1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlekseyPX
3 years ago
10

The result of processing data ​

Computers and Technology
1 answer:
Alla [95]3 years ago
4 0

Answer:

Processing and analysis of data inevitably result in a number of edits in the data file. However, it is necessary to preserve the authenticity of the original research information contained in the data throughout the whole data lifecycle. There are many possible types of changes in the data: Data cleaning procedures may be implemented.

Explanation:

You might be interested in
At the Data Link Layer of the OSI Model, what type of address is used to identify the receiving host?
Natalka [10]

Answer:

Mac Address

Explanation:

The MAC address or Media Access Control  is a unique identifier that each manufacturer assigns to their devices that can connect to the network.  They consist of 48 bits in hexadecimal form, grouped into 12 pairs of characters and each character is formed by four binary numbers, generally separated by a colon. MAC addresses are used in the data link layer of the OSI model, specifically in the lower Medium Access Control layer. An example of a MAC address could be:

10: 68: c5: 5e: 27: 3f.

6 0
3 years ago
Explain the quality-improvement process.
Tasya [4]

Answer:

 The quality improvement is the process that involve the complete organization in pursuit of the quality. It basically helps to improve the team knowledge and in decision making by using the validate data.  

The quality improvement is the proactive undertaking of recognizing, breaking down and enhancing existing business forms inside an association for enhancement and to satisfy new portions or guidelines of value.

 The main factors of the quality improvement are:

  • Leadership quality
  • Monitoring various types of systems
  • High availability of resources
  • Adequate infrastructure

3 0
3 years ago
Read 2 more answers
What is a frame injection attack in a wireless network?
Romashka-Z-Leto [24]

Answer:

A.Un hacker introduce un cadru fals în timpul transmiterii datelor.

Explanation:

3 0
3 years ago
Read 2 more answers
Write a program that simulates a fishing game. In this game, a six-sided die is rolled to determine what the user has caught. Ea
m_a_m_a [10]

Answer:

Answered below

Explanation:

//Python code

numberOfCasts = 3

j = 0

fishingPoints = 0

sum = 0

while j < numberOfCasts:

dieNum = randint(1 , 6)

if dieNum ==1:

fishingPoints = 2

elif dieNum == 2:

fishingPoints = 4

elif dieNum == 3:

fishingPoints = 6

elif dieNum == 4:

fishingPoints = 8

elif dieNum == 5:

fishingPoints = 10

elif dieNum ==6:

fishingPoints = 12

sum += fishingPoints

j++

if sum > 30:

print ("Great catch")

elif sum > 10 and sum <= 30:

print("Good catch")

else:

print ("Bad day")

3 0
3 years ago
Please help me with this question<br>it on the picture​
erik [133]

Explanation:

2)computer is a general process machine ,commonly constitution for Digital circuits that accept input stores manipulated and generates output.

example of input:

monitor ,speaker,printer etc.

example of output:

keyboard,cpu,mouse etc.

3 0
2 years ago
Other questions:
  • Which of the following information sources was not directly affected by the Telecommunications Act of 1996?
    12·1 answer
  • I want to work on cloud computing and i need some help on how to start ?
    6·1 answer
  • What is an activity that can help you enhance the appearance of your computer’s desktop?
    12·2 answers
  • The commands available here change depending on the activity taking place in the presentation window's main work area.
    15·2 answers
  • The method main of a class is called when you instantiate an object of that class like this: Box myBox = new Box();
    9·1 answer
  • Francis has applied for admission to a computer science program, and one of the requirements for admission is the completion of
    8·2 answers
  • Is there a way of how to delete this if so pleas tell me
    11·1 answer
  • Discussion Topic:
    9·1 answer
  • What is a circular network.​
    6·2 answers
  • If you want to stop a loop before it goes through all of its iterations, the break statement may be used. Group of answer choice
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!