1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timurjin [86]
2 years ago
11

All information that is to be processed by a computer must first be entered into memory via an input device.

Computers and Technology
1 answer:
Goshia [24]2 years ago
3 0
The answer is true, since it needs to be sent to the main server to be processed
You might be interested in
What natural boundary separated british territory from louisiana?
Marat540 [252]
<span>Quebec and British; French and Indian War</span>
4 0
3 years ago
QUESTION 2
Len [333]

Answer:

Group of answer choices.

A. Apply numbering to the list.

B. Apply bullets to the list.

C. Apply multilevel numbering to the list.

D. Manually enter a ">" character at the beginning of each item in the list.

Answer:

B. Apply bullets to the list.

Explanation:

Formatting is a feature found in a lot of word processing software applications such as Microsoft Word, Notepad, etc., which is designed to avail end users the ability to apply specific formatting options such as cut, bold, italics, underline, list, etc., to texts based on certain criteria defined by an end user.

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

In Microsoft Word, a list can be formatted using a numbered or bulleted arrangement style. A numbered style (1, 2, 3, 4, etc) is typically used for an ordered list while a bullet is designed to be used for an unordered list.

Hence, the best way to format a document containing a list of items that appear in no particular order is to apply bullets to the list.

For example, a bulleted list of my favorite subjects arranged in no particular order would appear as this;

English language

Mathematics

Geography

Biology

Chemistry

Physics

Computer technology

8 0
3 years ago
Both computers and people handle information using which processes?
GenaCL600 [577]

Answer:

Explanation:

Both computer and human use the process of encoding, storage and retrieval to process information.

Encoding is the process of putting the information in a format that will be understood by either the human or the computer. The information is then stored in the memory. Both the computer and human have memory where the information will be store. When the information is needed, it is then retrieved from the location in which it was stored.

6 0
3 years ago
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
1. Give state diagrams of DFAs recognizing the following languages. The alphabet is {0, 1}. (a) {w | w is any string except 11 a
storchak [24]

Answer:

Explanation:

The first diagram shows the DFA that accepts that accepts any string except 11 and 111

The second diagram shows every odd position of w is 1

6 0
3 years ago
Other questions:
  • Match terms in the first column with the order descriptions in column two.
    11·1 answer
  • What is last mile in VOIP
    13·1 answer
  • cd to the directory called final that is located within my home directory. While viewing the file called mypasswd you notice tha
    12·1 answer
  • How to make changes to a file on the USB drive
    6·2 answers
  • The Go To feature can be accessed from which of the following dialog boxes?
    10·1 answer
  • How do you change the color on the text in the email​
    6·1 answer
  • Which of the following would allow for the QUICKEST restoration of a server into a warm recovery site in a case in which server
    10·1 answer
  • In binary, the second digit from the right is multiplied by the first power of two, and the _____ digit from the right is multip
    10·2 answers
  • Backup software creates backups and prevents you from losing all your data, so would backup software be considered an applicatio
    7·1 answer
  • 1:A presentation program which is developed by Microsoft
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!