1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antoniya [11.8K]
4 years ago
10

Importing data is sending data to a new file.Is this true or false

Computers and Technology
2 answers:
Olin [163]4 years ago
5 0
It is false because importing is used for recieving data.
Kipish [7]4 years ago
3 0

false homie I gotcho


You might be interested in
What is computer hardware / software​
Pavel [41]

Answer: <u>Computer hardware is any physical device used in or with your machine, like for example, a mouse, or a keyboard.</u> Computer software is a collection of programming code installed on your computer's hard drive it can process billions of data and inputs through this.

Hope this helps!

5 0
3 years ago
Total_coins = 0
Maslowich

The code statement that completes the program is total_coins = nickel_count + dime_count

<h3>How to complete the segment?</h3>

From the code segment, we have the following highlights:

  • total_coins is initialized to 0, at line 1
  • Inputs for nickel_count and dime_count are taken on lines 2 and 3
  • The last line prints total_coins

The above means that total_coins has not been calculated.

This is calculated using:

total_coins = nickel_count + dime_count

The above must be placed before the last line of the program

Read more about code segments at:

brainly.com/question/24833629

#SPJ1

<h3>Complete question</h3>

Complete the code segment to calculate the total number of coins

total_coins = 0

nickel_count = int(input())

dime_count = int(input())

print(total_coins)

8 0
2 years ago
When a policy setting in Computer Configuration and User Configuration in the same GPO conflict, the Computer Configuration poli
Maru [420]

Answer:

True

Explanation:

Computer Configuration policy applied first. This happens when the Computer system boots up. Then the user policy is applied when the user logs on. This takes place when the user object is in the same organizational unit.

So Computer Config policy setting takes precedence. User configurations is applied to local users only while computer configuration is applied to the machine itself. First the Computer GPO is applied and then the User GPO.  Loopback processing in replace mode enforces the Computer GPO over the user GPO.

8 0
4 years ago
Anti-malware software should be installed on computer systems to detect and prevent malware infections.
Evgen [1.6K]

Answer:

true

Explanation:

Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. A wide variety of types of malware exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, and scareware

Antimalware (anti-malware) is a type of software program designed to prevent, detect and remove malicious software (malware) on IT systems, as well as individual computing devices

6 0
3 years ago
Read 2 more answers
The volumes of data collected by contemporary organizations are so huge that they are beyond the ability of typical DBMS to capt
lys-0071 [83]

Answer:

Some of the new technologies developed to handle the big data are as follows:

1. In-memory Databases

2. Blockchain

3. NoSQL Databases

4. Edge Computing

5. Streaming Analytics.

6. Artificial Intelligence

Explanation:

Some of the new technologies developed to handle the big data are explained as follows:

1. In-memory Databases: This allows for rapid and easy access to data and analytics, which can be used to inform a variety of business choices. In-memory computing provides the information required to improve marketing, finances, and operations efficiency.

2. Blockchain: Blockchain is the distributed database technology that underpins the Bitcoin digital currency, and it's a darling among forward-thinking analysts and venture capitalists. The distinctive feature of a blockchain database is that data can't be erased or changed after it's been written. Furthermore, it is extremely secure, making it a perfect solution for sensitive industries such as retail, insurance, health care, banking, and among others.

3. NoSQL Databases: NoSQL databases are used to store unstructured data and offer quick performance. This implies it can handle a wide range of data formats in high volumes while remaining flexible. MongoDB, Redis, and Cassandra are examples of NoSQL databases.

4. Edge Computing: Edge computing systems evaluate data very near to where it was originated — at the network's edge — rather than sending it to a centralized server for analysis. An edge-computing system has the advantage of minimizing the quantity of data that must be transferred over the network, therefore lowering network traffic and expenses.

5. Streaming Analytics: By analyzing data as it is created, Streaming Analytics allows for faster and faster access to insights. Streaming Analytics can also take data from a variety of sources, evaluate it, and offer insights almost instantly.

6. Artificial Intelligence: Artificial intelligence has the ability to transform data analytics by learning (from previous analytic activities) and improving the speed and accuracy of outputs over time. Artificial intelligence has the ability to make accurate future predictions based on current events with vast amounts of data to draw from, as well as analytic results from previous inquiries.

8 0
3 years ago
Other questions:
  • What attributes a website indicates a more reliable source for information
    14·1 answer
  • If an individual column is listed in a SELECT clause, along with a group function, the column must also be included in a(n) ____
    12·1 answer
  • Write a while loop that prints that number doubled without reaching 100. Follow each number with a space. After the loop, print
    12·1 answer
  • Yall like portal 1 or 2
    8·1 answer
  • Recent advances in information technologies (IT) have powered the merger of online and offline retail channels into one single p
    10·1 answer
  • A range check that can be used in Microsoft access to calculate the data collected which is date and time
    10·1 answer
  • Click this link to view O*NET's Skills section for Biomedical Engineers. Note that common skills are listed toward the top and l
    8·2 answers
  • Match the image to the view type in a presentation program. scroll bar tool bar status bar menu bar provides an array of buttons
    10·2 answers
  • According to the reading on the course web pages, the earliest usage of cooking began around _____ million years ago.
    12·1 answer
  • Which is the best description of the difference between bound and unbound forms?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!