1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
3 years ago
12

15. It is the process of capturing data or translating information to recording format

Computers and Technology
1 answer:
Helen [10]3 years ago
5 0

Answer:

A Documentation, hope this helps.

You might be interested in
What is an example of constructive criticism for an employee who is shy during meetings?
rewona [7]
<span>Speak up more so people don't think you're rude</span>
8 0
4 years ago
Read 2 more answers
Please help will mark brainiest
frozen [14]
Answer community shares a cloud among organizations with similar computing needs
8 0
4 years ago
In computer science, what does the word security mean?
zepelin [54]

Answer:

B

Explanation:

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.[1]

4 0
3 years ago
When forced distribution is used to reduce leniency bias, this can cause __________ if a pfp system is in place?
ziro4ka [17]
When forced distribution is used to reduce leniency bias, this can cause <decreased trust> between employees if a pfp system is in place.
3 0
4 years ago
A computer uses a memory unit with 256k words of 32 bits each. A bina.ry
iogann1982 [59]

Answer:

Touch and hold a clip to pin it. Unpinned clips will be deleted after 1 hour.

4 0
3 years ago
Other questions:
  • PLEASSEE HELP ILL GIVE U A BRAINLIEST IF UR RIGHT!!
    13·2 answers
  • What is the advantage of using standards to develop and implement protocols?
    10·1 answer
  • Inherent flaws in system software code are called:
    7·1 answer
  • Hey so if an instagram account has an email attached to it but a person no longer has access to that email, how do they get back
    10·1 answer
  • 1. Write a query to list the names all products (by product code and name) and the average ordered quantity for each product wit
    9·1 answer
  • Addition and subtraction are considered to be ____ operations performed by a computer.
    7·1 answer
  • Gabe Kelp is a fourteen-year-old goalie for the Soaring Eagles soccer team. He and his teammates are each creating a screen name
    11·1 answer
  • You are planning to implement dual stack of IPv4 and IPv6 in your network. Currently, your network consists of servers, routers,
    6·1 answer
  • Create a Person Class that:
    14·1 answer
  • Select the correct answer..
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!