1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
brilliants [131]
3 years ago
14

Why is data processing done in computer?​

Computers and Technology
1 answer:
Jet001 [13]3 years ago
7 0

Answer:

The Data processing concept consists of the collection and handling of data in an appropriate and usable form. Data manipulation is the automated processing in a predetermined operating sequence. Today, the processing is done automatically using computers and results are faster and more accurate.

Explanation:

  • Data is obtained from sources such as data lakes and data storage facilities. The data collected must be high quality and reliable.
  • By using a CRM, such as Salesforce and Redshift, a data warehouse, the data collected are translated into mask language.
  • The data are processed for interpretation. Machine learning algorithms are used for processing. Their procedure varies according to the processed data (connected equipment, social networks, data lakes).
  • These data are very helpful to non-data scientists. The information is transformed into videos, graphs, images, and plain text. Company members may begin to analyze and apply this information to their projects.
  • The final stage of processing is the use of storage in future. Effective data storage to comply with GDPR is necessary (data protection legislation).
You might be interested in
 In which part of a professional email should you try to be brief, but highly descriptive? 
quester [9]
The subject line should be a brief message explaining some of the contents of the email.
4 0
3 years ago
An attacker has obtained the user ID and password of a data center's backup operator and has gained access to a production syste
solong [7]

Answer:

D.

Explanation:

Based on the information provided surrounding this scenario, it can be said that the most likely next course of action would be to create an alternate user ID to maintain persistent access. This would allow the attacker to have continuous access into the network in the case that the system administrators detect that the operator's user ID and password have been compromised. Thus also giving the attacker ample time to infiltrate and find vulnerabilities in the network through an alternate hidden user ID.

3 0
4 years ago
How many bits are required to store the text of the number "97" in ASCII?'
valina [46]

Answer:

You need x64 or x32 bits

Explanation:

I don't have a capture or a photo

8 0
3 years ago
Read 2 more answers
An ergonomic keyboard is one that has been designed to fit the natural placement of your hands.
Natasha_Volkova [10]
True
hope this helps 
have a nice day
3 0
3 years ago
Read 2 more answers
Write a function that converts a string into an int. Assume the int is between 10 and 99. Do not use the atoi() or the stoi() fu
Liula [17]

Answer:

Written in C++

#include <iostream>

#include <sstream>

using namespace std;

int main()  {

   string num;

   cout<<"Enter a number: ";

   cin>>num;

   stringstream sstream(num);

   int convertnum = 0;

   sstream >> convertnum;

   cout << "Output: " << convertnum;

}

Explanation:

Without using atoi() or stoi(), we can make use of a string stream and this is explained as follows:

This line declares a string variable num

   string num;

This line prompts user for input

   cout<<"Enter a number: ";

This line gets user input

   cin>>num;

This line declares a string stream variable, sstream

   stringstream sstream(num);

This line declares and initializes the output variable, convertnum to 0

   int convertnum = 0;

The stream is passed into the output variable, convertnum

   sstream >> convertnum;

This line displays the output

   cout << "Output: " << convertnum;

<em>Note that: if user enters a non integer character such as (alphabet, etc), only the integer part will be convert.</em>

<em>For instance,</em>

<em>40a will be outputted as 40</em>

6 0
3 years ago
Other questions:
  • A(n) ________ is installed on your computer, and when the program is opened, your e-mail is downloaded to your computer. web-bas
    14·1 answer
  • A system will always require what power connector?
    8·1 answer
  • What is malware short for?
    13·2 answers
  • Employees at a store are paid daily wages according to the following rules.
    6·1 answer
  • Write a program that calculates the occupancy rate for each floor of a hotel. The program should start by asking for the number
    10·1 answer
  • What are the disadvantages of plasma display?
    9·1 answer
  • A magnetic disk drive requires a motor to position a read/write head over tracks of data on a spinning disk, (see fig. e4.4 in d
    8·1 answer
  • Which sentence describes a biotechnology method of treating sulfur liquor in the paper industry?
    11·1 answer
  • .
    5·1 answer
  • A(n) _____________ changes the order in which instructions are carried out by directing the computer to execute a statement else
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!