1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IrinaK [193]
3 years ago
6

After a customer buys a computer or receives service from Top Computers and Service, a service representative contacts each cust

omer to conduct a survey. The survey information is a form of output.
a. True
b. False.
Computers and Technology
1 answer:
AlladinOne [14]3 years ago
7 0

Answer: False

Explanation:

 The given statement is false, as the survey information basically represent feedback in which the service representative contact each and every customers to collect the feedback.

Feedback is in the form of information in which it represent the reaction in the scenario to the output but it basically affects as an input. Therefore, the survey information is in the form of input not as output.

You might be interested in
Question 1 (1 point)
Pachacha [2.7K]

Answer:

The answers are in the Explination :3

Explanation:

Question 1 - Portrait and Landscape.

Question 2 - Header and Footer

Question 3 - Formatting

Question 4 - Ctrl + Enter

Question 5 - Margins

7 0
2 years ago
How can you create an illusion of spatial depth in a two-dimensional design?
astraxan [27]

Answer:

Using three or more vanishing points within a work to create the illusion of space on a two-dimensional surface.

Explanation:

6 0
3 years ago
Which of the following is not part of the processes involved in data valida
sineoko [7]

Answer:

B Fraud because it's aganist the data valida

5 0
3 years ago
In symmetric key cryptosystem, assume that Alice and Bob have set up a common key Kab. This key is only known to Alice and Bob.
azamat

Answer:

yes

Explanation:

If it is guranteed the key is only known to Alice and Bob and there is no risk of man in the middle attack or channel spoofing so we can achieve data origin authentication

4 0
3 years ago
What are the uses of a modem
Vlada [557]

Modem provides internet, WiFi, we can connect multiple devices to internet through modem.

Modem provides radiation of short wavelength and the transmitter in your mobile phones and computers convert those radiations into digital signals and vice-versa.

5 0
3 years ago
Other questions:
  • There are many differenttypes of models, but an individual DSS can consist of onlyone.
    15·1 answer
  • Justin Blake and Raegan Beast anyone?? I miss Jaegan a ton and I need a fangirl to talk to.
    13·1 answer
  • F a domain consists of dcs that are running verions of windows server earlier than windows server 2008, what replication method
    10·1 answer
  • How can you autohide the taskbar in Windows 10?
    8·2 answers
  • Which of the following attacks seeks to introduce erroneous or malicious entries into a server's hostname-to-IP address cache or
    5·1 answer
  • In a car crash, wearing a seat belt __________________.
    5·2 answers
  • How many passes will it take to find the four in this list? 4, 5, 6, 7, 8, 9, 10 1 2 3 4
    12·2 answers
  • You are comparing cryptographic solutions to implement at your organization. Which two items should you focus on when you are ev
    12·1 answer
  • Help me guys plssssss​
    10·1 answer
  • Write a paragraph discussing privacy issues on the internet<br> and their impact on human lives.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!