1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nirvana33 [79]
3 years ago
13

Describe how computers are used to access, retrieve, organize, process, maintain, interpret, and evaluate data and information.

Computers and Technology
1 answer:
Sonja [21]3 years ago
8 0

Information refers to the meaningful output obtained after processing the data. Data processing therefore refers to the process of transforming raw data into meaningful output i.e. information.Mechanically using simple devices like typewriters or electronically using modern data processing tools such as computers.

You might be interested in
Give an efficient algorithm to find all keys in a min heap that are smaller than a provided valueX. The provided valuedoes notha
OlgaM077 [116]

Answer:

Starting from root, recursively traverse the min-heap. Once we find a key with value less than our X, we know that every key in subtree of that key will be also smaller than our X. Otherwise, we should keep traversing.

Explanation:

The complexity of this algorithm will be O(N) where N is the number of keys in our min-heap.

3 0
3 years ago
Your organization will be handling market trades. You will be required to verify the identify of each customer who is executing
zmey [24]

Answer:

The correct answer for the following question will be Digital certificate.

Explanation:

An electronic "password" that allows an organization or person to exchange information (data) with security using the public key infrastructure (PKI) over the internet called as Digital certificate. And is also known as Public key certificate and identity certificate.

Digital certificate contains the following things :

  • Copy of certificate holder public key.
  • Name of certificate holder.
  • Serial number which is used to uniquely identify a certificate.
  • Expiration dates.
  • Digital signature of certificates.

What security provided :

  • Identification/Authentication.
  • Access Control.
  • Non-Repudiation.
  • Integrity.

 

5 0
3 years ago
MD5 uses a hash value to create a hash which is typically a 32 character hex number and how many bits?
ryzh [129]

Answer:

128 bits

Explanation:

The MD5, which is the acronym for Message-Digest algorithm 5, invented by a professor of MIT, Ronald Rivest, is a cryptographic hash algorithm that creates a 128 bit hash value and is typically represented as a 32 character hex number. MD5 is the improved version of MD4 which was also created by the same professor.

Following is an example format of an MD5 hash;

<em>ef55d3a698d289f2afd663725127bccc</em>

MD5 has been proven to have security issues. One of these issues is called collision attack - a situation where the same hash is produced for different input data.

8 0
4 years ago
What do you click to create a new presentation in noral view
stepladder [879]
Go to the top left of the page, there you will see "file" click it and click new:)
4 0
3 years ago
To activate Spelling and Grammar check using the ribbon, navigate first to the _____ tab
ipn [44]
I believe you would click on the Auto Correct Tab
7 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is a reason photographing animals can be difficult?
    9·2 answers
  • what is it called when you are biying and selling products via electronic channels such as the internet​
    13·2 answers
  • Program code that can be evaluated to a value is called a(n):__________
    12·1 answer
  • Steven, Marcos, and Juan are having a free-throw shooting contest. Each boy
    9·1 answer
  • __ is used to provide visual clues that the text is hypertext links rather than normal text.
    9·1 answer
  • Find the simple interest Jay owes on a five-year student loan of $48,000 with an annual interest rate of 5%.
    6·1 answer
  • Question #2
    15·2 answers
  • What does this mean?​ pls help me
    12·1 answer
  • Suppose we want an error correcting code that will allow all single-bit errors to be corrected for memory words of length 15. 1.
    5·1 answer
  • The user can close all the programs if he closes the open virtual desktop true false
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!