1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UkoKoshka [18]
3 years ago
6

What is data and imformation?​

Computers and Technology
1 answer:
viva [34]3 years ago
5 0

Answer:

data information is basically bits of information,but not information itself.when data are processed,interpreted,organized,structured or presented so as to make them meaningful or useful.

hope it helps

You might be interested in
Por favor alguem poderia me falar qual PC e melhor: Computador Gamer Fox PC FPS Intel Core i5 8GB (GeForce GTX 1050Ti 4GB GDDR5)
Ivanshal [37]

Eu acredito no primeiro como ele tem uma GTX 1050ti, i5 e 2tb.

3 0
3 years ago
In the secure development lifecycle, how must the specific security needs of software being developed be defined?- Coding phase
Karo-lina-s [1.5K]

Answer: Requirements phase

Explanation:Requirement phase in the SDL(secure development life-cycle) is the phase where the security is fused with integrity part for any product. This mechanism is done to know about the requirement of the product in the security field. This is done to achieve the completeness in the product and to recover the mistakes that had happened earlier in the product due to security issues.

Other phase given in the option are for making the code, designing the model of product and testing the products aspects respectively.

4 0
3 years ago
Michelle is writing an assignment on programming language. Help Michelle complete the following statement that describes the inp
Oliga [24]

Input statements allow the user to enter data that a program uses to perform necessary computations. Users enter the data when they <u>encounter the statements like the scanf() or gets() functions in the program.</u>

<u>Explanation:</u>

The scanf() is the function that is used to take inputs from the user with the help of the standard input device,i.e, the keyboard.

scanf() function is capable of taking any data type as an input, though it has to be specified first like %d for integers, %s for strings and %f for floating-point type. The gets() function can only take a string as an input.

3 0
4 years ago
7. Which cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem
Stells [14]

Answer:

The concealment cipher.

Explanation:

A concealment cipher also known as null cipher can be defined as an obsolete encryption format that typically involves the mixture of plaintext with non-cipher elements. This ultimately implies that, the plaintext is hidden in another message through encryption.

The concealment cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem.

Basically, the concealment cipher is solely dependent on the clues of the physical factors that mainly affects the sender and receiver in a communication system.

7 0
3 years ago
Jose wants to be sure maintains a high credit score as he is planning yo buy a new car soon what should he do to ensure his scor
Vika [28.1K]
Make his payments on time
7 0
3 years ago
Read 2 more answers
Other questions:
  • What does a rung lock do to an extension ladder?
    6·1 answer
  • Why is it a mistake to put e-mail address of people who don't know each other in the "to:" field
    9·2 answers
  • If you were practicing keyboarding and the excercise contained the letters q,o,e,p,r and t, what section of the keyboard are you
    14·1 answer
  • What your computer can do to you?
    14·2 answers
  • C programming: loading a dictionary into a trie data structure. Why am I segfaulting?
    8·1 answer
  • The northern half of this continent is primarily rainforest and savanna.
    5·1 answer
  • Drew is creating a game that stops the timer when the hourglass
    15·1 answer
  • Serena, an analyst at an environmental agency, wants to prepare a report using data from the Car Emissions database.
    11·2 answers
  • Multiple Choice
    9·1 answer
  • ________ involves disconnecting individual users from their selected internet service providers and redirecting them to illegiti
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!