1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolbaska11 [484]
3 years ago
8

according to the information-processing view of memory, the first stage in memory processing involves

Computers and Technology
1 answer:
ExtremeBDS [4]3 years ago
4 0

Answer:The first stage of memory is encoding. In this stage, we process information in visual, acoustic, or semantic forms. This lays the groundwork for memory. The second stage is storing information so it can be recalled at a later point.

Explanation:sorry if its wrong

You might be interested in
Ok. So i am so confused. I have a message in my inbox but when I try to go to my inbox there is nothing there. Is that normal fo
GrogVix [38]

Answer:

yeah

Explanation:

that happens to me as well from time to time

7 0
3 years ago
¿Cuales son los dos estados de una computadora y que significa cada uno?
hjlf

Answer:

En ciencias de la computación, el estado de un circuito lógico digital o programa de computadora es un término técnico para toda la información almacenada a la que un circuito o programa tiene acceso en un momento dado. La información recibida previamente en las entradas se almacena en la memoria de elementos electrónicos, como disparadores, celdas de memoria. El contenido almacenado de estos elementos de memoria, en un momento dado, denominado colectivamente el "estado" del circuito, contiene toda la información sobre el pasado al que tiene acceso el dispositivo. Así, básicamente, una computadora puede tener acceso a dicho estado o no, según se encuentre encendida o apagada.  

4 0
3 years ago
1. During the first scene, Taylor's mother says "What you do online isn't exactly private." What do you think she meant by that?
tekilochka [14]

Answer:

The statement is "True".

Explanation:

Explanation of this statement can be given as:

  • Taylor's mother meant that the "universe is open to everything you do online, everyone can see". This statement true, because people will hack your profile unless you label these as personal, even re-post material that you have shared.  
  • In other words, we can say that a profile is placed on private in social media, it's not always free and your friend can use it, and they can share your personal information. It is difficult to uninstall once it is out there.  
5 0
3 years ago
Homework 8 Matlab Write a function called fibonacciMatrix. It should have three inputs, col1, col2, and n. col1 and col2 are ver
Amiraneli [1.4K]

In this exercise we have to use the knowledge in computational language in python to write the following code:

We have the code can be found in the attached image.

So in an easier way we have that the code is:

<em>function v = myfib(n,v)</em>

<em>if nargin==1</em>

<em>    v = myfib(n-1,[0,1]);</em>

<em>elseif n>1</em>

<em>    v = myfib(n-1,[v,v(end-1)+v(end)]);</em>

<em>end</em>

<em>end</em>

<em>function v = myfib(n,v)</em>

<em>if nargin==1</em>

<em>    v = myfib(n-1,[0,1]);</em>

<em>elseif n>1</em>

<em>    v = myfib(n-1,[v,v(end-1)+v(end)]);</em>

<em>elseif n<1</em>

<em>    v = 0;</em>

<em>end</em>

<em>function [n] = abcd(x)</em>

<em>if (x == 1 || x==0)</em>

<em>    n = x; </em>

<em>    return</em>

<em>else</em>

<em>    n = abcd(x-1) + abcd(x-2);</em>

<em>end</em>

<em>end</em>

<em>fibonacci = [0 1];</em>

<em>for i = 1:n-2</em>

<em>    fibonacci = [fibonacci fibonacci(end)+fibonacci(end-1)];</em>

<em>end</em>

<em>>> myfib(8)</em>

<em>ans =</em>

<em>    0    1    1    2    3    5    8   13</em>

<em>>> myfib(10)</em>

<em>ans =</em>

<em>    0    1    1    2    3    5    8   13   21   34</em>

See more about python at  brainly.com/question/18502436

8 0
2 years ago
_____ consists of computer equipment used to perform input, processing, and output activities.
goldfiish [28.3K]
<span> (keyboards, mice, scanning, computer chips)</span>
6 0
3 years ago
Other questions:
  • What's the fastest way to reset Android pin?​
    5·1 answer
  • WILL MARK BRAINLYIST
    15·2 answers
  • Which device lets you hear audio on your computer?
    12·2 answers
  • Which describes the third step in visual character development
    9·2 answers
  • In the written Hawaiian language, only 13 letters are used: the five vowels (a,e,i,o, and u), and 8 consonants (h,k,l,m,n,p,w, a
    10·1 answer
  • Combining two or more cells to make one is called​
    8·1 answer
  • HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HEL
    15·2 answers
  • Which field would best function as a primary key for a table that tracks orders?
    11·2 answers
  • Why is John Von Neumann to a remarkable name?<br>si​
    15·1 answer
  • Display the Approval Form worksheet and create an IF statement in cell B13 to determine if the applicant is eligible for a perso
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!