1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
a_sh-v [17]
2 years ago
6

Changing how information is represented so that it can be read by a person is called

Computers and Technology
1 answer:
Usimov [2.4K]2 years ago
4 0

Answer:

Decode. To change how information is represented so that it can be read by a person.

Explanation:

Decoding is the ability to apply your knowledge of letter-sound relationships, including knowledge of letter patterns, to correctly pronounce written words. Understanding these relationships gives children the ability to recognize familiar words quickly and to figure out words they haven't seen before.

You might be interested in
Which of the following are the dimensions of feasibility? Group of answer choices cost, schedule, technical, and organizational
Paha777 [63]

Answer:

"cost, schedule, technical, and organizational feasibility schedule" is the correct option.

Explanation:

A technical feasibility is the study of the concerned about the specifying software and tools which satisfy the users' need. It is also the process of thinking for which business technologies are important to bring labours, transportation, and materials.

An organizational feasibility is the study of the information of the professional background and about the skills which are necessary for the contribution in the business.

7 0
3 years ago
What is a unit to measure loudness
FinnZ [79.3K]

decibels i believe is the correct answer. hope it helps :)

3 0
2 years ago
Whenever I ask a question I loose points I just asked a question before and I had 56 points now I have 12 now I'll probably have
lilavasa [31]
Just try to answer some questions as well, then you can keep a nice balance.
ps. Only answer the questions you know. 
5 0
3 years ago
The incandescent test lamp is used to check for the presence of
Arisa [49]
Http://americanhistory.si.edu/collections/search/object/nmah_995750
4 0
2 years ago
Please explain what steps you will take to prevent hackers from getting access to your personal information.
yuradex [85]
The steps I would take are 1. Making a strong password with symbols and numbers. 2. I will set up a 2 way authentication ther for if someone would be trying to hack me I would get an alert in order to stop the attempt. 3 I will not use the same password each time.
4 0
3 years ago
Other questions:
  • In which setting would you be least likely to find a full-time A/V technician?
    5·2 answers
  • a ____ consists of wires connecting the cpu and other parts of the computer. The _____ transfers data between CPU and memory uni
    6·1 answer
  • If str 1 and str2 are both Strings, which of the following expressions will correctly
    13·1 answer
  • A spreadsheet has some values entered: Cell A1 contains 10, cell A2 contains 14, A3 contains 7. You enter in cell A4 the followi
    8·1 answer
  • ____ occurs when two nodes simultaneously check a channel, determine that it is free, and begin to transmit.
    9·1 answer
  • TOT al<br>Name TWO examples of these settings and utilities. (2)​
    12·1 answer
  • The __________ statement allows you to check for
    7·1 answer
  • What are price comparison websites?
    6·1 answer
  • A simple C program to find the logarithm of any number in any base.....​
    13·1 answer
  • Your network uses a network address of 137. 65. 0. 0 with a subnet mask of 255. 255. 0. 0. How many ip addresses are available t
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!