1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bazaltina [42]
4 years ago
8

The equipment that processes data in order to create information is called the _______.

Computers and Technology
2 answers:
Naily [24]4 years ago
6 0
The equipment that processes data in order to create information is called the hardware.
Svet_ta [14]4 years ago
6 0

Answer:

hardware

Explanation:

Hardware is the physical part of a computer, that is, everything that can be touched. This includes the keyboard, network cards, mouse or mouse, DVD disc, hard disk, printers.

A computer is an electronic device that processes a large amount of information in a very short time. For this it requires some instructions (the software) that are performed by some devices or equipment (the hardware).

We have then that the hardware of a computer fulfills the following functions: input, processing, storage and data output.

You might be interested in
A blue compressor clutch indicates that it's been slipping due to too
SVETLANKA909090 [29]

Answer:

Hi,

This effect can be due to <u>dull/ unpolished clutch c</u>aused by incorrect amount of oil in the system

Explanation:

Clutch is the third highest failures observed in AC after hose leaks and compressors.Some of the clutch related failures are bearing failure, burnt coil, unbalanced motor to air hub gap, noisy bearing ,and unpolished clutch.Burnishing of a clutch is when the wearing  of the engagement surface if the clutch is allowed to increase the starting torque.The effect of dull clutch is that it produces low staring torque making it to slip and fail.When too much oil is applied, it will cause the compressor to slug and the clutch to slip.Low amounts of oil will cause the compressor to bind and the clutch to slip because of increased discharge pressures in the system.

Best of Luck!

6 0
4 years ago
Web servers store web pages and files that can be accessed over the ______ .
uranmaximum [27]

the answer is

internet

6 0
3 years ago
Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
dalvyx [7]

Answer:

The program is as follows:

def output_ints_less_than_or_equal_to_threshold(user_values, upper_threshold):

   for i in user_values:

       if i <= upper_threshold:

           print(i,end=" ")

           

def get_user_values():

   user_values = []

   n = int(input())

   for i in range(n):

       num = int(input())

       user_values.append(num)

   

   upper_threshold = int(input())

   output_ints_less_than_or_equal_to_threshold(user_values, upper_threshold)

get_user_values()

Explanation:

This defines the output_ints_less_than_or_equal_to_threshold method

def output_ints_less_than_or_equal_to_threshold(user_values, upper_threshold):

This iterates through user_values

   for i in user_values:

For every item in user_values

       if i <= upper_threshold:

This prints all items less than or equal to the upper threshold

           print(i,end=" ")

           

This defines get_user_values method

def get_user_values():

This creates an empty list

   user_values = []

This gets the number of inputs

   n = int(input())

This iterates through n

   for i in range(n):

This gets input for every item of the list

       num = int(input())

This appends the input to the list

       user_values.append(num)

This gets input for upper threshold    

   upper_threshold = int(input())

This calls output_ints_less_than_or_equal_to_threshold method

   output_ints_less_than_or_equal_to_threshold(user_values, upper_threshold)

The main begins here; This calls get_user_values method

get_user_values()

4 0
3 years ago
What is a network externality? Select one: a. It refers to having a network of suppliers and buyers for a good or service. b. It
gregori [183]

Answer:

c. It refers to a situation in which a product's usefulness increases with the number of people using it.

Explanation:

Network externalities also called demand-side economies of scale refers to the increasing utility that a user derives from the consumption of a product such that as the number of people who consume the product increases.

This phenomenon can also lead to a situation known as natural monopoly.

7 0
4 years ago
In the software development process, when should a design review be conducted?
svlad2 [7]

Answer:

C. as the functional and design specifications are being developed based on the requirements

Explanation:

SDLC (software development life cycle) is the process from abstract design of an application to deployment of the functional application. There are six stages in the development life cycle of an application, They are;

  1. Planning : this is the feasibility study of the needs the application is meant to solve.
  2. Analysis: in this stage, the client prior problems and best solution are written down.
  3. Design: this stage gives  a graphical design of the application with focus on the problems it is meant to solve. Prototyping and wireframing technologies are used.
  4. Development: In this stage, lines of code are written, debugged, tested and continually reviewed.

The other stages are deployment and maintenance.

8 0
3 years ago
Other questions:
  • Jason, Samantha, Ravi, Sheila, and Ankit are preparing for an upcoming marathon. Each day of the week, they run a certain number
    7·1 answer
  • HELP!!!! I need this ASAP
    9·1 answer
  • Which of the following is not a feature of Hootsuite?
    14·1 answer
  • What would you have to know about the pivot columns in an augmented matrix in order to know that the linear system is consistent
    13·1 answer
  • Carlos is using the software development life cycle to create a new app. He has finished coding and is ready to see the output i
    12·2 answers
  • How do network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS) differ?an NIDS focuses more
    10·1 answer
  • How did the use of ARPANET change computing?
    14·1 answer
  • The price of an item you want to buy is given in dollars and cents. You pay for it in cash by giving the clerk d dollars and c c
    6·1 answer
  • (please help) What do you do if Brainly keeps saying your blocked?
    10·1 answer
  • Which tool can you use to display hardware utilization statistics that tell you about the operation of your computer?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!