when data is collected and turned into information, it is called​

Answers

Answer 1

Answer:

its called data processing

Explanation:

...

Answer 2

Explanation:

When data is collected and turned into information, it is called program .


Related Questions

Can i have the answer of that fill in the blanks

Answers

Answer:

c) {n/a}

d)Binary codes

e)NLP

f)Application software

2. Say whether these sentences are True or False. a. Input is the set of instructions given to a computer to change data into information. the form of words numbers, pictures, sounds .it is true or false​

Answers

Answer:

I think it is false bcz the set of instruction given to computer is program.

A web ______ makes a web page available to a browser that requests the page to view.

A. specializer
B. breaker
C. candidate
D. server

Answers

Answer:

D.  server

Explanation:

Match the careers with the career clusters.
curriculum developer
tax auditor
paralegal
attorney
federal aid coordinator
speech-language
pathologist
Education and
Training
Government and Law, Public Safety,
Public Administration Corrections, and
Security

Answers

Answer:

Answer:education and training- speech Language pathologist And curriculum developer

Government and public administration- tax auditor and federal aid coordinator

Law, public safety corrections and security- attorney and paralegal

Explanation:

I'm really weak at computers can someone please help me with these questions ​

Answers

Answer:

DIM count, number, previous, temp AS INTEGER

 count = 0

 number = 1

 previous = 1

again:

 count = count + 1

 temp = number

 number = number + previous

 previous = temp

 PRINT number

 IF count < 10 THEN

    GOTO again

 END IF

Explanation:

Here is the code for the first assignment. Can you think about the rest indicate where you get stuck?

Manufacturing, transportation, communications, advanced very quickly.
Education improved


A. middle age
B. renaissance
C. industrial revolution
D. information

Answers

Answer:

renaissance

Explanation:

What do you mean by gigo?Explain in breif​

Answers

Answer:

garbage in garbage out

Explanation:

it means bad input gives you also a bad output.

could you mark me as brianlist.

Why is it important to use the correct fingers when typing?

Answers

Explanation:

Typing quickly and accurately with correct finger placement involves building up some muscle memory in your hands, so they feel comfortable reaching for keys in sequence and the movements become automatic.

Answer:

It's important to use the correct fingers when typing to build a habit of quicker and proper typing. It can also make you more comfortable with speed-typing.

If your computer won't connect to the internet, which of these is most likely to be the problem?

Answers

Answer:

nic is the answer.... .....

what is text or picture behiind the document called ?​

Answers

Attachment
It’s called an attachment

what is the full form of XML?​

Answers

Answer:

extensible markup language

XML is “extensible markup language”

So my computer has be clicking random things and opening things. It’s been happening for a few days and I want to know if it’s a hacker or something wronging with the computer (I don’t have a mouse) so it’s not auto clicking

Answers

Answer:

yeah there is something wrong with the computer.. it can be virus or it can your mouse board. its not a hacker

Explanation:

Write a QBASIC program to calculate and display the simple interest.​

Answers

Answer:

see and write

Explanation:

cls

start

enter"principle"

enter"time"

enter"rate"

p×t×r/100

display result(output)or ans

stop

Which of the following is a necessary step prior to replacing the removable battery pack in a laptop computer?
a. Remove the laptop keyboard bezel, and if needed, remove the keyboard.
b. Verify the computer system is configured in sleep mode.
c. Verify the laptop system is powered off and configured for Ship Mode.
d. Confirm the replacement battery is recommended by the laptop manufacturer.

Answers

Answer:

number c is the correct answer

A program virus infect​

Answers

Explanation:

Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.

MARK AS BRAINLIST IF IT IS USEFUL

Question 3 of 10
A business letter is not written:

Answers

Answer:

yes. business letter better use statistic. or audit.

Write a short note on the fifth generation computer​

Answers

Answer:

It's component is bio chips.

It is used in present-future.

I think operating speed is Mili second.

Which event took place in the early 1980s?

The first known hacking attempt occurred.
Hackers used spear phishing.
The internet gained popularity.
Information was shared quickly and easily.

Answers

Answer:

The internet gained popularity.

Explanation:

What are the two most common kinds of hard drives?
open source and proprietary
O terabyte and gigabyte
O RAM and ROM
O magnetic hard disk drive and solid state drive

Answers

The last option:
Magnetic hard disk drive & solid state drive (HDD) & (SSD)

A structured process in which users, managers, and analysts work together for several days in a series of intensive meetings to specify or review system requirements is called: A. participatory design. B. joint application design (JAD). C. prototyping. D. whiteboarding. E. rapid application development (RAD).

Answers

Answer:

B

Explanation:

joint application design (JAD)

Which engineer may design a GPS for a vehicle?

Answers

Explanation:

Mechanical engineer may design a gps for a vehicle.

An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is attending an important video conference with a customer concerning a large sale. It is important for the video quality to be excellent during the meeting. The employee is unaware that after a successful login, the connection to the company ISP failed. The secondary connection, however, activated within seconds. The disruption was not noticed by the employee or other employees. What three network characteristics are described in this scenario

Answers

Answer: I gave 6 you can choose from.

Integrity

Scalability

Quality of Service

Fault of Tolerance

Powerline Networking

Security

Mark true or false IT questions

1:you can change the default font style in word ( )

2:A pie chart represent only one data series ( )

3:MS-DOS is a graphical user interface operating system ( )

4:a presentation software is a application software ( )

5: only addition can be done in the ALU ( )

fill in the blanks...............

1:A ................... mouse is looking like a pencil

2:A/An ......................... is an interface between the user and the computer​

underline the correct answer

1: the.......... function multiple the numbers in Excel

add

sum

products

Min

2:to enter the data in multiple lines

wrap text

merge and center

orientation

all of these

3:a list is used when the unordered of items is marked

bulleted

numbered

both a and b

non of these

4:the screen that you see after you signed in the computer

wallpaper

desktop

screen saver

non of these

5:the ............. manages the working and control of a network device

Device driver

kernel

file system

all of these

Answers

Answer:

1. true

2. true

3. false

4. false

5. false

State the Limitations of the first generation of computers​

Answers

Answer:

The limitations of the first generation of computer are:-

•The operating speed was very low.

•Power consumption was very high.

•They required large space for installation.

Hope it helps you.

which type of software is created on user dimension​

Answers

Answer:

Application and system software is created on user dimension.

What do earthquakes and tsunamis have in common?

Answers

Answer: They modify the earth's surface

Explanation:

It was the correct answer on QC. Hope this helps

Energy is released as an earthquake whenever these tectonic plates glide over, under, or past each other at the fault lines where they meet. Tsunamis are ocean waves caused by undersea earthquakes.

What are tectonic plates?

Tectonic plates are fragments of the Earth's crust as well as topmost layer mantle, collectively known as the lithosphere.

The plates are approximately 100 km thick and are made up of two types of material: oceanic crust (also known as sima from silicon and magnesium) and continental crus.

Tsunamis are ocean waves caused by: large earthquakes near or beneath the ocean Eruptions of volcanoes Landslides beneath the sea.

Large amounts of debris fall into the water during onshore landslides. Because these waves are not caused by tides, scientists avoid using the term "tidal wave."

When these tectonic plates glide over, under, or past each other at the fault lines where they meet, energy is released as an earthquake. Tsunamis are ocean waves caused by earthquakes beneath the sea.

Thus, this is the similarity between earthquake and tsunami.

For more details regarding tectonic plates, visit:

https://brainly.com/question/16944828

#SPJ2

Explain why this product was created?

Answers

Explanation:

Product was created becaus the first and most important reason for any new development is to provide new value to the customer. Without this, there is no reason for them to trade their money for the new device. However, if the product or service offers overwhelming value, then customers will flock to it.

what is a compter crime?​

Answers

Answer:

Cy***rcrime, also called computer cr**me, the use of a computer as an instrument to further illegal ends, such as committing fr4ud, traf**icking in child por****graphy and intellectual property, stealing id

A computer system requires users to have an access code that consists of a three-digit number that is not allowed to start with zero and cannot repeat digits. How many such codes are possible

Answers

Answer:

648

Explanation:

---

Conditions: Not allowed to start with 0 // No repeating digits

---

9 possible ways for first digit (excluding 0, therefore 1-9)

e.g. 123, 234, 567

9 possible ways for second digit (excluding 0 and digit before 1-9)

e.g. 123, 124, 125

8 possible ways for third digit (excluding 0 and condition for second digit 1-9)

e.g. 789 is legit, but 788 is not

Multiply 9*9*8 to get an answer of 648

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devices

Answers

Answer:

The show cdp neighbors detail command reveals much information about neighboring Cisco devices, including the IP address, the capabilities, host name, and IOS version. The show interfaces and show version commands display information about the local device.

Show the CDP neighbor's detail command should the engineer use to find the IP address information, hostname, and IOS version of neighboring network devices. Thus option D is correct.

What is a network?

A group of computers combining resources that are available on or offered by network nodes is known as a computer network. To communicate with one another across digital connections, computers employ standard data exchange.

Numerous details about nearby Cisco devices are made available via the show CDP neighbors' detail operation, including that of the Internet address, capabilities, and network address, as well as the IOS version. Details well about the local device is shown using the command show connections and show revision. Therefore, option D is the correct option.

Learn more about network, Here:

https://brainly.com/question/15002514

#SPJ2

The question is incomplete, the complete question will be :

A network engineer is troubleshooting connectivity issues among interconnected Cisco routers and switches. Which command should the engineer use to find the IP address information, host name, and IOS version of neighboring network devicesshow version

show ip route

show interfaces

show CDP neighbor's detail

Other Questions
Which cycle does NOT involve the atmosphere? *A. waterB. nitrogenC. carbonD. phosphorous Find the value of y and RT if S is between RT. RT = 7y + 7, RS = 11, and ST = 5y + 6. How can 863.141 be written in expanded form? Solve for x: |4x + 12| = 16 (5 points)Group of answer choicesx = 7, x = 7x = 1, x = 1x = 1, x = 7x = 1, x = 7 MATHIMATICALY DETERMINE THE RESULTANT FORCE IF TWO FORCES A AND B ACT ON ANOBJECT FORCE A IS 85N AND IS AT AN ANGLE OF 20 DEGREE TO HOIRZONTZL.FORCE B IS 125N AND IS AT AN ANGLE OF 60 DEGREE TO THE HOIRZONTAL Which definition of the time designation BCE is correct 1. Identify the terms in the expression1.3x - 2.7x2-5.4x + 350 points whoever aswners it potassium, Group 1calcium, Group 2iodine, Group 17neon, Group 18Which two elements in the list would bond together based on their ionic charges?(1 point)potassium and iodinecalcium and potassiumcalcium and neonpotassium and neon can anyone plz with steps (not for useless man ) How do you determine if the numbers are positive or negative? Choose the opposite of the following word Trabajar. A) descansar, B) pasar, C) regresar, D) orar. Will Mark Brainliest. Please Hurry A store is having a sale on CDs. Adrian buys five CDs and spends $40. If he decides to go back to the sale, and buy two more CDs, how much will he pay? How much with he pay for eight CDs? Which of the following statements best defines the actual yield of a reaction? (5 points)Select one:a.The amount of product measured after a reactionb.The ratio of measured yield over theoretical yieldc.The maximum amount of product that can be obtained Incorrectd.The ratio of measured yield over stoichiometric yield ___________ for self means facing challenges with integrity and valuing others diversity of opinions and appreciating the need to challenge, test and refine ideas. Group of answer choices Respect Responsibility Trust Academic Integrity What are the domain and range of f(x) = 2(3X)?domain: (-00,00); range (0,00)O domain: (-00,00); range: (2,00)domain: (0,0); range: (-0,0)domain: (2.00); range: (-00,00) 1.2 Analyse factors that can make the change process positive or a negative experience|to change and experieHow do I explain this Please Help:(No absurd answersA _________ is a group of words that work together to express an idea and can function as a noun, adjective, verb, or adverb. Which is an example of a threedimensional measurement ofvolume?A. 120 cubic metersB. 120 gramsC. 120 miles per hourD. 120 units Fill in the blank to make the number divisible by 3: 6178_9 Which expressions are equivalent to the expression 7(5 + m) - 8?