1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lorico [155]
3 years ago
8

How the data is converted into the information?​

Computers and Technology
2 answers:
leonid [27]3 years ago
7 0

Answer:

the data is converted into information by data processing

Lady bird [3.3K]3 years ago
6 0

Answer:

by data processing

Explanation:

data is converted to information by analyze or manipulate data by combining with other data and using experience

You might be interested in
How do IT security workers help business
Elodia [21]
They code and learn how to go in the inner and deeper parts of the computer
6 0
3 years ago
Which rotation speed is not a typical spindle rotation speed for magnetic hard drives?3100; 5400; 7200; 10000
Hitman42 [59]

Answer:

5,400 because it turns at the right speed, but if it is too fast or too slow, it will not perform at it's fullest potential. Such as speed and storage.

3 0
3 years ago
Why is network security important? Check all of the boxes that apply. A. Network security allows organizations to continue to fu
serious [3.7K]

Answer:

A. Network security allows organizations to continue to function.

C. Network security keeps intruders out of the network.

D. Network security prevents personal information from getting into the wrong hands.

Explanation:

Network security is a very important concept in networking. Mitigating cyber attacks like key logging, malicious software attacks, reconnaissance attacks, DOS attacks etc, have saved so many companies from bankruptcy and death.

Security in networks helps to prevent attackers from obtaining user personal information like Bank detail, health history etc.

5 0
3 years ago
When a computer or digital device is used as a storage device or in the facilitation of an offense, it is argued to be ____ to t
Katen [24]

Answer:

Incidental.

Explanation:

When a computer or digital device is used as a storage device or in the facilitation of an offense, it is argued to be incidental to the offense.

For instance, the list of customers used by human traffickers is considered to be generated through an incidental system.

8 0
2 years ago
The network of satellites monitoring continental movement is referred to as
Nostrana [21]

The network of satellites monitoring continental movement is referred to as GPS. The answer is letter A. GPS or Global Positioning System revolves the earth twice a day in a precise orbit and transmit information signal back to earth. It uses trilateration to calculate the user’s location.

6 0
3 years ago
Other questions:
  • A Web ____ is a software program that retrieves the page and displays it. Select one:
    5·1 answer
  • You can install several printers on your machine, but at least one must be the _______ printer.
    6·1 answer
  • Which technique helps you look confident as a speaker?
    15·1 answer
  • . If you have written the following source code:
    9·1 answer
  • What is GND and what color wire do we connect to GND? (this is like for circuits and stuff btw)
    7·1 answer
  • Modify the NumberedList class we implementd during the lecture by adding a member function: void NumberedList::insertPosition(in
    13·1 answer
  • What is the component on the motherboard that confirms all devices are in working order once the computer is turned on?
    13·1 answer
  • Which format of image files can be inserted in html?​
    8·2 answers
  • _____ is rampant with bugs and shortcomings because most programmers do not know how or do not take the time to incorporate secu
    14·1 answer
  • Would you consider upgrading Maxine’s wardrobe a need or a want?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!