1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tresset_1 [31]
3 years ago
9

_______ is the process of checking data for validity and completeness

Computers and Technology
1 answer:
timurjin [86]3 years ago
7 0
Data Editing is the answer
You might be interested in
When Britain forbade the sale of cotton to the Central Powers, how did it deal with U.S. cotton trading
tresset_1 [31]

Britain deal with U.S. cotton trading by  purchasing American cotton surplus.

<h3>Who were the Central Powers ?</h3>

The Central Powers can be referred to as the Central Empires, and they serves as the part of coalitions who fought World War I, they comprises German Empire, Austria-Hungary and others.

Britain Britain forbade the sale of cotton to the Central Powers, and that's why they do buy in surplus from United States.

Learn more about Central Powers,  at;

brainly.com/question/651584

4 0
2 years ago
Need help with this is photography :)
mestny [16]

Answer:

UV filter, This filter blocks UV light and removes the blue cast from images taken in very bright sunny conditions. ... With old film cameras it was often necessary to use a UV filter because film is extremely sensitive to UV light.

8 0
3 years ago
Be able to identify these different hazards ​
UNO [17]

Answer:

In order to control workplace hazards and eliminate or reduce the risk, you should take the following steps: identify the hazard by carrying out a workplace risk assessment; determine how employees might be at risk; ... record and review hazards at least annually, or earlier if something changes

6 0
3 years ago
About.com is considered a (an):
Assoli18 [71]

B general search engine


8 0
3 years ago
Can someone buy me eddie van der tabs???
sineoko [7]

Answer:

No

Explanation:

U cannot exploit people like that

4 0
4 years ago
Other questions:
  • What is the value of the variable phones after the execution of the following code? phones = {'John': '5555555', 'Julie' : '7777
    6·1 answer
  • Businesses use a fax cover sheet is to _____. provide detailed service and product information make sure message reaches the rig
    14·2 answers
  • Select the correct answer.
    13·1 answer
  • Stamps offers at-home postage and mailing for a monthly fee. Customers are able to carry a balance on their accounts that allows
    7·1 answer
  • Which of the following statements represents the number of columns in a regular two-dimensional array named values?
    9·1 answer
  • For this lab, you will work on a simple GUI application. The starting point for your work consists of four files (TextCollage, D
    5·1 answer
  • Create a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The loop shou
    5·1 answer
  • Weak Induction
    8·1 answer
  • The _______ displays the data series in separate columns side-by-side so that you can compare the relative heights of the column
    5·2 answers
  • How many slides would be in a PowerPoint presentation based on the formatting of the Word outline?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!