1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prisoha [69]
3 years ago
13

Information management should supply information in the form of meaningful images rather than raw data, which requires that we h

ave sophisticated means of information ______________.
Answer Options:
A. filtering

B. de-bugging

C. fusing

D. prioritizing
Computers and Technology
1 answer:
Reika [66]3 years ago
4 0

Answer:

Filtering.

Explanation:

Filtering is the best option.

You might be interested in
What is the default method of referencing cells in formulas?
ELEN [110]
In Microsoft Excel, cell referencing is the method by which you refer to a cell or series of cells in a formula. Cell referencing is not important unless you plan to copy the formula to a number of other cells. In Excel, cell referencing is relative by default
7 0
3 years ago
What in Microsoft word brings up mini toolbar
Ray Of Light [21]
You right click the mouse. hope this helps 
6 0
3 years ago
I need help with Exercise 3.6.7: Sporting Goods Shop in CodeHS. ASAP
attashe74 [19]

Answer:

OK

Explanation:

7 0
3 years ago
John is analyzing strange behavior on computers in his network. He believes there is malware on the machines. The symptoms inclu
enot [183]

Answer:

Boot Sector Virus

Explanation:

A malicious software or malware is an executable line of code, programmed by a cybercriminal for ill intentions. There are many types of malware namely; viruses, rootkit, keylogger, trojan horse etc.

A boot sector virus is a kind of malware that runs before the operating system, affecting the boot sector of the hard disk, so even when a linux live cd is running as the operating system, the virus is still active.

5 0
3 years ago
Programming challenge description: Write a program that, given two binary numbers represented as strings, prints their sum in bi
Lubov Fominskaja [6]

Answer:

The program to this question can be given as:

Program:

#include<iostream>  //include header file

using namespace std;  

string add(string a, string b)  //define add function

{       //declare variable  

   string result = "";  

   int sum = 0,k,l;      

   cahr x;    

   k= a.size() - 1;

   l = b.size() - 1;  

   while (k>= 0 || l>= 0 || sum == 1) //loop

   {

   //addition 

       sum= sum+ ((k >= 0)? a[k] - '0': 0);  

       sum= sum+ ((l >= 0)? b[l] - '0': 0);

        x=sum%2;

      result=(x+'0') +result;

  // Compute carry

       sum =sum/ 2;  

       // Move to next digits  

       k--;  

       l--;  

   }  

   return result; //return value

}

int main()  //main method  

{  

   string a,b;  //string variable

   cout<<"Enter first binary digit: ";  //message.

   cin>>a;     //input from user

   cout<<"Enter Second binary digit: ";  //message.

   cin>>b;     //input from user

   cout <<"Addition :"<<add(a, b)<<endl; //print addition

   return 0;  

}

Output:

Enter first binary digit: 1101

Enter Second binary digit: 100

Addition :10001

Explanation:

In the above c++ program first, we include the header file. Then we define the add function in the add function we add two binary digits by passing value as arguments. In this function, we define a variable that is used on the addition of binary numbers. In this function we define the loop in the loop we check if two binary number is 1 then it will print 0 and pass 1 as the carry. after performing addition it will return value. In the main function, we take two binary numbers from the user and pass the value to the function and print function return value.

8 0
3 years ago
Other questions:
  • What is the formula equivalent to the function =SUM(B1:B5)?
    11·2 answers
  • Which of the following is a template definition?
    5·1 answer
  • Cleaning the keyboard is the most important part of keeping your computer running at peak performance.
    5·2 answers
  • When writing a personal narrative, what point of view would be best to use? (1 point) first person second person third person th
    10·2 answers
  • which virtue you need to secure information by limiting computer access to authorized personnel only?
    10·1 answer
  • python (Business: check ISBN-10) An ISBN-10 (International Standard Book Number) consists of 10 digits: d1d2d3d4d5d6d7d8d9d10. T
    12·1 answer
  • Did it surprise you to discover that the Sun is actually a star in the middle of its life cycle? Why or why not?
    8·1 answer
  • Select the correct answer from each drop-down menu. The following diagram shows four resistors. What is the effective resistance
    9·1 answer
  • Molly claims that she doesn’t have to proofread her code for typos because the interpreter will catch her mistakes for her. Is s
    10·1 answer
  • _is the joining of two or more electrical conductors by mechanically twisting the conductors together or by using a special spli
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!