1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAVERICK [17]
3 years ago
11

The process of acquiring data for a program to use is called:

Computers and Technology
1 answer:
marusya05 [52]3 years ago
8 0

Answer:

a. Data Entry

Explanation:

Great Question, it is always good to ask away and get rid of any doubts you may be having.

The process described in the question is called Data Entry and/or Data Acquisition. Data is gathered and stored in the computers memory to then be used by a specific program or function. Without this data being gathered the program or function cannot complete its task. Therefore Data Entry is extremely needed for the correct and healthy function of a program.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You might be interested in
Match the following tasks with their appropriate timing.
Oliga [24]

Answer:

3. 1. 2. daily, weekly, monthly

Explanation:

8 0
3 years ago
Respond to the following in 2-5 paragraphs. Give an example of how you can demonstrate active listening.
nadezda [96]
Hey my name is ..... and this do the thesis
8 0
3 years ago
When was the first computer invented?
sweet [91]
The EINAC at the university of pennsylvania, completed in 1946. It weighed more than 50 tons.
4 0
3 years ago
Read 2 more answers
To use an outline for writing a formal business document, what should you
nydimaria [60]

Answer: D. enter each major point from the outline on a separate line

6 0
3 years ago
What is the basic difference between x.509 and pgp in terms of key hierarchy and key trust?
ra1l [238]
In terms of key hierarchy, you have to request to a Certification Authority in order for them to issue you an X.509 certificate. On the other hand, you can creat your own pgp.

In terms of key trust, X.509 supports only a sole key owner. It can support only one digital signature to confirm the key's validity. This does not work for pgp.
3 0
3 years ago
Other questions:
  • wHAT ARE THE 5 LAYERS in the internet protocol stack andwhat are the principal responsibilities of eack of theselayers.?
    12·1 answer
  • A ________ restricts the number of a certain type of product that can be imported into a country.
    5·1 answer
  • If one breakfast meal of banana lacatan, scrambled egg, plain rice, and hot milk contains 58 grams carbohydrate, 12 grams protei
    11·1 answer
  • When projecting a presentation on a large screen, what should your minimum font size be?
    6·2 answers
  • If my_string = "This is MY string!", why does print (my_string[0:7:5]) return "Ti" and not
    11·1 answer
  • The name of a person their address and their contact information like phone number and email address or consider the minimum inf
    9·1 answer
  • Yall tryna play gta later? I play on ps4
    12·2 answers
  • an existing technology that would allow users to transfer images from the camera to the computer without connecting them
    8·1 answer
  • Choose the answer.
    15·1 answer
  • Network forensic analysis. A network forensic analyst is responsible for identifying worms, viruses, and infected nodes in the c
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!