1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
3 years ago
9

Which of these can be considered data? A:facts B:information C:belief D:all of these

Computers and Technology
1 answer:
IceJOKER [234]3 years ago
6 0

A) facts.

Facts is the only thing that can be considered REAL data.

You might be interested in
Dustin is editing a SmartArt graphic. He wants all three shapes to be different colors.
lilavasa [31]

Answer:

click on Design tab → select associated shape → adjust color

Explanation:

I think it is that but i'm not positive. I will know in a little bit since I am taking the test right now.

6 0
3 years ago
Name at least three real-life objects that are instances of each of the following classes:
DENIUS [597]

The three real-life objects that are instances of each of the following classes are given below:

a.<u> Song:</u>

The song Believe in yourself is an instance of song class

The song Where do broken hearts go is an instance of song class.

The song Ambition is an instance of song class

b. <u>CollegeCourse</u>

The College course Engineering is an instance of College course class

The College course Accounting is an instance of College course class

The College course Medicine is an instance of College course class

c. <u>Musician:</u>

The musician Rihanna is an instance of musician class.

The musician Sean Paul is an instance of musician class.

The musician Wyclef is an instance of musician class.

Real-life objects refer to the things that are characterized together as they share common qualities. The assignment simply wants you to name examples under the categories given.

Read related link on:

brainly.com/question/16699733

7 0
2 years ago
Are Microsoft an Apple more secure from malicious action because of their closed-source approach?
omeli [17]

Yes Microsoft and Apple used the closed-source approach to better secure from malware and make to make their operating systems more user friendly.

7 0
3 years ago
Which of the following BEST represent the Scrum approach to planning?
evablogger [386]

Answer:

this is the answer I think

7 0
3 years ago
int foo(int A[], int left, int right){ int i, x, q, N; if(right &lt;= left) return 1; x = 0; for(i=left; i &lt;= right; i++) x +
sineoko [7]

Answer:

quicksort.cpp

void quickSort(int arr[], int left, int right) {

     int i = left, j = right;

     int tmp;

     int pivot = arr[(left + right) / 2];

 

     /* partition */

     while (i <= j) {

           while (arr[i] < pivot)

                 i++;

           while (arr[j] > pivot)

                 j--;

           if (i <= j) {

                 tmp = arr[i];

                 arr[i] = arr[j];

                 arr[j] = tmp;

                 i++;

                 j--;

           }

     };

 

     /* recursion */

     if (left < j)

           quickSort(arr, left, j);

     if (i < right)

           quickSort(arr, i, right);

}

3 0
3 years ago
Other questions:
  • How to you put a color into a cell? <br> a.Shading<br><br> b.Fill<br><br> c.Color<br><br> d.Insert
    8·1 answer
  • Python
    14·1 answer
  • Complete the paragraph to explain how Angelina can notify readers that her report is just a draft.
    6·1 answer
  • are designed to locate information based on the nature and meaning of Web content, not simple keyword matches Select one: a. Cra
    14·1 answer
  • Which is not an example of a mobile operating system?
    9·1 answer
  • What's the name of this apex legend hero​
    13·2 answers
  • Create a file named homework_instructions.txt using VI editor and type in it all the submission instructions from page1 of this
    7·1 answer
  • What reforms were made by the British government in India after the war of independence? write any three
    5·1 answer
  • A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre
    6·1 answer
  • When methods have ____, other programs and methods may use the methods to get access to the private data.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!