1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Viefleur [7K]
3 years ago
14

Think of an example in your life where a number could be described as data, information, and knowledge

Computers and Technology
1 answer:
zhannawk [14.2K]3 years ago
4 0

Answer:

how many event you have been too in the last month (well non during this time but as an example)

Explanation:

You might be interested in
Lin is booting up his computer, and during the boot process, the computer powers down. After several unsuccessful attempts to bo
Alex787 [66]

Answer:

A. Processor.

Explanation:

When a computer system works working or does not boot, it is mostly ask a result of power supply failure.

The system does not come on, that is, the fan and screen does not come up and the caps lock indicator is not blinking. The power supply shows that the power is good.

When the processor is not sitting properly and when the motherboard has failed, the signs mentioned above are observed.

Not to escalate the problem, test for the processor status as a probable cause with another functional and compatible processor before the motherboard.

4 0
3 years ago
Is a computer an input output or storage
Effectus [21]

Answer:

Explanation:

A computer is a machine that can be programmed to accept data (input), process it into useful information (output), and store it away (in a secondary storage device) for safekeeping or later reuse. The processing of input to output is directed by the software but performed by the hardware.

6 0
3 years ago
Your company is implementing a wireless network and is concerned that someone from a competing company could stand outside the b
hoa [83]

Answer:

Option A i.e., AES is correct.

Explanation:

The user corporation is installing the wireless server and seems to be worried when anyone representing the rival corporation might stands outside that property as well as gather wireless information. He ensured that corporation which WPA2 is safe. However, AES creates WPA2 stronger than WPA.

  • Option B is incorrect according to the following scenario because it is the security mechanism used when component through the IEEE 802.11i WLAN standard.
  • Option C is incorrect according to the following scenario because it is the protocol initially developed for configure wireless clients to such a dial-in connection device.
  • Option D is also incorrect according to the following scenario because it is the terminal access control.
6 0
4 years ago
Write a function that accepts a pointer to a C-string as an argument and returns the number of words contained in the string. Fo
Anon25 [30]

Answer:

To preserve the original format of the answer, I've added it as an attachment

Explanation:

This line defines the function

int countWords(const char ptr){

   

This line initializes number of words to 0

   int words = 0;

The following iteration is repeated until the last character in the argument is reached

   while(*(ptr) != \0){

This checks if current character is blank

       if(*ptr==  ){

If yes, then it increments number of words by 1

        words++;

 }

This moves the pointer to the next character

       ptr++;

   }

This returns the number of words in the argument

   return words+1;

}

The main begins here

int main() {

This declares user input as a character of 200 length

   char userinput[200];

This prompts user for input

   cout << Enter a string: (200 max): ;

This gets user input

cin.getline(userinput, 200);

This passes the c-string to the function and also prints the number of words

cout << There are  << countWords(userinput)<< words;

Download cpp
4 0
3 years ago
When a router fails to send messages in a timely fashion, this is a problem of the _____.
natima [27]
<span>network layer  

hope it helped</span>
4 0
3 years ago
Other questions:
  • Write a unit test for addInventory(). Call redSweater.addInventory() with parameter sweaterShipment. Print the shown error if th
    9·2 answers
  • Which best describes the Big Bang Theory?
    12·2 answers
  • Convert 234.43 (base 7) to base 10
    7·1 answer
  • Describe two ways the ARPANET is different from the internet
    12·1 answer
  • reading is important blank areas of life A in very few B in many C only in academic D only in career​
    10·1 answer
  • HELP FAST PLEASE!!! What is a glass tube containing electrodes used as a switch to produce on or off signals for the computer? F
    10·1 answer
  • Which of the following is not one of the Generally Accepted Recordkeeping Principles ("The Principles®")? a. Accountability b. S
    11·1 answer
  • A life insurance salesperson who takes advantage of the foot-in-the-door phenomenon would be most likely to:________
    14·1 answer
  • True or false? Software application packages function as the interface between the operating system and firmware.
    7·1 answer
  • Who likes my meme? :)
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!