1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Monica [59]
3 years ago
11

Which of the following best describes how computing devices represent information ​

Computers and Technology
1 answer:
olganol [36]3 years ago
5 0

Answer:

A system is which a computer is used to turn data into information best describes a computer-based information system.

A text code is a system that uses binary numbers (1s and 0s) to represent characters understood by humans (letters and numerals). y An early text codesystem, called EBCDIC, uses eight-bit codes, but is used primarily in older mainframe systems.

Data processing is simply the conversion of raw data to meaningful information through a process. ... Similar to a production process, it follows a cycle where inputs (raw data) are fed to a process (computer systems, software, etc.) to produce output (information and insights).

The central processing unit consists of electronic circuits that interpret and execute program instructions, as well as communicate with the input, output, and storage devices. It is the central processing unit that actually transforms data into information. Data is the raw material to be processed by a computer.

Explanation:

You might be interested in
With the sheets grouped, apply Underline to cell B5 and Double Underline to cell B6. Ungroup the worksheets. Note, use the Forma
Orlov [11]

Answer:

Check Explanation.

Explanation:

Task: (1). Apply Underline to cell B5 and Double Underline to cell B6.

(2). Ungroup the worksheets.

(3).use the Format Cells dialog box to ensure that the Underline styles Single and Double are applied, rather than Single Accounting or Double Accounting.

Steps to follow;

Step one: On the Excel document that you are working on, make sure you highlight from B6 cell to F6 cell.

Step two: Then, press CTRL+SHIFT+F.

Step three: from action in step two above, the "format cells dailogue box" will come up, click underline > (underline type) dropdown list > ok.

Step four: next, highlight from B7 to F7.

Step five: press CTRL+SHIFT+F. As in step two above.

Step Six: do the same thing as in Step three above.

Please note that to apply the SINGLE UNDERLINE, you need to type the data in the cell for cells of B6 to F6 ONLY.

Also, for DOUBLE UNDERLINE for B7 to F7; just type the data in the cell and it will apply.

4 0
3 years ago
You want to use a terminal emulation program to terminal into a series of Cisco routers. You will be managing these devices remo
vampirchik [111]
If a terminal emulation program is used and the devices should be reotely managed, then you should use the Telnet protocol. <span>Telnet is a simple, text-based network protocol that is used for accessing remote computers over TCP/IP networks like the Internet. </span>It allows the user access<span> to a text terminal and all its </span>applications<span> such as command-line for example. </span>

7 0
2 years ago
Before renting or buying a multifamily dwelling you should know the __ of the building
mel-nik [20]
You should know the units :))))))))))))
8 0
3 years ago
Read 2 more answers
It is best to say that electric motors require _______ to work.
Mila [183]
Electricity (energy, current, power, voltage ... depending on the context)
4 0
3 years ago
Why did utf 8 replace the sac character encoding standard
Sedaia [141]
UTF-8- is a variable width character encoding capable of encoding all 1,112,064 valid code points in Unicode using one to four 8-bit bytes. The encoding is defined by the Unicode standard. The sac character encoding method was addressed to simplify the symbolism of letter and symbols.As the computers grew in capacity UTF-8 method was implemented to optimize such protocol allowing more characters to be included with an expanded string of possibilities
7 0
3 years ago
Other questions:
  • Signe wants to improve the security of the small business where she serves as a security manager. She determines that the busine
    6·1 answer
  • Different between ocular and compound miscroscope
    13·1 answer
  • When a packet with the code is transmitted, it is received and processed by every machine on the network. this mode of operation
    12·1 answer
  • Working with text in presentation programs is similar to using text in other applications. True False
    11·1 answer
  • What is a specific naming convention important in regards to your file management system<br> ?
    7·1 answer
  • Around what time did the Internet come around and how did it all start? Would like to know more of the history of how the intern
    12·1 answer
  • Giving 5 stars, a Thanks, 80 points, and Branliest to whoever answers them correctly.
    9·1 answer
  • ________ was one of the first uses of the Internet
    15·2 answers
  • Hãy mô tả mô hình xử lý của hệ thống thông <br> tin kế toán tài chính trong một doanh nghiệp
    15·1 answer
  • Question # 2
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!