1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gladu [14]
3 years ago
8

Descriptive information (e.g., title, author, subjects covered, location as a webpage) about an information resource in an infor

mation system is called? Group of answer choices
A) Metadata
B) Syntax
C) Faceted classification
D) Descriptors
Computers and Technology
1 answer:
Stella [2.4K]3 years ago
4 0

Answer:

A) Metadata

Explanation:

Metadata is information about data. call it data about data if you like and it could be descriptive, structural, statistical or administrative, the aim is to provide further information about a particular data element for example in descriptive meta data which is useful for discovery and identification as it provides futher information such as title, keywords, authur and abstract.

You might be interested in
A part-time job performed while in high school must have the approval of your school counselor.
Artist 52 [7]

Answer:

False, it only needs approval of your parents/guardian

May I have brainliest please? :)

4 0
3 years ago
Read 2 more answers
What is meant by byte in computer terminology​
dsp73

Answer:

Byte, the basic unit of information in computer storage and processing. A byte consists of 8 adjacent binary digits (bits), each of which consists of a 0 or 1. The string of bits making up a byte is processed as a unit by a computer; bytes are the smallest operable units of storage in computer technology.

Explanation:

Can I be brainliest? TYSMMMMMM      

7 0
3 years ago
Read 2 more answers
Consider the following code segment.
Bingel [31]

Answer:

A.)

arr[0] = 10;

arr[1] = 10;

Explanation:

Given the array:

arr = {1,2,3,4,5}

To set the first two elements of array arr to 10.

Kindly note that ; index numbering if array elements starts from 0

First element of the array has an index of 0

2nd element of the array has an index of 1 and so on.

Array elements can be called one at a time using the array name followed by the index number of the array enclosed in square brackets.

arr[0] = 10 (this assigns a value of 10 to the index value, which replace 1

arr[1] = 10 (assigns a value of 10 to the 2nd value in arr, which replaces 2

3 0
3 years ago
The view that perceptual processes take place over time and can be thought of in terms of a software/hardware metaphor is known
Wittaler [7]

The view that perpetual processes can be thought of in terms of a software/hardware metaphor is known as the: information processing view.

<h3>What is the Information Processing View?</h3>

Information processing view is explained by the cognitive theory to explain how the brain encodes information and how information are filtered from what we pay attention to in a particular moment. This also determines what is stored in the short-term or in our long-term memory.

Therefore, the view that perpetual processes can be thought of in terms of a software/hardware metaphor is known as the: information processing view.

Learn more about the information processing view on:

brainly.com/question/24863946

3 0
2 years ago
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
3 years ago
Other questions:
  • Ted is a fashion designer. Where is he most likely to work
    9·1 answer
  • How useful do you find the creation of folders in your computer?
    8·2 answers
  • What do you like to play
    13·2 answers
  • What will be the value of i after the C statements at the right have been executed
    6·1 answer
  • Write a program that reads a target string from the keyboard and then another sentence string from the keyboard.
    10·1 answer
  • List the names of 3 computer scientists
    6·2 answers
  • Find the reciprocal of 7/2 × 3/5<br>​
    6·1 answer
  • Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a pr
    10·1 answer
  • TCP and the User Datagram Protocol (UDP) provide _________ between processes on any two of those hosts. A. address translation B
    6·1 answer
  • Many ____ classes for certification are available on the Internet and by many companies that have set up intranets within their
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!