1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AleksandrR [38]
3 years ago
7

The process of converting information, such as text, numbers, photos, or music, into digital data that can be manipulated by ele

ctronic devices is called ___________. representation digitization binary none of the above
Computers and Technology
1 answer:
SCORPION-xisa [38]3 years ago
4 0

Answer:

The process of converting information, such as text, numbers, photos, or music, into digital data that can be manipulated by electronic devices is called Digitization

Explanation:

It is the process of converting “information in to a digital form”. Here the information are organized into bits. Mostly these data will be converted into the form of image. But these can be edited by converting once again into necessary format and even back to image too. There are specific tools which the user needs to install for editing the digital documents.

The reason why we need digitization is that

a) We want to convert hard copy into soft copy and store it in system.  

b) We would like to edit the data in the hard copy and preserve as a fresh copy.

You might be interested in
Risa has a negative credit rating, and she feels obtaining a fresh loan credit is going to be quite difficult for her. Her frien
antoniya [11.8K]

Answer:C

Explanation: Because of the high interest rates it will take longer for her pay it off

4 0
4 years ago
Which NSX feature would enhance their security so that this doesn’t happen again?
xz_007 [3.2K]

<em>NSX enhance logical switching, load balancing and microsegmentation which improves networking performance and operations.  </em>

<em>The performance starts in Layer 2, NSX manage routing even in virtual or cloud networks. Its firewall can support up to 20Gb traffic and monitoring all at once. Next work will in Layer 4 to 7, using SSL by making regular routine checks on network activities on this layer.  </em>

<em>As for security features, it uses microsegmentation which can make administrators manage policies of the network including making security groups.This would prevent previous attacks to happen again because NSX has firewalls that records and set policies in a network. </em>

<em />

7 0
3 years ago
Which of the following statements about websites is NOT true?
Inga [223]
The correct answer choice would be letter B.

I hope that this helps !
6 0
4 years ago
Read 2 more answers
Which is known as accurate processing of computer gigo E mail MHz bug​
Oliga [24]

<em>GIGO</em> is the considered as the <u>accurate processing</u> in computers.

In the field of computer science, the word GIGO stands for " garbage in, garbage out".

It is a concept that refers that if bad input is provided to the computers, the output will also be bad and useless.

It is the inability of the program to any bad data providing incorrect results.

Thus GIGO is the most accurate processing in a computer programs.

Learn more :

https://brainly.in/question/23091232

3 0
3 years ago
Read 2 more answers
If Number = 7, what will be displayed after code corresponding to the following pseudocode is run? (In the answer options, new l
kherson [118]

Answer:

5,10; 6,12; 7,14

Explanation:

We will demonstrate the iteration of the loop:

First iteration: Number = 7, Count = 5 at the beginning. We will check if Count <= Number? Since it is correct, prints 5,10. Increment the Count by 1.

Second iteration: Number = 7, Count = 6. We will check if Count <= Number? Since it is correct, prints 6,12. Increment the Count by 1.

Third iteration: Number = 7, Count = 7. We will check if Count <= Number? Since it is correct, prints 7,14. Increment the Count by 1.

Forth iteration: Number = 7, Count = 8. We will check if Count <= Number? Since it is not correct, the loop stops.

8 0
3 years ago
Other questions:
  • Most input/output devices communicate with components inside the computer case through a wireless connection or through cables a
    8·1 answer
  • list the network characteristics of the wireless network(s) in the decode -- SSIDs, channels used, AP names, presence of Bluetoo
    6·1 answer
  • Which button do you use to put data in a specific order A.Insert
    6·2 answers
  • If you delete a file from removable media, it is stored in the recycle bin where you can recover it until you empty the recycle
    13·1 answer
  • Match each document to its respective type.
    8·2 answers
  • While these two approaches have similarities in terms of the topics they address, ________ will cover broad IT management topics
    7·1 answer
  • Maria is comparing her history project's second-place award to her classmate's first-place award. She starts planning how to win
    9·2 answers
  • You can use your student ID card to get discounts in all of the following except
    6·2 answers
  • In the space provided, analyze the pros and cons of becoming a member of an artistic guild. Your answer should be at least 150 w
    12·1 answer
  • Join the class <br> The class code is hello112
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!