1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lyrx [107]
3 years ago
9

Marco had a database that showed the first, second, and third favorite ice cream flavors for each person in his school. He used

it to decide which flavors to order for the school’s café. What has Marco done?
A
turned information into data

B
turned data into information

C
turned data into binary numbers

D
turned binary numbers into data
Computers and Technology
2 answers:
SCORPION-xisa [38]3 years ago
7 0

Answer:

<em>The answer is A</em>

Explanation:

DIA [1.3K]3 years ago
5 0

Answer:

B

hope that's right

You might be interested in
Suppose you are given a text file. Design a Python3 program to encrypt/decrypt that text file as follows:
Allushta [10]

Answer:

Explanation:

Please find attachment for the Python program

Download docx
7 0
3 years ago
Publishing is copying Web pages and associated files to a Web<br> server. T or f
sineoko [7]
The answer would be true.
4 0
3 years ago
. Consider the problem of finding the largest element in a list of n elements. What will be the basic operation of an algorithm
natali 33 [55]

Answer:

Comparison.

Explanation:

When we have to find a largest in a list of n elements.First we have to iterate over the list so we can access all the elements of the list in one go.Then to find the largest element in the list we have to initialize a variable outside the loop with the minimum value possible and in the loop compare each element with this value,if the element is greater than the variable assign the element to the variable.Then the loop will find the largest element and it will be the variable.

4 0
3 years ago
_________________ allows cloud controller to locate instances on separate zones to boost redundancy.
kogti [31]

Answer:

_____Router___ allows the cloud controller to locate instances on separate zones to boost redundancy.

Explanation:

A router, as a networking device, forwards data packets between one computer network and other networks.  With a router, one can use wired and wireless devices to connect to the Internet.  Unlike a modem, which connects the home network to a wider internet, a router can enable the networks to interact with one another without using the Internet.

8 0
3 years ago
What is a Caesar cipher? As part of your answer demonstrate encrypting the plaintext messages: CS IS COOL with a caesar cipher.
sweet [91]

Answer:

A Caesar Cipher is a basic encryption type.

Explanation:

Its implementation is very easy and straightforward. It uses a one-to-one of characters in a character set. The input needed is the plain-text message and the encryption number.

For example, using the character set A-Z, encrypting the text CS IS COOL using the key of 3 generates FV LV FRRO. What has been done here is to take each character in the plain-text message and move it by "encryption number steps" in the character set.

8 0
3 years ago
Other questions:
  • peter has recently bought a media player and a digital camera. he wants to buy a memory card for these devices. which memory dev
    11·1 answer
  • Some technologies like vertical farming have a number of negative effects. Which is a negative outcome of this technology? A. In
    10·1 answer
  • Page UND
    8·1 answer
  • each term to the appropriate definition. DBMS data mining hash file index key field locking protocol relation roll back schema S
    14·1 answer
  • business information management professionals also perform duties of _ information system professionals
    11·1 answer
  • In Python what are the values passed into functions as input called?
    13·1 answer
  • ¡Hola! He visto en muchos comentarios de Twitter "svd" cuando alguien dice "dale fav a este Tweet y siganse entre ustedes" y en
    8·1 answer
  • Outline the dangers arising as a result of using computers​
    12·1 answer
  • Mattias's friend asked him to critique his presentation about gorillas. Mattias noticed that there weren't any images of gorilla
    6·1 answer
  • An embedded system describes computing technology that has been enclosed in protective shielding for security reasons. True or f
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!