1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler [38]
2 years ago
7

What is computer/why it is called data processor

Computers and Technology
1 answer:
USPshnik [31]2 years ago
3 0

Answer:

<em> Computer is known as data processor because it processes the data. First the data is inserted in the computer through input devices. After that, computer translate the data in its own language and then the computer takes action according to the instructions given to the computer</em>

You might be interested in
In the range C15:G15, insert a function to calculate the total daily revenue. In the range H11:H15, insert a function to calcula
lina2011 [118]

Answer:

1. =SUM(C15: G15) 2. The first part of second part is =SUM(C11:G11), =SUM(C12:G12), =SUM(C13:G13), =SUM(C14:G14), =SUM(C15:G15).  Last is total revenue and the first four are seating for various classes and the second part of the second question is =SUM(H11: H14)  which is the grand total of seats.

Explanation:

Suppose from C15 to G15, we have five columns and hence five days. So we can have one column for one day, and add there, number of seats. C15: G15 is daily revenue, and C11: G11 ...... C14: G14 is the number of seats each day, and in each class, and thus the above answer. We can have different assumptions, and formula will change according to assumptions. You can use HLOOKUP as well if you want.

3 0
3 years ago
______ is a disadvantage of EDI.
Artist 52 [7]

Answer:The number of standards

Explanation:Electronic data interchange (EDI)  is the mechanism through which data is interchanged in the system electronically.It is mostly found in the business field for exchanging of data.

As EDI helps in making message accurate by decreasing the length and also has beneficial features of maintaining the security and increasing productivity ,hence these factor are not considered as the disadvantage .

Too many standard present in the EDI make the working complex by limiting the processing in the small business as compared with large organization.

 

6 0
3 years ago
Which feature of spreadsheet software will make it easier for you to find the average number of calls made per hour for each emp
max2010maxim [7]

Answer:

It's formula and functions

Explanation:

6 0
3 years ago
__________ are very simple devices that connect network components, sending a packet of data to all other connected devices.
taurus [48]

Hubs are very simple devices that connect network components, sending a packet of data to all other connected devices.

Hubs are relatively basic network connectors that send a packet of data to every other connected device. Compared to a hub, a switch is more intelligent and has the ability to filter and forward data to a specific location. Within various networks, switches are utilized. Nodes of the network are any computers or printers connected to it. A network workstation is a personal computer that is linked to a network (note that this is different form the usage of the term workstation as a high-end microcomputer). Nodes of the network are any computers or printers connected to it. A network workstation is a personal computer that is linked to a network.

Learn more about network here-

brainly.com/question/24279473

#SPJ4

8 0
1 year ago
Can i get some help please .
Alex787 [66]

Answer:

Interest

So, lets say that you took a loan from the bank of 20,000. But, when you are supposed to pay it back, you need to pay 25,000. This is because of interest. When the bank gives you the money, they cannot give it to you just like that. There is no profit coming from it. So, there is the thing called interest which basically says that since you took money from the bank, you need to pay a little more because you borrowed money from them.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Select three examples of cryptographs. Security tokens Shared-key Malware Firewalls Message authentication code Public-key
    7·2 answers
  • Given the integer variables x and y, write a fragment of code that assigns the larger of x and y to another integer variable max
    5·1 answer
  • Explain how to identify a starting position on a line.
    15·2 answers
  • A model release can be either oral or written down. true or false
    13·2 answers
  • Lucy wants to develop a web page to display her profile. She wants to just start with a basic page that lists her accomplishment
    13·1 answer
  • Which of the following is NOT a benefit of safety and health programs?
    11·1 answer
  • SUMMING THE TRIPLES OF THE EVEN INTEGERS FROM 2 THROUGH 10) Starting with a list containing 1 through 10, use filter, map and su
    7·1 answer
  • QUESTION 10
    10·2 answers
  • Fun with Characters
    7·1 answer
  • If you added the formula =SUM(B1:B5) to a spreadsheet, what would it do?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!