1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maksim [4K]
2 years ago
6

which type of encoding involves relating new information to existing knowledge that you already have stored in long-term memory?

Computers and Technology
1 answer:
rjkz [21]2 years ago
7 0

A type of encoding that involves relating new information to existing knowledge that you already have stored in long-term memory is: Semantic encoding.

Encoding can be defined as a communication process in which the sender of a message transforms an information into an encrypted message, in the form of notable symbols that represent ideas or concepts.

Generally, a message that has been encoded by a sender requires a decoding action by the recipient, in order for the communication process to be complete.

Semantic encoding is a type of encoding which typically involves the relation of new information with respect to an existing knowledge that has been stored in long-term memory.

In conclusion, semantic encoding deals with the encoding of meaning from new information rather than perceptual characteristics such as the meaning of words in English language.

Read more: brainly.com/question/24113575

You might be interested in
In Outlook 2016, what are the three format options when sending an email message? Check all that apply.
tankabanditka [31]
Plain text, HTML, and rich text.
4 0
2 years ago
The act of using computer equipment to “break into” the computer systems of others?
zlopas [31]

Answer:

Hacking.

Explanation:

Breaking into other systems sounds like hacking.

3 0
2 years ago
1)Write the command that moves the file data1 into the directory testdata:
mrs_skeptik [129]
1) mv data1 testdata/
2) mv data1 ../
3) ls letters

These are the *nix commands. You can find out more by looking at their man pages. You can get more info about the man subsystem by running: man man
8 0
2 years ago
A ____ is a device that interconnects two or more workstations in a star-wired bus local area network and immediately retransmit
prisoha [69]

Answer:

A HUB

Explanation:

A hub can described as an hardware or network device use for multi purpose functions like connecting series of internet devices together there by making it possible for all devices to work or function together on a single network.

Hubs are classified into active hub, passive hub, and intelligent hub.

ACTIVE HUB: This type of hub boost the signals but can not perform calculations.

PASSIVE HUB: this type only send the signals but can not boost a signal.

INTELLIGENT HUB: it brings about the boosting of signals and also bring about packets to be analyzed.

7 0
3 years ago
Words have both denotative and connotative meaning. The connotative meaning is Question 2 options:
Natalka [10]

Answer:

Option b is correct answer.

Explanation:

The connotative meaning is a word's implied or secondary meaning, in addition to its literal meaning.

Connotative meaning gives an idea or a feel that invokes for a person other than literal context of the word.

Connotation tells us weather the word used is in positive context or the negative one. For example, the words childish and youthful have same denotations but connotative meaning of childish is negative while youthful lies in positive context.

i hope it will help you.

4 0
2 years ago
Other questions:
  • What is the biggest disadvantage of copying a worksheet into another workbook?
    13·1 answer
  • System uses a 6-bit 2’s complement signed integer representation. What is the range of decimal values it can represent?
    14·1 answer
  • In Word, blue underlining indicates which of these problems?
    12·1 answer
  • What is an efficient way to ensure that the code is working as per the acceptance criteria/business requirements? (1 correct ans
    11·2 answers
  • .in the array based list implementation of the ADT what is the worst case time efficiency of the remove method?
    6·1 answer
  • 5.During a recent network attack, a hacker used rainbow tables to guess network passwords. Which type of attack occurred
    9·1 answer
  • Which step in the software development life cycle analyzes the scope of work?
    6·1 answer
  • PLS REPLY ASAP WILL MARK BRAINLIEST
    5·2 answers
  • Choose the response that best completes the following statement.
    14·2 answers
  • What is the result of the following code?<br><br> x=7//2+10%2**4<br><br> print(x)
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!