1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
brilliants [131]
2 years ago
14

Why is data processing done in computer?​

Computers and Technology
1 answer:
Jet001 [13]2 years ago
7 0

Answer:

The Data processing concept consists of the collection and handling of data in an appropriate and usable form. Data manipulation is the automated processing in a predetermined operating sequence. Today, the processing is done automatically using computers and results are faster and more accurate.

Explanation:

  • Data is obtained from sources such as data lakes and data storage facilities. The data collected must be high quality and reliable.
  • By using a CRM, such as Salesforce and Redshift, a data warehouse, the data collected are translated into mask language.
  • The data are processed for interpretation. Machine learning algorithms are used for processing. Their procedure varies according to the processed data (connected equipment, social networks, data lakes).
  • These data are very helpful to non-data scientists. The information is transformed into videos, graphs, images, and plain text. Company members may begin to analyze and apply this information to their projects.
  • The final stage of processing is the use of storage in future. Effective data storage to comply with GDPR is necessary (data protection legislation).
You might be interested in
If you specify a user without specifying a hostname, mysql will
ruslelena [56]
<span>If you specify a user without specifying a hostname, mysql will </span>automatically put a percent sign (%) the host to show that the user can connect from any host.
3 0
3 years ago
Which camera required the photographer to project the image on paper
MakcuM [25]

Answer: A polaroid

Explanation: I have all these cameras

7 0
3 years ago
Read 2 more answers
Discuss the core technologies and provide examples of where they exist in society. Discuss how the core technologies are part of
Vika [28.1K]

Answer:

Part A

The core technologies are the technologies which make other technologies work or perform their desired tasks

Examples of core technologies and where they exist are;

Thermal technology, which is the technology involving the work production, storage, and transfer using heat energy, exists in our refrigerators, heat engine, and boilers

Electronic technology is the technology that involves the control of the flow of electrons in a circuit through rectification and amplification provided by active devices. Electronic technology can be located in a radio receiver, printed circuit boards (PCB), and mobile phone

Fluid technology is the use of fluid to transmit a force, provide mechanical advantage, and generate power. Fluid technologies can be found in brakes, automatic transmission systems, landing gears, servomechanisms, and pneumatic tools such as syringes

Part B

The core technologies are the subsystems within the larger systems that make the larger systems to work

The thermal technology in a refrigerator makes use of the transfer of heat from a cold region, inside the fridge, to region of higher temperature, by the  use of heat exchange and the properties of the coolant when subjected to different amount of compression and expansion

The electronic technologies make it possible to make portable electronic devises such as the mobile phones by the use miniaturized circuit boards that perform several functions and are integrated into a small piece of semiconductor material

Fluid technologies in landing gears provide reliable activation of the undercarriage at all times in almost all conditions such that the landing gears can be activated mechanically without the need for other source of energy

Explanation:

6 0
3 years ago
True or false?
kenny6666 [7]

Answer:

True

Explanation:

An effective way of protecting programs against classic stack overflow attacks is to instrument the function entry and exit code to setup and then check its sack frame for any evidence of corruption.

5 0
3 years ago
Read 2 more answers
Is it possible to code your own game and if so then where should I go to learn and how to publish it?
const2013 [10]

Answer:

Yes there is

Explanation:

It is scratch a coding game to do almost anything you can also code flappybird

Hope this helps.

Have fun with scratch

4 0
2 years ago
Read 2 more answers
Other questions:
  • Which of the following is a valid call for the generic method declared below? and why?
    9·2 answers
  • Whenever I go onto Google Chrome, the words are in Spanish! How can I make the words be back in English again? Please let me kno
    7·1 answer
  • How is the JOptionPaneclass used to display a dialog box that performs a yes/noconfirmation?
    10·1 answer
  • Which result is most likely if a network packet has no header?
    9·2 answers
  • The individual accountable for ensuring the day-to-day operation of the InfoSec program, accomplishing the objectives identified
    7·1 answer
  • A<br>A<br>printount<br>of your report or a till slip is an<br>example of what​
    15·1 answer
  • Que es una red de datos
    7·2 answers
  • According to Okun's law, if the unemployment rate goes from 7% to 4%, what
    15·1 answer
  • How to get the lightning round in dares of eternity
    5·1 answer
  • A(n) _____ is a data validation rule that should be applied to mandatory data items.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!