1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex787 [66]
3 years ago
12

From where do we get information or knowledge? Explain.

Computers and Technology
2 answers:
Tems11 [23]3 years ago
7 0

Answer:

the explanations is down here,

Explanation:

Information

Data reaches a more complex level and becomes information by integrating them to a context. Information provides expertise about facts or persons. Example of information: The information about a date of birth still has very little value when it is unknown to which person it belongs. By adding more information like the name, the linked information creates knowledge about a person.

Knowledge

Knowledge thus describes the collected information that is available about a particular fact or a person. The knowledge of this situation makes it possible to make informed decisions and solve problems. Thus, knowledge influences the thinking and actions of people. Machines can also make decisions based on new knowledge generated by information. In order to gain knowledge, it is necessary to process information.

loris [4]3 years ago
7 0

.Answer: Information : is a set of data that is processed in a meaningful way according to the given requirement. It is processed, structured, or presented in a given context to make it meaningful and useful.

Information assigns meaning and improves the reliability of the data. It helps to ensure undesirability and reduces uncertainty. Therefore, when the data is transformed into information, it never has any useless details. It includes data that possess context, relevance, and purpose. It also involves the manipulation of raw data which eventually becomes knowledge.

Knowledge: is a combination of information, experience, and insight that helps the individual or the organization. It is linked to doing and implies know-how and understanding. Knowledge is possessed by each individual and is an outcome of his or her experience. It also covers the norms to evaluates new inputs from his surroundings.

Characteristics of Information

Here, are important characteristics of the Information:  

The main characteristics of information are accuracy, completeness, relevance, and availability

Information is said to be facts provided or learned about someone or something

No defined connection between ideas

Its availability to the right person at the right time

Enhance learning

Characteristics of Knowledge

Here are an important characteristic of knowledge:

Knowledge is accurate as it conveys the true situation.

It is available in time to make the most appropriate and correct decisions.

It is portrayed in common, easy to understood formats.

It provides all the necessary data.

Meaningful and useful for the decision-making process.

Involves communication and reception Information

It reduces uncertainties and estimates to take action.

Example of information:

Look at the examples given for data:

4,8,12,16

Dog, cat, cow, cockatoo

161.2, 175.3, 166.4, 164.7, 169.3

Only when we assign a context or meaning that’s when the data become inform.

Example of Knowledge

If you apply this information to gain further knowledge, we could say that:

4, 8, 16 and 24 are the first four answers in the 4 x table (because the 4 x table starts at three and goes up in threes the 5 x table must start at five and go up in fives)

A tiger is not a household pet as it is not on the list, and it lives in the wild forest.

The tallest student is 186.3cm.

for more information click here on link below.

You might be interested in
A ____ attack is much more substantial than a DoS attack because of the use of multiple systems to simultaneously attack a singl
victus00 [196]

Answer: (D) Distributed denial- of- service (DDoS)

Explanation:

The distributed denial of service attack is one of the type of attack that occur when the multiple system are basically flooded with the resources and the bandwidth.

  • Botnet is one of the example of DDoS as it caused the DOS (denial of service) for the users.
  • This type of attack is more substantial as compared to the DoS attack as they use the multiple system for attack the single target simultaneously.

Therefore, Option (D) is correct.

8 0
4 years ago
The _______ "represents a set of features that enables the user to inform himself whether a security feature is in operation or
quester [9]

Answer:

Visibility and configuration of security.

Explanation:

The visibility and configuration of security represents a set of features that enables the user to inform himself whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.

4 0
4 years ago
As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them.
Aliun [14]

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

  • This attack is aimed to avoid legal customers of one's website from accessing it.  
  • In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  
  • One other way to successfully attack is to send fake requests from the attacker.
5 0
3 years ago
71 81 77 15 63 96 36 51 77 18 17
sp2606 [1]

Answer:

Following are the solution to this question:

Explanation:

This algorithm uses the divide and rule approach works, which splits the list into two sublists depending on if they are smaller or larger than the pivotal factor. It has O(n*log n) complexity.

It splits down the list in more than one version frequently till every sublist becomes based on a single element and fuses it to offer an ordered array. The merge type works according. It has O(n*log n) complexity.

Please find the attachment file of the sorting.

4 0
3 years ago
Design a generic post-implementation evaluation form. The form should consist of questions that you could use to evaluate any in
irina1246 [14]

Answer:

Project Identification

Provide the identifying information associated with the project, including the applicable project control code, system acronym, and system title.

System Proponent

Provide the name of the System Proponent.

History of the System

Briefly describe the system’s history and predecessor, if any.  State the mission needs and information requirements, including how the system is expected to help users.

Functional System Description and Data Usage

Briefly describe what the system does functionally and how the data are used by the system.

Explanation:

Overview

The Post-Implementation Review is used to evaluate the effectiveness of the system development after the system has been in production for a period of time (normally 6 months).  The objectives are to determine if the system does what it is designed to do: Does it support the user as required in an effective and efficient manner? The review should assess how successful the system is in terms of functionality, performance, and cost versus benefits, as well as assess the effectiveness of the life-cycle development activities that produced the system.  The review results can be used to strengthen the system as well as system development procedures.

The review is scheduled to follow the release of a system or system revision by an appropriate amount of time to allow determination of the effectiveness of the system.  A representative from the functional development group or other member of the major user organization participates in the review.  The System Proponent ensures that all documentation and all personnel needed to participate in the review are accessible.

The reviewer and an assigned team collect the information needed for the Post-Implementation Review by interviewing end users and their managers, system administrators, and computer operations personnel.  The report is then prepared and provided to the user organization that requested it and the information systems organization, which may jointly use the findings to initiate other actions.

The Post-Implementation Review is a free-form report, and not all sections are relevant or necessary to the final product.  A description of the Post-Implementation Review Report is attached.

3 0
3 years ago
Other questions:
  • What common communication devices are used in homes to connect to the internet and remote networks and what capabilities do thes
    10·1 answer
  • Which of the following information is most important to include in a timeline
    14·2 answers
  • How does the text recommend that a company operate if it wants to be successful in the information age?
    11·1 answer
  • Explain how technology is related to human needs and wants?
    13·1 answer
  • Which of the following is the most abstract?
    13·2 answers
  • I'm having trouble changing my google account password
    12·1 answer
  • PLEASEEEEEE HELP, ILL DO ANYTHING JUST ANSWER THESE CORRECTLY!!!!!TYSM!!!
    15·2 answers
  • 56- What is the term used when you press and hold the left mouse key and more the mouse
    8·1 answer
  • See the file attached!​
    11·1 answer
  • what component of virtualization controls all physical memory, and thus has the ability to make any unused memory pages in each
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!