1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Viefleur [7K]
3 years ago
14

Think of an example in your life where a number could be described as data, information, and knowledge

Computers and Technology
1 answer:
zhannawk [14.2K]3 years ago
4 0

Answer:

how many event you have been too in the last month (well non during this time but as an example)

Explanation:

You might be interested in
GMI = $4,666.67 Total Monthly Deductions $1,131.00 What is the Net Monthly Income (GMI - Total Monthly Deductions) =
Kisachek [45]

Answer:

Net Monthly Income = $3,535.67

Explanation:

Given:

GMI = $4,666.67

Total Monthly Deductions = $1,131

Find:

Net Monthly Income

Computation:

Net Monthly Income = GMI - Total Monthly Deductions

Net Monthly Income = $4,666.67 - $1,131

Net Monthly Income = $3,535.67

6 0
3 years ago
Identify when programmers use an Else statement.
Gnesinka [82]

Answer:

to tell the program to take a different action when the If statement answer is false

Explanation:

if x = 0:

     print('x equals 0')

else:

      print('x equals something else that isnt 0')

4 0
3 years ago
Read 2 more answers
A level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organ
rewona [7]

Answer:

Option D is correct.

Explanation:

A high-level safety violation could be anticipated to have a serious or disastrous negative impact on organisational activities, organisational assets.

The effect of the violation on an organisation may be staggering, and sometimes unknown until the outcomes are achieved. It is strange that, owing to harmful or neglectful acts, the greatest incidents of compromise come from within the business ; it requires time for an organisation to recover.

8 0
3 years ago
The U.S. is a major player in the global media domain. However, other nations play a role in creating a dominant ideology, as ev
poizon [28]

Answer:

The answer is "Authorization for mobile wiretaps on American citizens."

Explanation:

  • The term media includes advertising, documentaries, painting, and graphic, which allows you to use a blog's domain name, and it can also provide you to create a fake profile.
  • In certain countries, a prevailing philosophy is performed, as demonstrated by the prevalence of telecommunications wiretaps approved in Sweden by US residents.
6 0
3 years ago
Areas on which the development of the computer as a communication technology is based
Alchen [17]

Answer:

Artificial Intelligence.

Automated personal digital assistant.

THz frequencies for Communications (5G & 6G)

Blockchain.

Virtual reality and augmented reality.

Internet of Things (IoT)

Visible light communication.

LTE.

Explanation:

4 0
3 years ago
Other questions:
  • Explain the role of the domain name system
    15·1 answer
  • How many times do you usually use npm?<br> Put your answer in the box.
    6·1 answer
  • A potential threat to administrators’ ability to manage the correctional system is
    12·1 answer
  • Why save html documents as lowercase.?
    9·1 answer
  • Which style did Jack use on the vocabulary words in reports?
    14·2 answers
  • What is the second stage of information processing cycle​
    10·2 answers
  • Write a program that uses an initializer list to store the following set of numbers in an array named nums. Then, print the arra
    10·2 answers
  • To obtain your class E learner license, youll need too _
    9·1 answer
  • Describe psychographic differences among the past five generations of Americans that you learned about in this course. What type
    5·1 answer
  • Without using parentheses, enter a formula in cell F4 that
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!