1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
evablogger [386]
3 years ago
10

Why is data processing done in computer

Computers and Technology
1 answer:
oksian1 [2.3K]3 years ago
6 0

Answer:

Explanation:

Data processing occurs when data is collected and translated into usable information. Usually performed by a data scientist or team of data scientists, it is important for data processing to be done correctly as not to negatively affect the end product, or data output.Any use of computers to perform defined operations on data can be included under data processing.

You might be interested in
highlight the possible risks and problems that should be address during the implementation of information system process
Olenka [21]

Answer:

The answer is below

Explanation:

The possible risks and problems that should be addressed during the implementation of the information system process are:

1. power loss or data corruption

2. System design faults

3. Cultural barriers

4. Integration of Software Development device

5. Using the same processes in the company

6. Security breaches

7. Hardware and Software failure

8. Work environment

8 0
2 years ago
A technician needs to boot a PC from a USB drive.
Oxana [17]

Answer: C) Secure boot

Explanation:

 Secure boot settings should be disable when we need to boot the personal computer (PC) by using the USB drive.

Secure boot system helped to prevent from the unauthorized software applications from loading the booting process. It is basically introduced by window 8 system.

In personal computer, we disable the secure boot from the personal computer firmware menu like BIOS. It is basically require to be configure so that this cannot be disable.

Therefore, Option (C) is correct.  

3 0
3 years ago
To exit Access, click the ____ button on the right side of the Access title bar.
Natalka [10]
Click the Close button
5 0
2 years ago
What makes smartphones so fragile?
In-s [12.5K]
Glass screen probably
7 0
3 years ago
Cuántos tipos de grua existen en el mundo​
natka813 [3]
Grúas semi pórtico, carretilla pórtico, side lifter, grúas torre, grúas puente, grúas flotantes... y mas
Espero q esto te ayude! :))
3 0
3 years ago
Other questions:
  • "The network layer is responsible for transferring packets of data from the A.Source computer to the destination computer on adj
    11·1 answer
  • 3. The term integration refers to the ability to
    6·1 answer
  • The model for Diminishing Marginal Utility is ______ in nature.
    12·1 answer
  • Several new projects are being staffed by outside contractors who will be working on servers in the contractors’ office, not in
    5·2 answers
  • How do I start conversations with ppl??? If u answer right I will try send u more points... So please help me
    7·1 answer
  • Which of these expressions is used to check whether num is equal to value?
    13·1 answer
  • Genetics Vocabulary: no <br> Allele: Different versions of the same qene (Aa, Bb)
    11·1 answer
  • Consider the following incomplete method. Method findNext is intended to return the index of the first occurrence of the value v
    15·1 answer
  • What plugs into this?
    6·2 answers
  • Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!