1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Finger [1]
3 years ago
9

Whay is processing?Explain with an example.​

Computers and Technology
2 answers:
Elena-2011 [213]3 years ago
5 0

The treatment on data as per given instructions to convert them into meaningful information is called processing.

For example putting an apple in a juicer to get apple juice.Here, a juicer is a processing device where actual processing takes place.

Diano4ka-milaya [45]3 years ago
4 0

Answer:

processing is an action or series of actions that a microprocessor, also known as a central processing unit (CPU), in a computer performs when it receives information.

Explanation:

For example, Windows you can see each of the processes running by opening the Processes tab in Task Manage

Hope it help

Good day✌️

You might be interested in
Mrs. Dunn shows her students a data range, which has been named "Goals," covering cells A14 to A25. She tells her students that
Butoxors [25]

Answer:

Hina and Riko; the dialog box is inside the Name Manager group, and it allows the user to manually type in the additional cells or select the cells after clicking the collapse button.

3 0
3 years ago
In the Microsoft publisher application, words underlined in red are ____.
nydimaria [60]

In the Microsoft publisher application (as well as many other websites such as Brainly, Google docs, etc), words underlined in red are spelled incorrectly.

Whether you spelled it incorrectly or did not complete the words, as long as the word is not found in the dictionary, the word would be underlined with a red squiggly line.

~

4 0
3 years ago
What is Server Message Block (SMB) used for in Windows and can a hacker still damage a network using SMB?
Aleksandr [31]

Answer:

The absolute most decimating ransomware and Trojan malware variations rely upon vulnerabilities in the Windows Server Message Block (SMB) to proliferate through an association's system. Windows SMB is a convention utilized by PCs for record and printer sharing, just as for access to remote administrations.  

A fix was discharged by Microsoft for SMB vulnerabilities in March 2017, yet numerous associations and home clients have still not applied it. So now, the unpatched frameworks permit dangers that exploit these vulnerabilities inside, helping dynamic malware crusades spread like Californian rapidly spreading fire.  

SMB vulnerabilities have been so effective for danger entertainers that they've been utilized in the absolute most unmistakable ransomware episodes and refined Trojan assaults of the most recent two years. Truth be told, our item telemetry has recorded 5,315 discoveries of Emotet and 6,222 of TrickBot in business systems—two Trojan variations that are utilizing the SMB vulnerabilities—over the most recent 30 days alone.

7 0
3 years ago
Read 2 more answers
Which of the following tags contains metadata about the webpage?
Andre45 [30]
I cannot see the options but I am guessing that it is just regular HTML

If that is the case the <meta></meta> tag can be used and should be placed within the <head></head> tag
8 0
4 years ago
Read 2 more answers
List three ways you can help somone who is being cyber bullied instead of just being a bustander​
JulsSmile [24]
Tell an adult
give them moral support
help them stand up for themselves
4 0
3 years ago
Read 2 more answers
Other questions:
  • Instructions:Select the correct answer.
    13·1 answer
  • The equipment that processes data in order to create information is called the _______.
    8·2 answers
  • Write code that prints: usernum ... 2 1 blastoff! your code should contain a for loop. print a newline after each number and aft
    12·1 answer
  • When cleaning a firearm, what end of the firearm should you generally clean from?
    11·2 answers
  • Which port-authentication network access control standard forces devices to go through a full authentication, authorization, and
    13·1 answer
  • What are some good websites i can use to test my knowledge?
    11·2 answers
  • Help!!!!!!!!!!!!!!!!!
    11·1 answer
  • How can you represent a graphic element in a wireframe?
    5·1 answer
  • Information about hardware engineers?
    9·1 answer
  • Match the hardware device with the "category" into which it falls. Remember to choose
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!