1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex787 [66]
3 years ago
12

From where do we get information or knowledge? Explain.

Computers and Technology
2 answers:
Tems11 [23]3 years ago
7 0

Answer:

the explanations is down here,

Explanation:

Information

Data reaches a more complex level and becomes information by integrating them to a context. Information provides expertise about facts or persons. Example of information: The information about a date of birth still has very little value when it is unknown to which person it belongs. By adding more information like the name, the linked information creates knowledge about a person.

Knowledge

Knowledge thus describes the collected information that is available about a particular fact or a person. The knowledge of this situation makes it possible to make informed decisions and solve problems. Thus, knowledge influences the thinking and actions of people. Machines can also make decisions based on new knowledge generated by information. In order to gain knowledge, it is necessary to process information.

loris [4]3 years ago
7 0

.Answer: Information : is a set of data that is processed in a meaningful way according to the given requirement. It is processed, structured, or presented in a given context to make it meaningful and useful.

Information assigns meaning and improves the reliability of the data. It helps to ensure undesirability and reduces uncertainty. Therefore, when the data is transformed into information, it never has any useless details. It includes data that possess context, relevance, and purpose. It also involves the manipulation of raw data which eventually becomes knowledge.

Knowledge: is a combination of information, experience, and insight that helps the individual or the organization. It is linked to doing and implies know-how and understanding. Knowledge is possessed by each individual and is an outcome of his or her experience. It also covers the norms to evaluates new inputs from his surroundings.

Characteristics of Information

Here, are important characteristics of the Information:  

The main characteristics of information are accuracy, completeness, relevance, and availability

Information is said to be facts provided or learned about someone or something

No defined connection between ideas

Its availability to the right person at the right time

Enhance learning

Characteristics of Knowledge

Here are an important characteristic of knowledge:

Knowledge is accurate as it conveys the true situation.

It is available in time to make the most appropriate and correct decisions.

It is portrayed in common, easy to understood formats.

It provides all the necessary data.

Meaningful and useful for the decision-making process.

Involves communication and reception Information

It reduces uncertainties and estimates to take action.

Example of information:

Look at the examples given for data:

4,8,12,16

Dog, cat, cow, cockatoo

161.2, 175.3, 166.4, 164.7, 169.3

Only when we assign a context or meaning that’s when the data become inform.

Example of Knowledge

If you apply this information to gain further knowledge, we could say that:

4, 8, 16 and 24 are the first four answers in the 4 x table (because the 4 x table starts at three and goes up in threes the 5 x table must start at five and go up in fives)

A tiger is not a household pet as it is not on the list, and it lives in the wild forest.

The tallest student is 186.3cm.

for more information click here on link below.

You might be interested in
Show the array that results from the following sequence of key insertions using a hashing system under the given conditions: 5,
sergejj [24]

Answer:

a) Linear probing is one of the hashing technique in which we insert values into the hash table indexes based on hash value.

Hash value of key can be calculated as :

H(key) = key % size ;

Here H(key) is the index where the value of key is stored in hash table.

----------

Given,

Keys to be inserted are : 5 , 205, 406,5205, 8205 ,307

and size of the array : 100.

First key to be inserted is : 5

So, H(5) = 5%100 = 5,

So, key 5 is inserted at 5th index of hash table.

-----

Next key to inserted is : 205

So, H(205) = 205%100 = 5 (here collision happens)

Recompute hash value as follows:

H(key) =(key+i) % size here i= 1,2,3...

So, H(205) =( 205+1)%100 = 206%100 = 6

So, key 205 is inserted in the 6th index of the hash table.

----------

Next Key to be inserted : 406

H(406) = 406%100 = 6(collision occurs)

H(406) =(406+1) %100 = 407%100 = 7

So, the value 406 is inserted in 7the index of the hash table.

-----------------

Next key : 5205

H(5205) = 5205%100 = 5(collision)

So, H(5205) = (5205+1)%100 = 6( again collision)

So, H(5205) = 5205+2)%100 = 7(again collision)

So, H(5205) = (5205+3)%100 = 8 ( no collision)

So, value 5205 is inserted at 8th index of the hash table.

-------------

Similarly 8205 is inserted at 9th index of the hash table because , we have collisions from 5th to 8th indexes.

-------------

Next key value is : 307

H(307) = 307%100 = 7(collision)

So, (307+3)%100 = 310%100 = 10(no collision)  

So, 307 is inserted at 10th index of the hash table.

So, hash table will look like this:

Key       index

5         5

205         6

406         7

5205 8

8205 9

307         10

b) Quadratic probing:

Quadratic probing is also similar to linear probing but the difference is in collision resolution. In linear probing in case of collision we use : H(key) = (key+i)%size but here we use H(key) =( key+i^2)%size.

Applying Quadratic probing on above keys:.

First key to be inserted : 5.

5 will go to index 5 of the hash table.

-------

Next key = 205 .

H(205) = 205%100 = 5(collision)

So. H(key)= (205+1^2)%100 = 6(no collision)

So, 205 is inserted into 6th index of the hash table.

--------

Next key to be inserted 406:

So, 406 %100 = 6 (collision)

(406+1^2)%100 = 7(no collision)

So, 406 is moved to 7th index of the hash table.

----------

Next key is : 5205

So, 5205%100 = 5 (collision)

So, (5205+1^2)%100 = 6 ( again collision)

So, (5205+2^2)%100 = 9 ( no collision)

So, 5205 inserted into 9th index of hash table.

-----------

Next key is 8205:

Here collision happens at 5the , 6the , 9th indexes,

So H(8205) = (8205+4^2)%100 = 8221%100 = 21

So, value 8205 is inserted in 21st index of hash table.

--------

Next value is 307.

Here there is collision at 7the index.

So, H(307) = (307+1^2)%100 = 308%100= 8.

So, 307 is inserted at 8the index of the hash table.

Key           Index

5                  5

205                  6

406                  7

5205                9

8205               21

307                   8

3 0
3 years ago
Alex’s family members live in different parts of the world. They would like to discuss the wedding plans of one of their distant
goldenfox [79]
The answer would be b
8 0
4 years ago
Read 2 more answers
Write an if/else statement that compares the double variable pH with 7.0 and makes the following assignments to the int variable
Brilliant_brown [7]

Answer:

int main()

{

   double pH;

   int neutral;

   int base;

   int acid;

   cout<<"Enter a pH Value";

   cin>> pH;

   if(pH<7.0){

       neutral =0;

       base=0;

       acid= 1;

   }

   else if (pH=7.0){

       neutral =1;

       base=0;

       acid= 0;

   }

   else{

       neutral =0;

       base=1;

       acid= 0;

   }

   cout <<"The neutral, Base and Acid Values are: "<<neutral<<","<<base<<","<<acid<<" Respectively"<<endl;

   return 0;

}

Explanation:

Using multiple if/elseif/else statement the following problem is solved with C++

4 0
3 years ago
Francis has designed a picture book appropriate for third graders. He wants teachers across the world to freely download use, an
mestny [16]

Answer:

The correct answer will be "Project Gutenberg".

Explanation:

  • Project Gutenberg continues to obtain lots of requests for authorization for using printed books, pictures, as well as derivatives from eBooks. Perhaps some applications should not be produced, because authorization would be included in the objects provided (as well as for professional usages).
  • You can copy, hand it over, or m actually-use it underneath the provisions including its license that was included in the ebook.

So that the above is the right answer.

8 0
3 years ago
A user complains that Skype drops her videoconference calls and she must reconnect. At which layer of the OSI model should you b
umka2103 [35]

Answer: Application layer

Explanation:

Application layer of OSI(Open system interconnection) that is responsible for interfacing the communication with the user by displaying information or message. It maintains the transmission of file and assessment, emailing faculty, using network services etc.

  • According to the question,if any Skype user has complain regarding video call drop while conferencing then application is responsible to solve the issue.
  • This layer will be the starting point of troubleshoot by approaching to network resources.As call drop can occur due to network service, congestion or resource issue.
4 0
3 years ago
Other questions:
  • When you use a mouse to select a row or column in a table, word displays a(n) ____?
    5·1 answer
  • A(n) _____ is essentially a flash-based replacement for an internal hard drive.
    13·1 answer
  • Interactive media professionals are unique among other Information Technology professionals because they
    7·1 answer
  • Write code for a function with the following prototype: /* Addition that saturates to TMin or TMax */ int saturating_add(int x,
    12·1 answer
  • Assign courseStudent's name with Smith, age with 20, and ID with 9999. Use the PrintAll member function and a separate cout stat
    14·2 answers
  • Name two different ways you can bring up the my computer folder
    9·2 answers
  • Who gets the reply when you use the reply all feature in a mail program?
    14·1 answer
  • Cryptography has requirements include:
    8·1 answer
  • Problem 4 (25 points)Consider a byte addressing architecture with 64-bit memory addresses.(a)Which bits of the address would be
    5·1 answer
  • In a web application, the client uses a ___________ to interact with a web server.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!