1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mojhsa [17]
3 years ago
7

After which stage in the information processing cycle can data be referred for future use?

Computers and Technology
1 answer:
Sedbober [7]3 years ago
7 0

Answer:

after the data storage stage, data is able to be referred to and use for future uses.

You might be interested in
Use search engines and websites to research the following WAN technologies to complete the table below:
Yuki888 [10]

Answer:

Explanation:

I am attaching the table as an image with updated table containing required information for the following WAN technologies.

T1/DS1 => Digital Signal 1 (T-Carrier 1),

T3/DS3 => Digital Signal 3 (T-Carrier 3),

OC3 (SONET) => Optical Carrier 3 (Synchronous Optical Networking),

Frame Relay,

ATM => Asynchronous Transfer Mode,

MPLS => Multi-protocol Label Switching,

EPL => Ethernet Private Line.

Although you have mentioned most of the information yourself, there were some wrong data in it.  So I have updated them with correct information in the attached table.

4 0
3 years ago
Read 2 more answers
Write a loop that counts the number of space characters in a string. Recall that the space character is represented as ' '.
Jlenok [28]

Answer:

I am writing Python program.

string = input("Enter a string: ")

print(string.count(' '))

Explanation:

The first statement takes input string from the user.

input() is used to read the input from the user.

The next statement uses count() function to count the number of times the specified object which is space ' ' here occurs in the string.

The print() function is used to return the number of times the space occurs in the string entered by the user.

Output:

Enter a string: How are you doing today?

4

The screenshot of program and its output is attached.

3 0
3 years ago
Which option lists the correct steps to apply a style?
pav-90 [236]

Explanation:

b is answer l think is the ans

8 0
4 years ago
hi, im from the uk where we do btec and i have 24 assignments late and i need to complete them in less than a month? please give
elena-s [515]
Just do a little bit of each assignment day by day and make every bit of available time useful. Before you do anything, just map out and brainstorm some ideas so that way your mind is clear and you can have your thoughts ready to go. Always take breaks in between so your mind doesn't get cluttered and overloaded with content. Ask your teachers if you have any problems, or if you don't understand anything. And don't stress yourself out too much! Just relax and breathe. You can do it :)
also: next time don't leave all 24 of your assignments late heheh
7 0
4 years ago
define and discuss the following network protocols: TCP, UDP, IP, and ICMP. Include the differences between TCP & UDP and IP
Vanyuwa [196]

Answer:

 The following types of network protocols are explained below as:

TCP:  TCP stand for the transmission control protocol and it is used for the interconnect various types of network devices on internet. The TCP is the type of protocol that is used for communication in the particular private network and it is also known as intranet.  

UDP: UDP stand for the use data gram protocol and it is the simplest and the connection less protocol. On the other hand, TCP is the connection oriented internet protocol. By using the UDP, we can easily sent multiple message in the form of packets.

IP: IP stand for the Internet protocol and it is used as the internet address protocol for assigning the connection between the each device in the network. The main function of the IP is that it used for locating the address in the system.  

ICMP: ICMP stand for the internet control message protocol and it is the main integral part of the IP. The ICMP is the error detecting internet protocol in the network devices. It is one of the important networking security in the system.

6 0
3 years ago
Other questions:
  • Keyboard shortcut could you use instead of clicking the icon
    11·1 answer
  • Web and mobile applications allow users to be actively engaged in an online activity
    5·2 answers
  • An online game is played with two dice. In this context, explain what is meant by decomposition
    8·1 answer
  • Who invented autonomous cars? When I look it up it comes up as William Bertelsen but he invented the idea of hovering cars. Help
    8·1 answer
  • As a digital forensics examiner, it’s a good idea to build a list of references for information on privacy laws in other countri
    13·1 answer
  • Which function of InfoSec management encompasses security personnel as well as aspects of the SETA program?
    5·1 answer
  • Create a script that will find the sum of the all multiples of 3 between 1 and 1000 by using For Loop. (Pseudo Code required) 3.
    7·1 answer
  • True/False - According to CP-14 Sale of Modular Homes, a licensee who sells land and a modular home to be affixed to the land, t
    11·1 answer
  • When a primitive type variable is passed as an argument to a method, what is passed into the receiving method's parameter variab
    12·1 answer
  • What is website and what are the difference between website and blog pls anyone​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!