIF
END.

Explanation:

3 0
2 years ago
Other questions:
  • A router is a device that addresses a packet on a network to the next router along the line. Under which layer of the OSI model
    5·1 answer
  • What is the most efficient way to include a space after each paragraph
    9·1 answer
  • If you were to create a new app for a smartphone or tablet that does not already exist, what would you create?
    10·1 answer
  • What is virtualization?
    11·2 answers
  • Which shape is used for input or output?
    15·1 answer
  • Discuss how sentiment analysis works using big data?<br>​
    13·1 answer
  • Which of these are characteristics of a Python data type? Check all that apply.
    11·1 answer
  • In C language. Print numbers 0, 1, 2, ..., userNum as shown, with each number indented by that number of spaces. For each printe
    5·1 answer
  • Ali has created a small program in Python, but he wants to store his data in a multi-dimensional array. He would like to use adv
    8·1 answer
  • the application you attempted to authenticate to is not authorized to use cas. contact your cas administrator to learn how you m
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!