Answer:
i would say C.output
Explanation:
the program would be the code, the input would be the input, and the memory card would be the memory leaving the output as the only thing forgotten.
Answer:
The data processing is broadly divided into 6 basic steps as Data collection, storage of data, Sorting of data, Processing of data, Data analysis, Data presentation, and conclusions. There are mainly three methods used to process that are Manual, Mechanical, and Electronic.
Answer:
e. Phishing
Explanation:
Phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.
Attackers use it to steal sensitive user data or information.
Answer:
Headed by the OSD Records Administrator, the OSD Records and Information Management (RIM) Program is responsible for oversight, implementation of the Federal Records Act within the Offices of the Secretary of Defense and the WHS supported Defense Agencies and Field Activities.
Explanation: