1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
4 years ago
14

Which of these can be considered data?

Computers and Technology
2 answers:
allochka39001 [22]4 years ago
7 0

Answer:

b

Explanation:

B. information

Information is a significant cluster of data that provides user a substantial value. This is the basis where conclusions and directive pathways are derived. These are the data that are processed and organized to be useful. For the data to be an information, it has three characteristics to be assessed with, timely, precision and comprehensiveness. These three traits of processed data defines and describes an information to be significant and useful, to be comprehended.

guajiro [1.7K]4 years ago
3 0
B. information


Information is a significant cluster of data that provides user a substantial value. This is the basis where conclusions and directive pathways are derived. These are the data that are processed and organized to be useful. For the data to be an information, it has three characteristics to be assessed with, timely, precision and comprehensiveness. These three traits of processed data defines and describes an information to be significant and useful, to be comprehended.



You might be interested in
What are small applications that can be accessed over the web?
elena-14-01-66 [18.8K]
D. Video editing software
8 0
4 years ago
Read 2 more answers
Consider this C Program C++ Program Java Program or C# Program. It reads integers from the
LiRa [457]

Answer:

yeah

Explanation:

Consider this C Program or Java Program or Python Program. It reads integers from the standard input (until it gets a negative number) and puts them into an array. After that it calls processArray on the array, and then prints the contents of the array on standard output.

Currently, processArray does not modify the array. You have to change this program so that any sequence of two or more consecutive numbers even numbers in the array are removed from the array and replaced with just the first number of the sequence. In other words, in any sequence of even numbers, only the first number is retained and the others are removed. The processArrayfunction/method should modify the array in-place (preferably without creating a new array), and it should return the new length of the modified array

4 0
3 years ago
Edhesive 6.8 lesson practice answers
FromTheMoon [43]

Answer:

1.) 25 ; 15 ; 15

2.) 50 ; 15 ; 50

Explanation:

In the first function written :

The variable val was initially decaled or assigned a value of 25 and that was what was printed first.

However, after the example function was written, the val variable was finally assiagned a value of 15 within the function. However, it was also declared that the global variable takes uonthe val value. Hence, the val variable initially assigned a value, of 25 changes to 15 globally.

For the second code :

From the top:

Val was assigned a value of 50 ;

Hence,

print(val) gives an output of 50

Within the function definition which prints the value of val that is assigned a value of 25 within the function.

Since tbe global variable isnt reset.

Printing Val again outputs 50;since ito is outside the function.

6 0
3 years ago
You are critiquing a logo design that one of your coworkers proposed. Your sense is that the individual elements of the design a
oksano4ka [1.4K]

Answer:

Unity.

Explanation:

Graphic design can be defined as an art which typically involves the combination of texts, images and colors to communicate an idea.

In graphic design, unity refers to the harmonious relationship between the various elements in a graphical piece of art, thus, making it appear as a single beautiful piece. Therefore, unity ensure a piece of work does not appear to the viewer as separate pieces but rather presents it as a single piece.

In this scenario, you are critiquing a logo design that one of your coworkers proposed. Your sense is that the individual elements of the design are fine, but when they are combined, they just don’t work well together. Thus, the main problem with this logo is unity.

8 0
3 years ago
_______ is a very common approach to multisystem authorization.
mart [117]

Password is a very common approach to multisystem authorization. Passwords can be made up of a combination of letters, numbers, and special characters.

Anyone who has used a computer knows how to use a password, which is the most commonly used authentication method. Password-based authentication is the most simple for adversaries to exploit. Passwords are frequently reused, and guessable passwords are created using dictionary words and publicly available personal information. Two-factor authentication (2FA) is a security system that requires two distinct forms of identification to gain access to something. The first factor is usually a password, and the second is usually a text message with a code sent to our smartphone, or biometrics such as your fingerprint, face, or retina.

Learn more about password here-

brainly.com/question/14580131

#SPJ4

7 0
1 year ago
Other questions:
  • 1. What should you do if your computer is shared by your entire family and you install a plugin that saves user names and passwo
    5·2 answers
  • What are two reasons for using layered protocols? what is one possible disadvantage of using layered protocols?
    13·1 answer
  • Rather than manually setting a print area each time you want to print a range, you can ____ the range.
    13·1 answer
  • When you choose the ____ compression setting, photos are compressed to the resolution specified on the advanced tab in the power
    13·2 answers
  • The technology Herman Hollerith created in the 1880s began the modern-day data processing function in computers.
    9·1 answer
  • Wyjaśnij w kontekście bezpieczeństwa, dlaczego wykonanie przelewu bankowego nie w każdej sytuacji wymaga zastosowania kwalifikow
    12·1 answer
  • In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
    6·1 answer
  • Hey you know Python? Could you help me, please? It's for my Final please help me SOS.
    8·1 answer
  • Which is the best reason for why it is important to be careful about entering personal information online?
    10·2 answers
  • We're given the training set data with the following values for variable X1:
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!