1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pie
3 years ago
9

During the _______ steps of the information processing cycle, data is manipulated, calculated, or organized to create useful inf

ormation.
Computers and Technology
1 answer:
labwork [276]3 years ago
6 0

Answer: processing

Explanation:

During the processing steps of the information processing cycle, data is manipulated, calculated, or organized to create useful information.

At this stage, the data that has been gotten will have to be worked on by manipulating it, making necessary calculations in order to get a useful information out of it.

You might be interested in
A security administrator is required to submit a new csr to a ca. what is the first step?
m_a_m_a [10]
If an administrator needs to renew a certificate for a web server he/she should submit the CSR (Certificate Signing Request) to CA.
<span>If a security administrator is required to submit a new CSR to a CA, teh fisrt step the administrator should do is to g</span>enerate a new private key based on RSA.
4 0
3 years ago
Create a jQuery ready listener that updates the options within the element with ID toCurrency such that: The first element is: S
nlexa [21]

Answer:

Enter USD and select desired currency.

US Dollars (USD): 100.00

Select Currency: Canadian Dollar (CAN)

Canadian Dollar (CAN): 130.00

Explanation:

See full code attached.

5 0
3 years ago
What udp port is used for i k e traffic from vpn client to server?
Reil [10]
<span>Ports are used to distinguish among multiple destination processes in a single host computer.</span>
UDP (User Datagram Protocol)<span> port 500 is used for i k e traffic from VPN client to server.
</span><span>This port is used during the establishment of secure VPN tunnels.
</span>
6 0
3 years ago
Which OS function does a CLI fulfill? A User interface B Running applications C Hardware interface D Booting
konstantin123 [22]

Answer:

User Interface

Explanation:

4 0
3 years ago
Which one cost more Broken bones or a Broken Computer? Explian ur answer
vladimir1956 [14]
Broken bones cost more, because hospital bills are a lot more than to get a computer fixed.
4 0
3 years ago
Read 2 more answers
Other questions:
  • GAMES Which is better Roblox or BattleCamp Basically Free Points But Please Answer
    7·2 answers
  • True or False
    10·2 answers
  • How do you copy and paste a screenshot on an hd computer
    12·2 answers
  • The development of various technologies led to many historic events. Use information from the Internet to describe one major his
    7·1 answer
  • What connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the
    5·2 answers
  • Which of the following is an example of a content management system (CMS)?
    12·2 answers
  • What type of code do computers typically use to operate? A. CSS B. HTML 5 C. HTML D. Binary
    12·2 answers
  • What is the behavior of an element with static positioning in regard to the page layout?
    12·1 answer
  • What is the velocity of a 0.100kg car with a momentum of 5 kgm/s?
    12·1 answer
  • Who addicted to fnaf
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!