1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goryan [66]
3 years ago
10

What is data? why is it important to collect data ? explain the points.​

Computers and Technology
1 answer:
iVinArrow [24]3 years ago
4 0

Answer:

Hi

Diwa How r u

will u b m.y gf

You might be interested in
which network component connects a device to transmission media and allows the device to send and receive messages?
krok68 [10]

Answer: Hello!

Network Interface Card (NIC)

Explanation:

Mark me brainest please. Hope I helped! Hope you make an 100%

-Anna♥

5 0
3 years ago
Describe the ways in which a computer-aided design (CAD) drawing makes the details of an image easier to understand.
cupoosta [38]

Answer: CAD is mainly used for detailed engineering of 3D models or 2D drawings of physical components, but it is also used throughout the engineering process from conceptual design and layout of products, through strength and dynamic analysis of assemblies to definition of manufacturing methods of components.

Explanation:

3 0
3 years ago
Read 2 more answers
True or False: It is the CISO❝s responsibility to ensure that InfoSec functions are performed within an organization. A) True B)
algol [13]

Answer: True

Explanation: CISO(Chief information security officer) is the officer that is responsible for the information security(Infosec) function to be implemented in the organization.He/she manages the procedures, protect from the threats in business, secures the enterprise communication.

The post of CISO is considered as a senior level officer .The responsibilities of the CISO also includes getting along with other section of the organization and assuring about the smooth and secured processing of the business work as the aspect of information security.Thus the statement given is true

3 0
3 years ago
Task 3&amp;4, please <br> with the formula
Anastasy [175]
It’s 12 because 3 times 4 is twelve, hope i helped!
6 0
3 years ago
Select the education or qualification that is best demonstrated in each example Freda interviews a famous local athlete on a tel
Lilit [14]

Answer:

communication skills

bachelor's degree

planning and organizational skills

research skilss

8 0
3 years ago
Other questions:
  • FILL IN THE BLANK...............
    8·1 answer
  • How many different Microsoft Windows file types can be infected with a virus?
    10·1 answer
  • The technique of ________ uses three columns that allows the entrepreneur to weigh both the advantages and the disadvantages of
    13·1 answer
  • What is good prossesser
    15·2 answers
  • Define an iterative function named append_ordered; it is passed two arguments: a linked list (ll) whose values are ordered from
    15·1 answer
  • What file name would allow you to easily find and edit your document later in Word Online?
    14·2 answers
  • Provide examples of how information technology has created an ethical dilemma that would not have existed before the advent of I
    7·1 answer
  • In Python, the data structure that stores elements of the same data type is called an array.
    6·1 answer
  • Which of the following can be used to help find the error
    8·1 answer
  • Add me as a friend on Real pool 3D so we can play a round of pool!!!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!