1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tamaranim1 [39]
4 years ago
10

Cynthia finds a spreadsheet on her desk. It has rows and columns of numbers, such as 37, 28, 91, and 12, but Cynthia is not sure

what the numbers mean. Which term best describes what Cynthia has?
A
information

B
binary numbers

C
data
Computers and Technology
2 answers:
BigorU [14]4 years ago
8 0

Answer:

B

binary numbers

Explanation:

because she does not know what they mean it can be data or information but we are not sure so the best answer is B.

Artist 52 [7]4 years ago
8 0
The answer that your looking for is B.) binary numbers
You might be interested in
Decomposition is
Allushta [10]

Answer:

breaking a problem into smaller parts

Explanation:

In language of computer science, decomposition is the process in which complex problems are divided into simpler parts. These simpler parts helps in the solving of the complex problems. They are made easier and comprehensible for the user to understand. Each simple part is further analyzed separately and the solution of the complex issues are derived.  The process becomes lengthy but the solution is found.

8 0
3 years ago
________ is the extent to which differences in observed scale scores reflect true differences among objects on the characteristi
AysviL [449]

Answer: Validity

Explanation:Validity is the type of claim that is made towards the measuring of reliability of any element. The differences appearing in the measurement of the elements displays the validly factor is not up to the mark which indirectly implies that reliability is not high. Validity is the situation in which all the parameters appearing in the element is perfect. If validity is perfect then only perfect reliability is achieved.

7 0
4 years ago
Whers the main characteristic of a Peer-to-peer (P2P) network?
ioda

The answer to this would be B

5 0
3 years ago
EBay is an example of an online company that has been faced with numerous security issues. For example, imagine you purchase a d
Bond [772]

Answer: d)Phishing

Explanation: Phishing is the activity that is used by the attackers or unauthorized parties to steal confidential information of individuals through emails, messages or calls.This activity is considered as cyber-crime as the unauthorized source present themselves as the legal and actual party to gain private information such as credit card details, personal details , etc.

The example mentioned in the question about eBay's security issue is also related with phishing  where the fraud mails are sent to the users to gain or steal their personal information.

Other options are incorrect because insider is a threat that happens in the organization or business field regarding the organizational data,dumpster diving is reviving data to execute an attack on operating system and social engineering is gaining personal information from an individual through manipulation .Thus, the correct option is option(d).

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

7 0
4 years ago
Which type of presentation is best for a presentation about the benefits of aerobic exercise?
insens350 [35]
Let's go with a Microsoft office power point presentation
7 0
3 years ago
Other questions:
  • What aspect of the internet makes it fault-tolerant?
    6·1 answer
  • What is a browser cookie?
    10·2 answers
  • Vghfthcnbvhghvngjgjvjgkb, kcnjc cnnfjdhd mc Dan Jfhjc cm. Cm n n hdjfjocnkcnd
    10·2 answers
  • Omega Software Inc. is currently running a training program for employees to upgrade their software skills so that they are able
    10·1 answer
  • How do you close a file?
    12·2 answers
  • Match the following.
    8·1 answer
  • Which symbol would be used in a flowchart to represent a connection to another part of the flowchart
    5·1 answer
  • Select the incorrect sentence from the options given below. *
    15·1 answer
  • What will be the result from running the following program?
    6·1 answer
  • When copper wires are bundled together, they are susceptible to ____________, a form of interference where the signals leak out
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!