1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olasank [31]
3 years ago
13

1. What does the word “processing” in data pro- cessing mean?

Computers and Technology
2 answers:
blsea [12.9K]3 years ago
6 0

Answer:

Word processing is the process of creating and editing documents on a computer. It allows a user to create documents that mimic the format and style of a typical typewriter. It requires a computer and word processing software. A printer may also be used to create a physical copy of the document.

Explanation:

zlopas [31]3 years ago
3 0
1. Processing means any action that produces information from data, such as finding totals, averages, ratios, and. trends.
2. Names, addresses, and educational experience of employment candidates, consumers, and members of
professional organizations are some examples. They are data, but are also used as information, because they are
often needed as is, without processing.
5. A TPS merely records transactions and channels them into files and databases. It does not analyze the data nor
create any information. A DSS contains software that help make decisions. It provides useful information gleaned and manipulated from raw data.
You might be interested in
La computadora es un medio de comunicacion moderno?
kolbaska11 [484]
Moderno = mordern, if It does than yes!
3 0
3 years ago
An option button is<br>​
ad-work [718]
A designated graphical control that acts on command to trigger an event or action.
7 0
3 years ago
Read 2 more answers
In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
Neporo4naja [7]

Script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

<h3>The types of threat actors.</h3>

In cybersecurity, there are different types of threat actors and these include the following:

  • Script kiddie
  • Gray hat hacker
  • Hacktivists

One of the ways to differentiate an attack orchestrated by a script kiddie from that of a gray hat hacker is that script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

4 0
2 years ago
Declare a char array named line suitable for storing C-strings as large as 50 characters, and write a statement that reads in th
zlopas [31]

Answer:

char line[50];

cin.get(line,50);

Explanation:

The "char" data type stores character data in a fixed-length field.

3 0
3 years ago
You're researching information about titanium bike frames. Which Web site is probably the least biased? The web site of a nation
Alexxx [7]
The website of a National Bike Museum would give you information about all different kinds of bikes. 

A local Bike shop would likely be biased to try to get you to buy from them. 

Answer) The website of a National Bike Museum 
5 0
3 years ago
Other questions:
  • Compare and contrast fair use to copyright.
    5·1 answer
  • Write a program with a loop that lets the user enter a series of positive integers. The user should enter −1 to signal the end o
    7·1 answer
  • Once a graph has been created, you would need to start over to make any changes to it. true false
    15·1 answer
  • Click this link to view O NET'S Wages and Employment section for Film and Video Editors.
    11·2 answers
  • A(n) _____ describes your core values and highest career goals. A. résumé B. objective statement C. qualifications profile D. pe
    7·2 answers
  • Why is cyberbullying so devastating to many people beyond just the victim?
    8·1 answer
  • What is the name of tool in number 9 picture? CAPITAL LETTER ONLY
    5·1 answer
  • Select the correct answer.
    5·2 answers
  • ASAP PLEASE the online research you did to describe how Senet is related to the culture and historical period when it was create
    9·1 answer
  • Convert 105 decimal to 128 binary form
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!