1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olegator [25]
1 year ago
13

What are the 3 attributes of information?

Computers and Technology
1 answer:
Anton [14]1 year ago
4 0

As previously said, the three highly important qualities of validity, accuracy, and completeness can be expanded into the information quality of integrity.

For information to be valuable and to meet the definition of information, it must largely have the characteristics of relevance, availability, and timeliness. Accuracy, completeness, consistency, distinctiveness, and timeliness are five qualities of high-quality information. For information to be accurate and valuable, it must be of high quality. Standard attributes, commonly referred to as global attributes, work with a wide variety of elements. The essential attributes such as accesskey, class, contenteditable, contextmenu, data, dir, hidden, id, lang, style, tabindex, and title are included in them.

Learn more about information here-

brainly.com/question/5042768

#SPJ4

You might be interested in
A. A set of electronic program that makes of computer perform tasks
Nonamiya [84]

Answer:

2. Software

Explanation:

Software is an app

Hardware is the computer or cell phone or mobile phone

toppr

6 0
2 years ago
What do you enter at the command prompt to prevent the shell from using to much of the systems resources?
kap26 [50]

Answer:

Ulimit is the correct answer for the above question.

Explanation:

The Linux operating system is a system on which a user can work on multiple programming system. If a user is working on multiple programs then he needs to set the limit for the system resources so that the system can not access so many resources for any particular program and he can able to access multiple programs. For this a user needs to use the Ulimit command which syntax is as follows--

ulimit [-A] (Where A can be any of them (a, b, c, d, e, f, H, i, l, m, n, p, q, r, s, S, t, T, u, v, x) which refers the type of and units of resources.)

The question asked about the command which is used to prevent to use many of the system resources, then the answer is Ulimit command which is described above.

3 0
3 years ago
In which situations would a text-to-speech tool be useful? Check all that apply. A reader needs to hear a word pronounced. O A s
ExtremeBDS [4]

Answer:

I'm not sure but I believe it would be A

Explanation:

This answer can't really be accurate as the reason can change for anyone.

8 0
3 years ago
Read 2 more answers
An organization's contact information includes its _____.
lianna [129]
I would say that it probably includes all of these, but if that's not an option, then it's: email address 
3 0
3 years ago
Read 2 more answers
Which of these is a significant reason why social change has taken place in the past 100 years?
agasfer [191]
C, because technology has changed our social life by texting and messaging.
Hope this helps
8 0
3 years ago
Other questions:
  • In what way would web-based applications be useful to organizations?
    8·1 answer
  • Consider the problem of finding the distance between the two closest numbers in an array of n numbers. (The distance between two
    13·1 answer
  • Elisa and Josh need to access General Help. Elisa will press the F1 key. Josh will click on ? in the upper-right corner of the W
    14·2 answers
  • can you give me a tip to fix my SIM card becuaus when i put it on my phone it has no signal , can anyone fix this , thank you.​
    9·2 answers
  • When a bank account pays compound interest, it pays interest not only on the principal amount that was deposited into the accoun
    10·1 answer
  • What is LINUX?
    6·2 answers
  • Selling R frog for 50 r-obux on r-oblox!!! dont answer if u not gonna buy it
    15·2 answers
  • Use the table and the drop-down menus to order the
    15·2 answers
  • What do you understand by main document and data source
    15·1 answer
  • Consider an individual who wishes to ensure that their information remains secure and confidential, possibly to secure their per
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!