1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
4 years ago
11

Which is an example of Raw Input?

Computers and Technology
1 answer:
NISA [10]4 years ago
4 0

Answer:

Website collect data about each person who visits.

Explanation: Raw input or raw data is a type of data that has been collected or gathered from many sources, but have not been processed or filtered to obtain any type of information.

So, in given example the data of users, that has been collected from website is random data not information. This is the reason, "option A" is suitable example of Raw Input.

You might be interested in
What is output? x = 10 if (x > 10): print(1) elif (x = 10): print(3) else: print(4)
nikdorinn [45]

Answer:

There are three logical operators: and, or, and not. The semantics (meaning) of these operators is similar to their meaning in English. For example, x > 0 and x < 10 is true only if x is greater than 0 and less than 10.

n % 2 == 0 or n % 3 == 0 is true if either of the conditions is true, that is, if the number is divisible by 2 or 3.

Finally, the not operator negates a boolean expression, so not(x > y) is true if (x > y) is false, that is, if x is less than or equal to y.

Explanation:

3 0
3 years ago
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
Hyper-v enables windows server 2008 to operate as a _____ server.
lianna [129]
 Answer: Virtual                                                                                                     <span>Hyper-V enables Windows Server 2008 to operate as a virtual server.</span>
3 0
3 years ago
open your browser and enter the address of this ftp site in the address box: ftp.cengage. if your browser supports ftp, a logon
Licemer1 [7]

FTP access is available from other companies, but access is constrained unless the user first authenticates by supplying a user name and potentially a password.

The files are frequently intended for specific uses rather than for public release. For instance, you must send a letter house your consumer address list. Both businesses would not want the public to have access to these materials in this situation. Software is a collection of instructions, data, or computer programs that are used to run machines and carry out particular activities. It is the antithesis of hardware, which refers to a computer's external components. A device's running programs, scripts, and applications are collectively referred to as "software" in this context. Software refers to the processes and programs that enable a computer or other electrical device to function.

Learn more about software here-

brainly.com/question/985406

#SPJ4

7 0
1 year ago
To get a sense of your digital footprint, you should: Question 2 options: Google yourself regularly, and monitor what your frien
masha68 [24]
Let us examine the given answers.

a) Google yourself regularly, and monitor what your friends post.
  Verdict: This answer is correct, but it is also necessary to look for yourself on other search engines.

b) Google yourself once a year
  Verdict: Once a year is better than doing nothing, but more than once a year is preferable.

c) Google yourself every five years.
  Verdict: The time interval is too long. Your reputation could easily be damaged, or your identity could be stolen in less than 5 years.

d) Delete all your accounts and start fresh.
   Verdict: This will not solve the problem of having your reputation damaged, or having your identity stolen. Information on the web is preserved ins storage vaults for long periods of time.

Answer: 
Google yourself regularly, and monitor what your friends post. Also, search for your name on other search engines.

3 0
4 years ago
Other questions:
  • HELP ASAP!! Ohms law homework
    11·1 answer
  • Which of the following actions should you take when turning left at an intersection?
    11·1 answer
  • The author of the book (El-Haiwan) in which he mentioned many animals True ir False​
    14·2 answers
  • What’s bigger 4,000,000 KB or 2.8 GB
    5·2 answers
  • If you are interested in working for a specific company, what type of job site should you look at for opening?
    12·1 answer
  • Join my disc server "the angels"<br><br> https://dis cord.gg/PYnWArCz<br><br><br> tyyy
    5·1 answer
  • Type the correct answer in each box. Spell all words correctly.
    12·1 answer
  • What are some ways you can work with templates? Check all that apply.
    9·2 answers
  • Write a SELECT statement that returns one row for each customer that has orders with these columns: The email_address from the C
    13·1 answer
  • Implement one array of the English alphabet (26 characters). a) Create a function, getLetters() to cast and generate the array.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!