1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bixtya [17]
3 years ago
14

Please help!!!! Data means only facts. A. TRUE B. FALSE

Computers and Technology
1 answer:
vredina [299]3 years ago
6 0
B false data does not only have to be facts
You might be interested in
Write a python program called loop that computes and prints the sum of numbers from 1 to 10
galina1969 [7]

Here is code in Python.

# variable to store sum of numbers from 1 to 10

sum=0

for i in range(1,11):

   #calculating the sum

   sum+=i

#printing the sum

print("sum of numbers from 1 to 10 is:")

print(sum)

Explanation:

Declare a variable "sum" to store the sum of all the numbers from 1 to 10.

In the for loop i will iterate from 1 to 10 only and each value of i is added to

"sum". then it will print the sum of all the number.

Output:

sum of numbers from 1 to 10 is:                                                                                            

55

6 0
4 years ago
It do be like that tho ​
kakasveta [241]
What
....... .......
?
8 0
3 years ago
The process of checking data for validity and integrity before placing it in a data warehouse is called Group of answer choices
guajiro [1.7K]

Answer:

data cleaning

Explanation:

Data cleaning exemplifies the process which includes identifying the incorrect, or inaccurate data from the records. It further proceeds its function in correcting and replacing the correct data in the records or database. By adding information, by deleting incorrect information and modifying the incorrect information are some of the ways by which data cleaning is done.

7 0
3 years ago
1. The future of 2D animation does not include hand-drawing. (1 point)
ella [17]

Answer:

1. False

Yes, it is true that most of the animation companies have now shifted to the CG animation, and use computers in one way or the other. However, the art of the hand drawing is never going to be extinct. Yes, demand is not going to be as much as it was in the 1980s but it is going to be available at some level even now. And hence, if you are an artist, you need not worry.

2. True

Well, that was a disaster, and everything was destroyed in the earthquake.

3. It's slow in and slows out.

It's this method that is generally used to emphasize the character's attitude and since the start of the animation making. And it is quite effective as well.

4. The Humorous Phases of Funny Faces

5. main purpose drawing

6. cel animation

7. True. This film was certainly made in 1912.

8. kinetoscope

9. False We do have the exaggeration animation, and that is being used quite extensively.

10. Korea. It was certainly Korea where the Simpsons were primarily created.

11. to draw an animated scene out

A condition like Akinetopsia is created, which is also known as the cerebral akinetopsia and we also know it as the motion blindness, is a kind of disorder during which a patient is not able to perceive the motion in the visual field, even though they can view the stationary objects, and there is no issue in that. And hence, it's done to draw an animated scene out.

12. Mortimer Mouse

13. narrator

14. exaggeration

15. true

Explanation:

Please check the answer section.

7 0
4 years ago
The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner
gayaneshka [121]

Answer:

D. Network vulnerability database

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.

Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.

5 0
3 years ago
Other questions:
  • You are attempting to run a Nmap portscan on a web server. Which of the following commands would result in a scan of common port
    12·1 answer
  • Calcule o resultado em cada caso atividade de matemática poder me ajudar<br><br>​
    12·1 answer
  • Anna is looking for a job. Which two types of skills would she find necessary to secure a job ?
    5·1 answer
  • Write an application that inputs three numbers (integer) from a user. (10 pts) UPLOAD Numbers.java a. display user inputs b. det
    10·1 answer
  • When you begin creating a new powerpoint presentation, you need to select a ____.?
    13·1 answer
  • One way to increase savings is to _____ cash inflows
    15·1 answer
  • Check the devices that are external peripheral devices:
    15·1 answer
  • I need help with this ​
    6·1 answer
  • Write an algorithm that reads 100 test points and finds the student with the highest result​
    8·1 answer
  • Why do we need to use a VPN service?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!