answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ludmilkaskok [199]
2 years ago
10

Data is: a. Information endowed with relevance and purpose b. Set of specific objective facts or observations c. Some informatio

n d. All of the above e. Only a and c
Computers and Technology
1 answer:
Maru [420]2 years ago
4 0

Answer: b) Set of specific objective facts or observations

Explanation: Data is referred as the information that consumes the facts and figures . These facts and figure information is usually viewed or observed in the form of images, text, facts, graphs,reports etc.Data of any sort has to be stored for any use or analyzing in future so it is generally stored in the computer and other devices.Therefore,option(b) is the correct option.

You might be interested in
_____ computing refers to a computing environment that is always present, can feel our surroundings, and-based on who we are, wh
tensa zangetsu [6.8K]

Answer:

b. Contextual computing

Explanation:

Contextual computing -

In this method of computing , the hardware and the software collect and examine the data all by itself from the near by areas in order to make it presentable , is known as the method of contextual computing .

It is also known as the context - aware computing .

Hence , from the given information of the question , the correct term from the given options is b. Contextual computing .

4 0
2 years ago
In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?
max2010maxim [7]

Answer:

The answer is "It uses the section access with in the qlikview script".

Explanation:

QlikView is now QlikSense, it comes with section access, that protects against this danger. It a way of determining, which can display certain details, it is also known as objects, that can be displayed by whom and out of which domain, etc.

  • It can also be configured using the publishing of the company. In the data load script, users can use section access to maintain security.  
  • It uses the data for authentication and authorization within segment access and automatically decreases the information, such that users only have their information.
8 0
2 years ago
After experiencing several issues with an Active Directory domain controller, you have decided to perform a restore operation on
Vikentia [17]

Normally active directory once is corrupted best method is to repair the active directory. As IT administrator user has keep a proper backup either date wise or weekly wise.

<u>Explanation:</u>

If IT administrator doesn’t have enough backup restore or repairing the active directory is highly impossible.

Before restore proper information to be made and rebooted the domino server and selected advance boot option and select the restore options. And select the proper and good backup and restore it. After restoring the backup domain server started and domain active directory should work proper.

As experience better to reinstall domain server and active directory is good practice.

5 0
2 years ago
Together with some anthropologists, you’re studying a sparsely populated region of a rainforest, where 50 farmers live along a 5
Varvara68 [4.7K]

Answer:

Explanation:

Farmers are always both directly and indirectly connected to each other

Their network is mostly strong

Networks become weak only on the edges (ends) of the river but doesn't completely dimnish

With the available network length, the center of river bank forms the strongest network of all and becomes a key player in defining the balance property of overall network

The network is very well structurally balanced and we can see that through the below image

20 miles 10 20 30 40 50

See attachment file for diagram

Considering the total length of river as 50miles and and the center of the whole length will be at 25th mile. From that point, if we consider a farmer will be be having friends for a length of 20miles both along upstream and downstream.

By this he'll be in friend with people who are around 80% of the total population. As me move from this point the integrity increases and this results in a highly balanced structural network.

6 0
2 years ago
Jorge saw a computer named Watson on the game show Jeopardy and was surprised at how many answers Watson was able to get correct
KiRa [710]

Answer:

The above statement is FALSE

Augmented reality works with sensor based inputs from the real world.

It is an immersive perception of a real-world environment in which objects existing in the real world are augmented by computer-generated perceptual knowledge, often through multiple sensory modalities like visual, auditory, haptic, somatosensory and olfactory.

Based on the above description

8 0
2 years ago
Other questions:
  • In three to five sentences, describe whether or not files should be deleted from your computer.
    13·2 answers
  • Marissa works at a company that makes perfume. She noticed many samples of the perfume were not passing inspection. She conducte
    6·2 answers
  • Static packet filtering firewalls are limited to ________. inspecting packets for which there are good application proxy filteri
    8·1 answer
  • 1.2.2: Output variable value. Jump to level 1 Write a statement that outputs variable userAge. End with a newline. 1 2 3 4 5 6 7
    12·1 answer
  • Axel is finally documenting his work. What could he be writing?
    12·1 answer
  • Doctors discovered a tumor in Amanda’s brain and used robotic surgery to remove it. Which best describes the role a worker in th
    15·2 answers
  • Write a program that gets a list of integers from input, and outputs non-negative integers in ascending order (lowest to highest
    13·2 answers
  • print_pattern() prints 5 characters. Call print_pattern() twice to print 10 characters. Example output: ***** ***** in python
    7·1 answer
  • External network security threats can include management failure to support organization-wide security awareness, inadequate sec
    12·1 answer
  • Multiple Choice: We have been assigned the task of developing a software testing tool (tester) that can assess reachability of s
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!