1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
3 years ago
9

Which of these can be considered data? A:facts B:information C:belief D:all of these

Computers and Technology
1 answer:
IceJOKER [234]3 years ago
6 0

A) facts.

Facts is the only thing that can be considered REAL data.

You might be interested in
1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini
lawyer [7]

Any test practices end-user he or she does by step by step process for quality testing. Some end-user will have a checklist to do while testing any software or hardware installing.

A hacking end-user has to do the test process if he or she has to follow some steps during testing.

<u>Explanation:</u>

This process is called penetration testing, in other words, it is called pen-testing.

1. In the digital world, security plays an important role. Before any potential incidents taking place, security threats have to handle properly. Before hacking takes place for pc or workstation or desktop, the end-user has to identify and take proper action.

Mostly all threats happen in c:\users\appdata folder in windows operating system

2. Penetration testing is used to for hacking purpose testing.

a. Step by step method is followed.

b. Best practice testing on network security, computer system, web system and find vulnerability check.

c. The pen test method is involved in legal achievements on network

d. To identify vulnerability assessment inside a network

6 0
3 years ago
What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t
snow_tiger [21]
The recommended secure protocol for voice and video applications is the Secure<span> Real-time Transport </span>Protocol<span> (SRTP) protocol. SRTP is a Real-time Transport </span>Protocol (RTP) profile used to  to provide encryption, message authentication and integrity.
The default cipher of SRTP is the Advanced Encryption Standard<span> (AES) .</span>
8 0
4 years ago
What is another term for technology?
AysviL [449]
telecommunications is just one other term. there's also industrial science or automation
4 0
3 years ago
1.Know the BMI of the user. First, the user will input the height in meters and weight in kilograms. After inputting, the inputt
Verizon [17]

The program that checks the BMI of a patient is given below:

<h3>THE CODE</h3>

#include <iomanip>

#include <iostream>

#include <math.h>

using namespace std;

// C++ program to illustrate

// how to calculate BMI

float BMI(float height, float weight)

{

   float bmi = weight / pow(height, 2);

   return bmi;

}

int main()

{

   float height = 1.79832;

   float weight = 70;

   // Function call

  float bmi = BMI(height, weight);

   cout << "The BMI is " << setprecision(15) << bmi

        << " so ";

   // Conditions to find out BMI category

   if (bmi < 18.5)

       cout << "underweight";

   else if (bmi >= 18.5 && bmi < 24.9)

       cout << "Healthy";

   else if (bmi >= 24.9 && bmi < 30)

       cout << "overweight";

   else if (bmi >= 30)

       cout << "Suffering from Obesity";

   return 0;

}

// This code is contributed by aarohirai2616.

<h3>Output: </h3>

The BMI is 21.64532402096181 so Healthy

Read more about algorithms here:

brainly.com/question/24953880
#SPJ1

3 0
1 year ago
Software obtained illegally is called open-source software. true / false
Oxana [17]
False, software obtained illegally is called Pirated Software.
<span>Open source software is software developed by and for the user community, ie. Linux based software is Open Source.</span>
3 0
3 years ago
Other questions:
  • Please help
    5·1 answer
  • T F The scope of a parameter is limited to the function which uses it.
    12·1 answer
  • What is a 'balanced' dfd?
    5·1 answer
  • which telecommunications service allows internet and telephone service to work over the same phone line
    13·1 answer
  • Plot element is typically the turning point in the most intense moment of a story
    8·1 answer
  • What disese is sue suffering from
    15·2 answers
  • You are a network engineer tasked with performing a site survey for a multiple-channel architecture (MCA) system in a three-stor
    11·1 answer
  • What are 3 important reasons to reconcile bank and credit card accounts at set dates?
    15·1 answer
  • Which of these ia an example of gene flow?
    5·1 answer
  • You wrote a program to allow to guess a number chosen randomly.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!