Examples of DATA and INFORMATION​

Answers

Answer 1

Answer:

When data are processed, interpreted, organized, structured or presented so as to make them meaningful or useful, they are called information. Information provides context for data.

Explanation:

For example, a list of dates — data — is meaningless without the information that makes the dates relevant (dates of holiday).


Related Questions

Which system board has a 64-bit bus?

Answers

Answer:  https://en.wikipedia.org/wiki/64-bit_computing

64-bit computing - Wikipediaen.wikipedia.org › wiki › 64-bit_computing

In computer architecture, 64-bit integers, memory addresses, or other data units are those that are 64 bits (8 octets) wide. Also, 64-bit central processing unit (CPU) and arithmetic logic unit (ALU) architectures are those that are based on processor registers, address buses, or data buses of that size. ... With no further qualification, a 64-bit computer architecture ...

‎History · ‎64-bit operating system... · ‎64-bit applications · ‎64-bit data models

Explanation:

If you are running a server , which of the follow operating system would be best suited ?window 10 or macOS

Answers

Answer:

MacOS. MacOS is always better for developers with the linux-like commands. The powerful shell for hosting servers, downloading programs for the servers, and much more. Windows is easier to use for normal users, but does not have a good shell for running commands. But the best OS to run a server on is Linux. Over 90% of servers are hosted on some linux distribution. Probably most of them are Ubuntu

Please mark me as brainliest.

Discuss the objectives of business 8 marks​

Answers

Answer:

Objectives of Business – Profitability, Growth, Stability, Efficiency and Survival. Business means busy in some activities. Business means conducting activities such as – sale, purchase and manufacturing etc for profit and growth.

The main objectives that a business might have are: Survival – a short term objective, probably for small business just starting out, or when a new firm enters the market or at a time of crisis. Profit maximisation – try to make the most profit possible – most like to be the aim of the owners and shareholders.

Complete the statement below with the correct term.
Good group dynamics depend on having four key strengths represented on the team, including analytical skills,
creativity, patience for research, and the ability to
effectively

Answers

Answer:

I need this answer rn

Explanation:

What Are the Types of Web Sites? *​

Answers

Answer:

This is your answer ☺️☺️☺️

most web sites are search engines

17. What data structure is used for depth first
traversal of a graph.​

Answers

Answer:

Depth First Search (DFS) algorithm traverses a graph in a depthward motion and uses a stack to remember to get the next vertex to start a search, when a dead end occurs in any iteration.anation:

Which occupation is expected to increase according to the segment? Plz help me with question 5

Answers

In the Declaration of Independence it states, "To secure these rights, governments are instituted among men deriving their just power from the consent of the governed. Whenever any form of government becomes destructive of these ends, it is the right of the people to alter or abolish it."

What Enlightenment idea is reflected in this passage?

Technology changes rapidly. Do you think the development of new technology will slow down at some point? At some point will consumers be satisfied with the current technology, or is it human nature to continually want change? What impact does a desire for new technology have on our economy?

Answers

Answer:

1st question=no

2nd question=consumer will never be satisfied.Unless the technology is super strong that nothing can stop it

3rd question=almost everything,first they build technology because they want humans life to be easy.

wish it helps

16
is a built-in mathematical formula included in MS Excel,
A) Function
By del
C) Formula
D) Range​

Answers

16
is a built-in mathematical formula included in MS Excel,
A) Function

Which device is connected to a port on a switch in order to receive network traffic?

Answers

Answer:

"Passive IDS" is the appropriate answer.

Explanation:

A framework that is designed mostly for monitoring and analyzing internet traffic operations and alerting a user or administrator about possible bugs, as well as disruptions, is known to be passive IDS.This IDS cannot carry out certain preventive as well as remedial processes as well as operations by itself.

ill try to post the program needed in comments
This assignment will use Practical Assignment-7 as a foundation. Modify the .py resulted fron Practical Assignment 7 to meet the following requirements:
- If the file name that the user inputs does not exist in the folder, the user should be asked to try again two times. If the input file is still missing after the third attempt, the program should exit with a message;
- Automatically delete the original file after the encryption is done; use the option where the deleted file is not recoverable;
- For the option requiring a password to encrypt and decrypt, if the decryption password is wrong, the user should be asked to try again two times. If the password is still wrong after the third attempt, the program should exit with a message;

Answers

Answer:

Explanation:

what program do we use for ths

Consider the following correct implementation of the insertion sort algorithm.

public static void insertionSort(int[] elements)

{

for (int j = 1; j < elements.length; j++)

{

int temp = elements[j];

int possibleIndex = j;

while (possibleIndex > 0 && temp < elements[possibleIndex - 1])

{

elements[possibleIndex] = elements[possibleIndex - 1];

possibleIndex--; // Line 10

}

elements[possibleIndex] = temp;

}

}

The following declaration and method call appear in a method in the same class as insertionSort.

int[] arr = {4, 12, 4, 7, 19, 6};

insertionSort(arr);

How many times is the statement possibleIndex--; in line 10 of the method executed as a result of the call to insertionSort ?

Answers

The statement possibleIndex--; in line 10 is executed 5 times

From the declaration, we have the following array:

int[] arr = {4, 12, 4, 7, 19, 6};

The length of the array is 6

The iteration in the insertionSort function is meant to be repeated from 1 to n - 1

In this case, we have: 1 to 5 (i.e. 6 - 1)

Hence, the statement possibleIndex--; in line 10 is executed 5 times

Read more about insertion sort at:

https://brainly.com/question/15263760

Which of the following statements about malware protection are accurate? Select 3 options. Firewalls and anti-malware should be used together to provide a higher level of protection. Being cautious in your behavior and how you interact with your devices is just as important as technology-based malware protections. Apps from any source can be downloaded safely onto mobile devices, since the operating system will stop any malware infection. Popular anti-malware applications can locate and remove ALL malicious software. Updates for software and operating systems need to be installed regularly, so systems have up-to-date protection.

Answers

Answer:

Updates for software and operating systems need to be installed regularly, so systems have up-to-date protection.

Firewalls and anti-malware should be used together to provide a higher level of protection.  

Being cautious in your behavior and how you interact with your devices is just as important as technology-based malware protections.

Explanation:

Hope this helps

The statements about malware protection that are accurate:

Firewalls and anti-malware should be used together to provide a higher level of protectionBeing cautious in your behavior and how you interact with your devices is just as important as technology-based malware protectionsUpdates for software and operating systems need to be installed regularly, so systems have up-to-date protection.

Malware refers to the software that damages computers and destroys them. It should be noted that malware refers to malicious software.

Examples of common malware include worms, viruses, spyware, ransomware, etc.

It should be noted that anti-malware is used in order to protect computer systems from being infected with viruses.

Read related link on:

https://brainly.com/question/24252756

how did the tropica cyclone impact the environment​

Answers

Island dim disk disk dim sum

The way that tropical Cyclone impacts the environment is that; the cyclone's high winds are capable of eroding the soil, which could damage existing vegetation and ecosystems.

What is a Tropical Cyclone?

A tropical cyclone is an intense circular storm that begins over warm tropical oceans and characterized by low atmospheric pressure, high winds, and heavy rain.

Now, the way this tropical Cyclone impacts the environment is that the cyclone's high winds are capable of eroding the soil, which could damage the existing vegetation and ecosystems.

Read more about Tropical Cyclones at; https://brainly.com/question/26633605

application area of word processor?​

Answers

Answer:

Typing, editing,and printing different types of document .Formatting text, paragraph , pages for making attractive document .Checking spelling and grammar of document for making it error free.Inserting and editing pictures , objects, etc.Adding watermark , charts , quick flip, etc.
Word Processing is using a computer to create, edit, and print documents. Of all computer applications, word processing is the most commonly used. To perform word processing - a computer, word processing software and a printer are required.
Word processing software enables the user to do the following:
1. To create a document
2. Store it electronically on a USB or on a computer
3. Display it on a screen
4. Modify or format it by entering commands and characters from the keyboard
5. Print the document on a printer

Word processors can create multiple types of files, including text files (.txt), rich text files (.rtf), HTML files (.htm & .html), and Word files (.doc & .docx). Some word processors can also be used to create XML files (.xml).

A word processor should not be confused with a text editor, such as Notepad, that only allows editing and creating plain text documents.

TOT al
Name TWO examples of these settings and utilities. (2)​

Answers

Answer:

A program that performs a very specific task, usually related to managing system resources.

Explanation:

Compression utilities software.

Backup utilities software.

Disk defragmentation utilities software.

Text editor.

Application software.

The General purpose Application software.

which of the following is not an operating system a) boss b) window xp c) linux d) bindux​

Answers

Answer:

boss is not an os

Explanation:

boss is a former of Linux hope this helped

Discuss the differences among Internet, Intranet, Extranet
and World Wide Web, with practical examples.

Answers

Answer:

Internet :

The network formed by the co-operative interconnection of millions of computers, linked together is called Internet.

Intranet :

It is an internal private network built within an organization using Internet and World Wide Web standards and products that allows employees of an organization to gain access to corporate information.

Extranet :

It is the type of network that allows users from outside to access the Intranet of an organization.

Explanation:

5 similarities between the C and C ++ language​

Answers

Answer:

Check explanation

Explanation:

Well, for one thing, C++ is a superset of C. This means:

They both have similar syntaxSimilar code structureSimilar compilation

Another similarity is that pretty much all of C's keywords and operators are used in C++ with the same use.

They both also use the semicolon (;) as the statement terminator.

There you go. 5 similarities between C and C++.

Who are the member banks?

Answers

A member bank is when someone is associated with the Federal Reserve System. What this bank consists about is that there are people who can do deposits towards the Federal Reserve Bank in their area

Microsoft

The Lock Tracking option prevents someone from turning the Track Changes feature off without a ________________________ . [Lock and Unlock Change Tracking]
Question 4 options:

password

lock definition

filename

computer

Answers

Answer:

Password

Explanation:

just took the test got a A!

Which view is the default for contacts in Outlook 2016?

Business Card
Card
Phone
People

Answers

Answer: D:) people

Explanation: I search it up

In this assignment, you will need to design a complete Black-Box testing plan for the following program. A computer science student has to travel from home to ODU every day for class. After showing up to class late too many times due to traffic, the student made a program to tell him when he should leave the house. The time given depends on the class time and the day of the week.

He came up with a few rules to make sure he gets to class on time.
The normal drive time for this student is 30 minutes without traffic. He then gives himself 5 minutes to walk across campus to class from the parking lot.
However, if he leaves home during the worst morning rush hour, from 6 AM - 7 AM on a weekday, he needs to add 20 minutes to his commute to account for traffic. If he leaves home during the regular morning rush hour, from 7 AM - 8 AM on a weekday, he needs to add 10 minutes to his commute to account for traffic.
Mondays have the worst morning traffic, and he should instead add 30 minutes for 6 AM-7AM and 20 minutes for 7 AM – 8 AM.
On Saturdays and Sundays the student needs to take a different route due to road construction. This adds 6 minutes of travel time.
If he leaves during the afternoon rush hour on a weekday, traffic from 4-6PM should add 15 minutes of travel time. Traffic in the afternoon is worst on Thursdays, and should instead add 20 minutes of travel time.
If the class is between 9:30 AM and 11 AM he needs to arrive 10 minutes earlier for walking time because the closest parking lots are all full.
The program will read data from the screen in the following format:

Day_of_the_week hours:minutes AM/PM
e.g.
Tuesday 12:45 AM
Sunday 01:52 PM
If the input is not in the correct format the program will prompt the user again for the input. The program is not case sensitive. The hours and minutes can be a single digit or two digits, but the minutes must be 2 digits.

Answers

Answer: sorry i need points to ask a question hope u understand...

Explanation:

Some printers spray ink, while others use heat or lasers to create images.
(A) non-impact
(B) line
(C) impact
(D) hard-copy​

Answers

Answer:

hard - copy

Explanation:

that's because my printers does this

and its soo cool

The answer is hard-copy

What are indications of a computer hardware problem? Check all that apply.
The printer is printing in black and white.
The keyboard keys are getting stuck.
The computer monitor is going blank.
The pointer of the mouse freezes.
The images on the monitor look sharp.

Answers

Answer:

The keyboard keys are getting stuck.

The computer monitor is going blank.

The pointer of the mouse freezes.    

Explanation:

The keyboard keys are getting stuck, the computer monitor is going blank, and the pointer of the mouse freezes are indications of a computer hardware problem.

What is computer hardware?

The physical components that comprise a computer system, such as the central processing unit (CPU), memory (RAM), hard drive, motherboard, power supply unit (PSU), and others, are referred to as computer hardware.

The keyboard keys becoming stuck, the computer monitor going blank, and the mouse pointer freezing are all signs of a hardware problem.

Physical damage to the keyboard or a problem with the keyboard's internal mechanism can both cause the keys to become stuck.

A faulty monitor, a loose or damaged cable, or a problem with the graphics card can all cause the computer monitor to go blank.

A problem with the mouse's pointer or a problem with the computer's USB port can both cause the mouse's pointer to freeze.

The printer printing in black and white, on the other hand, is most likely the result of a printer setting or a software issue.

Thus, the sharpness of the images on the monitor indicates that the monitor is working properly and does not necessarily indicate a hardware problem.

For more details regarding hardware, visit:

https://brainly.com/question/15232088

#SPJ2

What are the different options in a page layout feature ? Select three options

Answers

Answer:

Half Center Right Left, theres four

Explanation:

write an algorithm that reads two values determines the largest value and prints the largest value with an identifying message in Python​

Answers

Answer:

a = int(input("Input your first number: "))

b = int(input("Input your second number: "))  

maximum = max(a, b)

print("The largest value: ", maximum)

Explanation:

The function max() can be used to find the maximum of two values

The algorithm in Python is given by:

v1 = input("Enter the first value: ");

v2 = input("Enter the second value: ");

if (v1 > v2):

     print(v1, "is the largest value");

else:

     print (v2, "is the largest value");

------------------------

The first step is reading the two variables, which is done with the following code.

v1 = input("Enter the first value: ");

v2 = input("Enter the second value: ");

------------------------

Then, we have to verify which one is the largest, using the if command, along with the identifying message.

if (v1 > v2):

     print(v1, "is the largest value");

else:

     print (v2, "is the largest value");

A similar problem is given at https://brainly.com/question/14233103

CPU, IPO, RAM
5. Write very short answer the following questions,
a. Define the term 'Computer
b. What is 'Input"
o What are data?
d. What is the working principle of the computer?
e Why does a computer need programs?
f. What is Random Access Memory?
g. What are the types of internal memory?
hort answer to the following questions.​

Answers

Answer:

A) ans: A computer is an electronic devices for storing and processing data typically and binary form , according to the instructions given.

B) ans: Numbers, words or information which we give to a computer to solve a problem is called input

c

Examine the following code. (1 point) Object obj = new Integer (5); Which of the following statements is true? The declared type of obj is Object. The actual type is also Object. The declared type of obj is Integer. The actual type is Object. The declared type of obj is Object. The actual type is Integer. The declared type of obj is Integer. The actual type is also Integer. 2. Examine the following code. (1 point) class D {} class C extends D {} class B extends D {} class A extends B {} Which of the following statements will compile without error? OA a = new B(); OB b = new DO); OCC = new AO; OD d = new A);

Examine the following code.
(1 point) class One { public void print() { System.out.println("One"); } class Two extends One { public void print() { System.out.println("Two"); } class Three extends Two { public void print() { System.out.println("Three"); } Which of the following code fragments will compile without error and display something other than the word, "Three"? One w = new Three(); w.print(); Three x = new One(); x.print(); One y = new Two(); y.print(); Two z = new Three(); z.print();

(1 point) Suppose that class Alpha is the parent of Beta and Beta is the parent of Charlie. Method calculate() is defined in Beta and is inherited and overridden by Charlie. Which of the following code fragments shows a valid method call? Alpha k = new Beta(); k.calculate(); Alpha k = new Charlie(); k.calculate(); Beta k = new Charlie(); k.calculate();
Charlie k = new Object(); k.calculate(); 5. What is the output of the following program?

(1 point) public class Circle { private double radius; public Circle( double radius) { this.radius = radius; public static void main(String[] args) { Circle x = new Circle(5); Circle y = new Circle(5); Circle z = x; System.out.println(x.equals(y) + ", " + (x == z)); true, true true, false false, true false, false

6. Consider the following code. (1 point) ArrayList names = new ArrayList(); names.add("Alexa"); names.add("Bill"); names.add("Christine"); Which of the following statements will display, "Alexa"? System.out.println(names.get()); System.out.println(names.retrieve()); System.out.println(names.get(1)); System.out.println(names.retrieve (1));
Which of the following statements will display, “Alexa"? System.out.println(names.get(0); System.out.println(names.retrieve (0)); System.out.println(names.get(1)); System.out.println(names.retrieve(1));

7. Which field or method of the ArrayList class will return the number of elements stored in the ArrayList? (1 point) length length() size() capacity (1 point)

8. Which of the following sequences shows Java access modifiers in correct order from most restrictive to least restrictive? private, default, protected, public private, protected, default, public public, default, protected, private public, protected, default, private

9. Which of the following statements is true about the protected modifier? (1 point) A protected member can only be accessed by code in other classes in the same package. Not only can a protected member be accessed by code in other classes in the same package, it can also be inherited by a subclass, even if the subclass is in a different package. The public and protected modifiers are nearly identical except that protected level access can be turned on or off at runtime. The protected modifier should be used nearly all the time, even in combination with private and public, especially when sensitive data is involved.

10. Which of the following statements is true? (1 point) It is possible to create instances of a class marked final. It is possible to extend a class marked final. It is possible to override a method marked final. It is possible to override a method inherited from a class that is marked final. Finish Cancel
will give more point if you help

Will mark brainliest!!!!!! no bs answers

Answers

Explanation:

what is this this is very long question I cannot answer this right now I need time

1 is C. The declared type of obj is Object. The actual type is Integer

2 is D. D d =new A();

3 is C. one y = new Two();

4 is C. Beta k = new Charlie();

5 is C. false,true

6 is A. System.out.println(names.get(0));

7 is C. size()

8 is A. private, default, protected, public

9 is B. Not only can a protected member be accessed by code in other classes....

10 is A. It is possible to create instances of a class marked final.

discuss any five factors that hinder the application of a computer in business organisations​

Answers

Answer:

bugs

Explanation:

Answer:

bugs

keypad

CPU

all of it can stop computer from working properly

Other Questions
A football (450 g) falls vertically from rest onto the ground from a height of 5.0 m. If the force that compresses the ball when it hits the ground is (100 N). What is the amount of compression of the ball? Draw explanatory diagram. marks] what's [tex] \sqrt[4]{256} [/tex] 4. PART B: Which TWO additional phrases in the section titled"Convergent Boundaries" provide further support for the answer toPart A?A "landmasses collide" ( Paragraph 4)B "slowly giving rise" ( Paragraph 4)C "a plate of ocean dives" ( Paragraph 5)D "forms mountain ranges." ( Paragraph 5)E spewed out" ( Paragraph 5)F"forming deep trenches" ( Paragraph 6) Enzel goes online to buy a graphing calculator. He finds a site that currently has a promotion of 15% off on all orders over $50. Enzel decides to buy his graphing calculator, with a price tag of $83, at this site because he knows that he will get the 15% discount when he checks out. Enzel pays 4.5% sales tax on the discounted price and pays a shipping fee of $6.35. What is the total of Enzels online purchase?a.$80.07b.$80.36c.$86.74d.$93.09 Which choices BEST analyze how the lines I have already intimated to you the danger of parties in the state, with particular reference to the founding of them on geographical discriminations. Let me now take a more comprehensive view, and warn you in the most solemn manner against the baneful effects of the spirit of party, generally, function in the argument? (Choose all that apply. A) These lines recap what has already been covered while giving a transition to another topic.B) These lines recall what has already been covered while giving a transition to another topic. C) These lines argue against the heavy reliance on political parties that some nations fall a victim to.D) These lines make an emotional appeal, painting a vivid picture of the sorrow cause by the two party system.E) These lines ask a questions of the audience, urging them to consider their own point of view on the topic at hand. Do you guys think decades and decades in the future we will have advansed into new humans? like we gain a new body part? or get shaped differently? or we get whipped out but a small fragment survives and grows into a intirely new thing and a new world arises. Or do you think the solor system will gain a new planet with creatures on it sense the solor sytem is moveing through space? I have sooooo many questions about the future How do urban culture and rural culture affect one another? A strawberry farm had 7,200 plants in total, one field had 18 rows of 200 plants ; the other field had 9. Rows of Where did the federal government want to send the Native Americans? Fill in the blanks in the following sentences with the appropriate imparfalt or passcompos forms of the verbs in parentheses.Charles de Gaulle ______trs clbre. (tre)J ______six ans quand mes parents ont achet la maison.Nous faisions du ski quand il _______ neiger. (commencer) Four wholesalers are having specials on chicken this week.A table is shown. The table has three columns and four rows. The first column is labeled Wholesaler. The second column is labeled Pounds of Chicken. The third column is labeled Cost. Wholesaler A, ten pounds of chicken, forty dollars. Wholesaler B, fifteen pounds of chicken, forty-five dollars. Wholesaler C, twenty pounds of chicken, fifty dollars. Wholesaler D, twenty-five pounds of chicken, eighty dollars.Which wholesaler has the best price on chicken?awholesaler Abwholesaler Bcwholesaler Cdwholesaler D what things to consider while formulating constitution so that become longer? In a low pressure system, The air is in the process of A. Rising and cooling B. Rising and healingC. Falling in coolingD. Falling in heating 1a)Every morning, Jim goes for a morning walk. His normal walking speed is 3 1/2 km per hour, and he walksa total distance of 10 km every day. How much time does he take to cover one km?minutesAnswer 17 1/71b)How much time does it take him to complete his morning walk? How did Congress plan for governing the Northwest Territory and opening it to settlers? Individuals connect to the Internet through an __ (1) __ allowing them access to the system. The rules on the Internet for how messages are addressed and passed on are called __ (2) __ .Each device on the internet has a unique numeric address called an __ (3) __ , which can be looked up automatically using a __ (4) __ , which is like a giant address book.Each message is broken up into small pieces called __ (5) __ that are sent individually which makes the Internet more reliable. Since packets often arrive out of order, they include information about the order in which they should be arranged as well as who the sender and receiver are.Packets are guided through the internet by __ (6) __ . Having multiple paths or __ (7) __ makes the Internet more reliable and allows it to keep growing as more people and devices are connected to the system. ayo besties help me Help 15 points. For math gimme a paragraph about Barbara Jordan please. (early life, professions, husband/s (or wife if she was l/b ) What power is Hitler going to destroy in the east because they go against Fascism?A- Britain B- United StatesC- JapanD- Russia