1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorLugansk [536]
3 years ago
15

You just read a restaurant review on the internet of the newest restaurant in town. The writer of the article said the food was

fantastic but had some kinks to work out. Select the correct statement.
The restaurant review contains data but is not data itself


The restaurant review is data


The restaurant review is facts


Restaurant reviews are not data
Computers and Technology
1 answer:
Marizza181 [45]3 years ago
6 0
A. The restaurant review contains data but is not data itself. 
I'm sorry if that's wrong, but that seems right to me. 

You might be interested in
Ben uses a table that has few columns. He knows about a particular value in the first column and wants to find the corresponding
igor_vitrenko [27]
I'd suggest he uses LOOKUP Function.

You can use the LOOKUP function when you need to look in a single column or row and find a value from the same position in a corresponding column or row. We have a much improved VLOOKUP that can also be used to search one row or column or multiple rows and columns.



4 0
3 years ago
Read 2 more answers
What are impacts of ict in every day your life?describe if prifely​
telo118 [61]

Answer:

ICT is a broad subject and a concept of evolving.It covers any product that will store, retrieve, manipulate, transmit, or receive information electronically in a digital form.

Explanation:

HOW WE USE ICT IN OUR DAILY LIFE

COMMUNICATION

JOB OPPORTUNITIES

EDUCATION

SOCIALIZING

POSITIVE IMPACT OF ICT IN OUR DAILY LIFE

1.Easy to access information:

I use ICT to access more information that I need for everyday schooling.Because Internet has more faster than searching to a school library. Even the deadline of my research is coming, I can make it fast with the help of ICT

2. Education: distance learning and on-line tutorials. New ways of learning, e.g. interactive multi-media and virtual reality.

3.Free access of sharing like photo,video,and message

5 0
2 years ago
In Microsoft Access, what happens when you save a query once and run it but then add more to the query? What will happen? a)erro
Usimov [2.4K]
D)When the query is run again, the data that meets the new criteria will be retrieved.
5 0
3 years ago
To place the caption at the top of the image you will need to change the ________
makkiz [27]

wrong!! it was postion!!

4 0
3 years ago
Which disclosure paradigm has as its assumptions that 1) an attacker will learn little or nothing from disclosure; 2) Disclosure
nekit [7.7K]

The  disclosure paradigm has as its assumptions that an attacker will learn little or nothing from disclosure is known as Open source.

<h3>What is open source?</h3>

An  Open source is known to be a term that connote that is said to be an Open source software set up to be publicly used by people.

Therefore, The  disclosure paradigm has as its assumptions that an attacker will learn little or nothing from disclosure is known as Open source.

Learn more about Open source from

brainly.com/question/6065176

#SPJ1

3 0
2 years ago
Other questions:
  • What is the order of arrangement of files and folders on a computer?
    15·1 answer
  • Through the use of a _____ system, information on prospective, current, and past customers is stored and analyzed for future pla
    15·1 answer
  • Write the method makeNames that creates and returns a String array of new names based on the method’s two parameter arrays, arra
    9·1 answer
  • 4. Write an interface ObjectWithTwoParameters which has a method specification: double area (double d1, double d2) which returns
    9·1 answer
  • Raul in Colombia can enter data into a spreadsheet. Olivia in England can access the spreadsheet a few minutes later and use Rau
    7·1 answer
  • How do you invite someone to a conversation on brainly
    14·1 answer
  • Write a function in Java to implement the following logic:
    13·1 answer
  • Explain the measures put in place in order to maintain each of the element of computer security<br>​
    10·1 answer
  • Which type of network allows backups and network security to be centrally located?
    11·1 answer
  • you are investigating the use of website and url content filtering to prevent users from visiting certain websites. which benefi
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!