1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lukranit [14]
2 years ago
10

Difference between Data and information​

Computers and Technology
1 answer:
IgorLugansk [536]2 years ago
3 0

Answer:

Data describes figures and facts. It may consist of one entry or a collection of different values. Information describes values and context together, resulting in something meaningful.

Explanation:

You might be interested in
Given that the variables x and y have already been declared and assigned values, write an expression that evaluates to true if x
Eduardwww [97]

Answer:

The expression to this question can be defined as follows:

Expression:

(x >= 0 && y<0) //check condition using AND operator

Explanation:

In the given question it is defined that x and y are an integer variable that holds some value, in which it defines a condition that checks the value of variable x is positive, and the value of y is negative.

  • To check positive value a condition is used, that checks x greater than equal to 0, and to check negative value, it uses condition, that is y is less than 0.
  • In the above condition, the AND operator is used, which executes when both conditions are true.
3 0
4 years ago
Hanging out with friends, watching your favorite TV show, and buying a pair of new shoes are all examples of _____ for doing wel
SpyIntel [72]
<span>Hanging out with friends, watching your favorite TV show, and buying a pair of new shoes are all examples of rewards for doing well in school. As the result of doing well in studies, a person can hang out with friends, watch their own favorite TV show and can buy a new pair of shoes. Hence all these things are the rewards that are being generated for a good performance in school.</span>
8 0
3 years ago
Read 2 more answers
Why should characters be avoided in file names
LiRa [457]
To ensure they're translated properly on other operating systems.
7 0
3 years ago
What property of semi-metals is useful in the computer industry?
artcher [175]
The answer is (a. Semi-conducting)
In the computer industry, semi-metals with a semiconducting property are useful in making of semiconductors. These metals have high resistance but lower than compare to insulators. This conductor could be crystalline or amorphous solids.
4 0
3 years ago
What will happen when a user attempts to login to salesforce from an ip address that is outside the login ip range on the user's
podryga [215]

Answer:

The answer to this question is option "d".

Explanation:

The answer is user will not be able to login at all. The user wants to log in to the salesforce by its IP address. But in the server, all the IP addresses will be registered for their special work. When the user inserting their IP address to log in to the salesforce. The first server will be checking into there database. If IP address doesn't match it will not permit to access salesforce because in their server it is not a valid IP address. It is registered in sever but not for this user.

So the answer to this question is option "d".

7 0
3 years ago
Other questions:
  • Linguist study
    9·1 answer
  • what is it called when you are biying and selling products via electronic channels such as the internet​
    13·2 answers
  • When you use a script to create all of the tables for a database, you must start with the tables that don't have _______________
    15·1 answer
  • Excel supports all of the following types of sparklines except ____.
    13·1 answer
  • In what year was the 1st zelda game released
    5·2 answers
  • Ten members of a wedding party are lining up in a row for a photograph.
    8·1 answer
  • What do you think is the most fascinating aspect of the internet?
    7·2 answers
  • If a function doesn’t return a value, the word _________ will appear as its return type.
    6·1 answer
  • What are the defenses to protect against these attacks?
    13·1 answer
  • How many pieces can be connected on to a to an SPS​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!