1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dem82 [27]
3 years ago
11

Which of the four basic functions of a computer refers to the collection of data by a computer?

Computers and Technology
2 answers:
horrorfan [7]3 years ago
8 0
Gosh I would say saving, storing off site, backup, and programming.
anygoal [31]3 years ago
7 0
They have codes such as 0101011011100010101. The only codes they have is only 0 and 1 if that is what your looking for.
You might be interested in
The address space 0x0000-0x3FF is assigned to I/O peripherals of a given HCS12 chip. How many K bytes is this? (Points : 2) 2K
UNO [17]

Answer:

D. 1K

Explanation:

The address space 0x0000-0x3FF is of 1KB(One Kilo Byte) since 0x3ff is equal to 1023. therefore 1023=1 KB.

bitwise 0x3ff zeros out the top bits of the number such that the result is always between 0 and 1023. It is essentially the same thing as modulo( num,1024) for positive  values of num.

Hence the answer is D 1K

3 0
3 years ago
What is the easiest way of ensuring that others can access a presentation that a user has created and make changes to it, while
Yakvenalex [24]

Answer:

You can share the presentation with your group. Share the presentation with everyone by email so everyone can work on it at once. Give your group members their own part to work on.

Explanation:

4 0
4 years ago
While conducting a vulnerability assessment, you're given a set of documents representing the network's intended security config
Sophie [7]

Answer:

The baseline review

Explanation:

Solution:

The baseline review: this can be defined as the gap analysis or the beginning environmental review (IER). it is an assess study to get information about an organisation's present activities and associated environmental impacts,  impacts and legal requirements.

This review issues an overview of the quality and weaknesses of an organisation’s environmental execution and opportunities for improvement.

6 0
3 years ago
Which of these words could byte pair encoding compress the most?
nlexa [21]

Answer:

My dad

Explanation:

7 0
4 years ago
Here are a list of attributes that either belong to user model or system model. Please identify which attribute(s) belong to use
OverLord2011 [107]

Answer:

Explanation:

Before answering this question we need to first know the differences between System Mode and User Mode.

System Mode mainly runs code and at the same time overlooking the user's privileges and permissions.

the attribute(s) that belongs to the user model includes:

User Mode

  1. User programs typically execute in this mode
  2. Less-privilege mode

while the attribute(s) that belongs to the system model includes:

System Mode

  1. Also referred to as control mode or kernel mode
  2. Kernel of the operating system
  3. More-privilege mode

8 0
3 years ago
Other questions:
  • A __________ network is good for connecting computer clusters.
    13·2 answers
  • How many bits are reserved for the Transmission Control Protocol (TCP) flags?
    11·1 answer
  • The security option in MySQL, that when enabled, limits where a file can be loaded from when using the LOAD DATA INFILE command
    6·1 answer
  • Question 21 pts How many lines should an email signature be? Group of answer choices "5 to 6" "7 to 8" "1 to 2" "3 to 4"
    10·1 answer
  • To uncompress the data back into its original binary state, you simply reverse the process. This technique is an example of what
    7·1 answer
  • 5. Describe the concept behind a digital signature and explain how it relates to cybersecurity by providing a hypothetical examp
    6·1 answer
  • Create a basic program that accomplishes the following requirements: Allows the user to input 2 number , a starting number x and
    12·1 answer
  • Write the names of different types of communication.​
    15·2 answers
  • What steps can you take to secure your private information?.
    8·1 answer
  • An operating system with _____ capabilities allows a user to run more than one program concurrently.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!