1. .……............. can be considered as raw data.

(a) Sithum’s G.C.E. (O/L) examination results

(b) Z-Score of G.C.E. (O/L) examination results

(c) The average marks of students of G.C.E. (O/L) examination

(d) The top ten total marks of students of G.C.E. (O/L) examination

Answers

Answer 1

Answer:

(a) Sithum's G.C.E. (O/L) examination results

Explanation:

Raw data which is also known as primary data, are the data collected when performing a research, investigation or study, which are obtained through a survey, experiment, or observation and from which correlations and distributions can be calculated, only when the data is complete

Therefore, raw data is unprocessed data, and the option which can be considered as raw data is the option which is not processed, which is Sithum's G.C.E. (O/L) examination results.


Related Questions

Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI

Answers

Answer:

Serial SCSI

Explanation:

Hot swapping can be defined as a process which typically involves fitting or replacing CD-ROM drive, hard-disk drive, power supply or other peripheral devices while a computer system is powered on. Thus, it allows for the installation or removal of a peripheral device from a computer while power is still being supplied to the computer i.e without having to shutdown the computer.

Serial SCSI is a SCSI standard which allows for the technique known as “hot swapping” because it's a point to point connection that is designed to move data to and from computer storage serially.

A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
the DMZ: SQL injection on an infrequently used web server that provides files to vendors SSL/TLS not used for a website that contains promotional information
The scan also shows the following vulnerabilities on internal resources: Microsoft Office Remote Code Execution on test server for a human resources system
TLS downgrade vulnerability on a server in a development network In order of risk, which of the following should be patched FIRST?
A. Microsoft Office Remote Code Execution
B. SQL injection
C. SSL/TLS not used
D. TLS downgrade

Answers

Answer:

A. Microsoft Office Remote Code Execution

Explanation:

From the given options, we have;

The web server having a SQL injection is infrequently use

The information on the website having SSL/TLS not used is promotional

The location of the server having  a TLS downgrade is on a development network

The location of the Microsoft Office Remote Code Execution is on a human resource system test server

Therefore, given that the test server, is the deployment source of the main server, and that with a Remote Code Execution, RCE,  cyber attack, the attacker is able to make commands work on other computers, the RCE attack on the test server is a potential access of an attack on the main servers, and should be patched first.

Which vendor owns the software platform Fusion?
A.
Microsoft
B.
Apple
C.
SAP
D.
Oracle

Answers

Answer: D

Explanation:

D. Oracle owns the software platform Fusion

how is internet connection made possible.​

Answers

Answer:

To connect to the Internet and other computers on a network, a computer must have a NIC (network interface card) installed. A network cable plugged into the NIC on one end and plugged into a cable modem, DSL modem, router, or switch can allow a computer to access the Internet and connect to other computers.

Data stored on physical storage devices must do what before the processor can access it? Be converted to binary Be written to the hard drive Go into short-term memory Go from volatile to nonvolatile memory

Answers

Answer:

Go into short-term memory

Explanation:

Data stored on physical storage devices must go into short-term memory before the processor can access it.

This is because, physical storage devices are secondary memory which store information for a long time. The CPU does not work directly with secondary memory but with primary or short term memory. Since the CPU works mainly with short term memory, information in physical storage or secondary memory has to go into short term memory for the CPU to be able to process it.

So, data stored on physical storage devices must go into short-term memory before the processor can access it.

What is self management.​

Answers

Answer:

Self management is being able to control your emotion & behavior. This is a very important life skill

Explanation:

Self management is the ability to regulate own's emotions, thoughts, and behaviors effectively in different situations.

Abdullah wants to send sessitive data. Abdullah wants to make sure that only ahmed can see and read this. How can abdullah protect this data, so that ahmed can only access it. By using this information make an algorithm.

Answers

Answer:

Use an encryption algorithm

Explanation:

An encryption algorithm can be used to hide the message from parties in-between or any third parties that might want to intercept the message being sent by Abudullah to Ahmed.

Encryption algorithms use cryptographic methods to encrypt or code data such that only the sender and receiver of that data have the keys to properly decode/decrypt these messages/data.

What is a possible explanation for the issue described below? A user reports that ever since she or he began creating animations, graphics, and video clips for the company’s Web site on her or his computer, the computer has begun running slower, especially when performing the graphics functions. The computer needs an increase in VRAM. The computer needs an increase in SRAM. The computer needs an increase in SIMM. The computer needs an increase in RIMM.

Answers

VRAM because VRAM is used for graphic intensive workloads

Answer:

The computer needs an increase in VRAM

It is A

Other Questions
If Logx (1 / 8) = - 3 / 2, then x is equal to what? I Will Mark Brainliest The figure shows a rectangue with its length and breadth as indicated,Give that the perimeter of a rectangle is 120cm, find the area of rectangle . Plzz help me with this questionChapter:Tense 20,30,13,10,14,10,10,?,?,? The mean output of a certain type of amplifier is 102102 watts with a standard deviation of 1212 watts. If 6363 amplifiers are sampled, what is the probability that the mean of the sample would differ from the population mean by greater than 3.43.4 watts A mis amigos ______ este restaurante.A. os gustaB. les gustaC. me gusta a. Which Biscuit do you prefer on the basis of Taste? 1. Parle-G 2. Tiger 3. Britannia What is the simplest shape in Mathematics? mention any one difference between the American and the Japanese greetings How do bacteria develop resistance to drugs 1. A body moving with uniform acceleration of 10 m/s2 covers a distance of 320 m. if its initial velocity was 60 m/s. Calculate its final velocity. Pls if anyone knows the answer with work included/steps that will be greatly appreciated :) hello! HELP NEEEDED!!!!!!!!!!! A rocket is fired upward with an initial velocity v of 100 meters per second. The quadratic function S(t)=-5t^2+100t can be used to find the height s of the rocket, in meters, at any time t in seconds. Find the height of the rocket 7 seconds after it takes off. During the course of its flight, after how many seconds will the rocket be at a height of 450 meters? find the perimeter of the polygon please give me correct answer To mix weed killer with water correctly, it is necessary to mix 18 teaspoons of weed killer with 3 gallons of water. How many gallons of water are needed to mix with the entire box if it contains 24 teaspoons of weed killer Quentin's faith teaches that God commands everyone to give at least ten percent of their income to the poor. Quentin usually gives fifteen percent. According to divine command theory, Quentin's action is __________. obligatory supererogatory impermissible neutral You view tea and scones as perfect complements, and you prefer to consumer one cup of tea with one scone. Also, your indifference curves are plotted with tea on the vertical axis. If you presently have two cups of tea and one scone, what this the marginal rate of substitution (MRS) at this point A publisher reports that 54% of their readers own a personal computer. A marketing executive wants to test the claim that the percentage is actually different from the reported percentage. A random sample of 200 found that 44% of the readers owned a personal computer. Is there sufficient evidence at the 0.10 level to support the executive's claim