1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mina [271]
3 years ago
10

What is the second stage of information processing cycle​

Computers and Technology
2 answers:
Ahat [919]3 years ago
6 0

Answer:

the second stage of information processing cycle is processing.

sry but IAM not correctly sure....

Ber [7]3 years ago
4 0

Explanation:

The sequence of events in processing information, which includes (1) input, (2) processing, (3) storage and (4) output. The input stage can be further broken down into acquisition, data entry and validation. The output stage can also be further divided into interactive queries and routine reports.

pls Mark me as brainliest trust me

You might be interested in
Researching the history of computers is a good troubleshooting technique.<br> True or False?
Verdich [7]

Yes very much so! You could learn previous mistakes/bugs/etc and find solutions to fixing them and avoiding getting them. As well as much more. History is always a fun subject for anything, really in my opinion.

4 0
3 years ago
Jason works as a financial investment advisor. He collects financial data from clients, processes the data online to calculate t
Sedbober [7]

I believe the answer is A. because he has to listen to what the people tell him and he information he has to think about and make a choice on what to reply with.

I hope this helps and its correct please let me know if its wrong have a great day//night.

4 0
3 years ago
A technician has been notified of a problem on the network. After investigation, the technician determines that a specific inter
bogdanovich [222]

Answer:

Virus is a type of malware which is used in this case.

Explanation:

7 0
3 years ago
True or false? malware problems and other compromises of your computer information are rare.
Marina86 [1]
I think that is false I am not 100% sure.
3 0
3 years ago
To create a formula, click the cell where you want to add the formula and press the _____ key.
Ipatiy [6.2K]
C........is the answer
4 0
3 years ago
Read 2 more answers
Other questions:
  • Adam would like to reduce the size of an image that he inserted into a document. He selects the image and chooses the Crop optio
    11·2 answers
  • Which social networking function came first?
    9·2 answers
  • Ana works in the medical records department at a large medical office. Her job includes scanning and uploading medical records i
    15·1 answer
  • Search engines enable you to
    14·1 answer
  • For an external usb hard drive attached to a computer, which is more suitable: a writethrough cache or a block cache
    14·2 answers
  • What is the first step to creating a PivotTable?
    11·1 answer
  • When a person bullies someone using technology, it's called:
    9·2 answers
  • When creating a shape in Word, what are some available options? Check all that apply. adding text to the shape changing the size
    6·1 answer
  • Five year ago, Amit was three times as old as Arman. Ten years later Amit would be twice as old as Arman. How old is Arman now? 
    9·2 answers
  • How can IT infrastructure be linked to the business strategy of any organization
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!