1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
6

Which of these can be considered data ?

Computers and Technology
2 answers:
expeople1 [14]3 years ago
7 0

Answer:

the answer is d

Explanation:

fact and info are almost the same and data can also hold opions or belief.

adoni [48]3 years ago
6 0
Well, almost everything can be considered data. Your school notes, your homework, almost everything, so the answer is D.
You might be interested in
2. (40 POINTS) Assume a 16-word direct mapped cache with b=1 word is given. Also assume that a program running on a computer wit
Fynjy0 [20]

Answer:

See the attached file for the answer.

Explanation:

(a) Find attached of question a.

b. the miss rate for the above instructions address sequence is 100% as no address is repeated.

5 0
3 years ago
What makes this information systems environment unique? (3 points)
QveST [7]

Information technologies are unique not just because of their growing use in decision-making and knowledge management systems, important as that is. Their use has also yielded significant improvements in the efficiency of energy and materials use.

6 0
3 years ago
1. Describe data and process modeling concepts and tools.
kow [346]

Answer:

data is the raw fact about its process

Explanation:

input = process= output

data is the raw fact which gonna keeps in files and folders. as we know that data is a information keep in our device that we use .

5 0
3 years ago
Read 2 more answers
What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b
Paraphin [41]

Answer:

Answered below

Explanation:

Coaxial cables weaknesses include; fluctuation of speed during heavy use, leaks at the point of connection and signal loss over long distances. Twisted pair cables are not durable enough and are susceptible to interference. Fibre optic cables are costly and need expertise to install.

Hacked or compromised routers can be infected with malwares that reroutes users to spam sites and also to ddos attacks.

Steps to protect cable networks include; network encryption, physical security, VPN usage, updating networks, auditing and mapping.

3 0
3 years ago
Maria would like to present data about the company's products to clients. Maria should _____.
Sav [38]

Answer:

Print the data in table format.

Explanatio

5 0
3 years ago
Read 2 more answers
Other questions:
  • If you are planning to carry a large balance on your credit card, which of the following credit card features should you look fo
    7·2 answers
  • What is the purpose of the operating systems processor management function
    7·1 answer
  • What are the four requirements of a linear programming​ problem?
    8·1 answer
  • Which best describes TPM?
    14·1 answer
  • In your organization, each department has a folder on a shared drive. Your boss frequently copies the folder to his local comput
    15·1 answer
  • You are given a 11-bit floating point representation with 1-sign bit, 3 bits for the exponent, and 7-bits for the mantissa. Expr
    9·1 answer
  • 1. Consider a database with object X and Y and assume that there are two transactions T1 and T2. Transaction T1 reads objects X
    5·1 answer
  • True/false
    8·1 answer
  • A carver begins work on the following block of granite that weighs 2700 g. What is the density of the granite?
    13·1 answer
  • Write down the different types of testing with their definition.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!