1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sidana [21]
3 years ago
7

Information in​ folders, messages,​ memos, proposals,​ emails, graphics, electronic slide​ presentations, and even videos create

d in different formats and stored in many locations is considered​ ________ knowledge.
Computers and Technology
1 answer:
valkas [14]3 years ago
5 0

Answer:

The answer is "Unstructured"

Explanation:

In comparison, unstructured information applies to information, which doesn't suit the conventional column and rows concerning databases properly. It is also known as sources, that include mails, audio and video files, web pages and posts in  communication networks.

  • This tracks and communicates on travel and object flow-through sensors and much more.
  • These types of data are used in both companies and organizations.
You might be interested in
What are the uses of DVD Ram​
Verdich [7]

Answer:

Like ordinary random access memory (RAM), it can be repeatedly read, written to, and erased. Intended mostly for removable computer storage, DVD-RAM provides the capabilities of Rewriteable CD (CD-RW) - users can run programs from the discs, copy files to them and rewrite or delete them.

4 0
3 years ago
Read 2 more answers
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
My mom hid my laptop and now I can't find it​
Svetach [21]

Answer: did you look everywhere ask for it and be like mom i wont do (whatever you did) ever again so please give me a chance can i plsss!!!!!! have it back?

Explanation:

simple as that step by step

3 0
3 years ago
Click this link to view O*NET’s Work Styles section for Petroleum Engineers. Note that common work styles are listed toward the
inysia [295]

Answer:

2 (cooperation )

3 (integrity)

5 (analytical thinking)

6 (dependability)

Explanation:

Good luck! Hope this helps.

4 0
3 years ago
Read 2 more answers
You've decided to build a new gaming computer and are researching which power supply to buy. Which component in a high-end gamin
mart [117]

Answer:

Following are the solution to the given question:

Explanation:

In this order, it is typically the GPU and CPU. The most important way to consider is to look at the details of the components to enhance watts. Add up to 100 watts so make sure it was safe and ok. Just buy a PSU with an extra 100 watts of leeway for your system. This is indeed a slight price difference.

5 0
3 years ago
Other questions:
  • เเปลภาษานิราศภูเขาทอง
    10·1 answer
  • 1. Think about the various ways in which you have seen hackers portrayed in popular media over the past few years. Are they hero
    11·1 answer
  • What is the target audience for this poster?
    5·2 answers
  • Which tcp/ip troubleshooting command should you use to determine whether a client and server are communicating with each other?
    7·1 answer
  • Explain by details operator overloading in C++ with example
    6·1 answer
  • Whe you read anything online how do you know whether or not is coming from a reliable source?
    14·2 answers
  • Your assignment is to write an assembly language program which read a string and print it in uppercase. This program asks the us
    11·1 answer
  • Select the correct answer from each drop-down menu.
    6·2 answers
  • Plz help
    14·2 answers
  • It is used to loosen or tighten slotted screws. * 1 point A. Hex Driver B. Torx Screwdriver C. Philips Head Screwdriver D. Flat
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!