what is the result obtained after data processing called?​

Answers

Answer 1

Answer:

the result after data processing is called output

Answer 2

Answer:

The meaningful result obtained after processing is known as information. The collection of computer programs and related data that provide the instructions telling a computer what to do is called software


Related Questions

Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder. Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do

Answers

Answer:

log off of his account and log back in

Explanation:

The first thing that Marcus should do would be to log off of his account and log back in. This is so that the new changes to his permissions can take effect. This should solve his problem and grant him access to all the permissions available in the Managers Group. If this does not work, then it is most likely that he is still in the previous group which has the Manager level permissions blocked. In this case he would need to leave the previous group that he is in because the blocking permissions overrides the access allowed from the Managers group.

2. Give technical terms for
a) A feature which computer never gets tired.
b) A memory to be used on fifth generation of computer.
c) Computer that used continues data
. d) An illegal activity that harms people by using computer.
e) A machine developed by Charles Babbage in 1833AD. ​

Answers

Answer:

Cccccccccccccccccccccccccccccccccc

What is generation of computer ?​

Answers

I HOPE THIS INFORMATION WILL HELP YOU A LOT......

Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.

Hope this answer helps you..!!

..

..

Plz select it as the BRAINLIEST..!!

Analog computers are general purpose computers : true ? or false ?​

Answers

Answer:

false

Explanation:

Analog Computer is functioned to do mathematical model of analog computers. This model consists several basic units which are interconnected in order to compute some function.

How do we explain the difference between fake news and facts​

Answers

Answer: it depends if the news is on the news and someone rights an article about it and says some mislead details that's how u know its fake  

Explanation:

Former CIA employee and NSA contractor, ____________ is seen by many as either a whistle-blowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.

Answers

Edward Snowden is a retired CIA employee, and an NSA contractor is regarded by many as a whistle-blowing hero or a treasonous villain. This individual obtained sensitive digital data from the U.S., British, and Australian agencies and leaked them to the press, exposing the breadth of government surveillance efforts.He is a former computer intelligence consultant who released a highly classified central intelligence agency (NSA) in 2013 while serving as a contract for the Central Intelligence Agency.That's why the answer is "Edward Snowden".

Learn more:

Edward Snowden: brainly.com/question/3426041

Which of these is NOT a user interface?

A. Graphical user
B. Command line
C. Icon interface
D. Menu driven​

Answers

Answer:

menu driven is not an interface

Explanation:

hope that helps you

please follow

please mark brainliest

I will follow you if you mark me brainliest

Which of these is NOT a user interface?

Choose: B. Command line

Your company security policy states that wireless networks are not to be used because of the potential security risk they present to your network. One day, you find that an employee has connected a wireless access point to the network in his office. Which type of security risk is this

Answers

Answer:rogue access point

Explanation:

The head of small organization wants to install a network so that all the employees of different department can share various resources: I. What type of network he/she needs to set up in the organization? II. Name the resource that the employees will be able to share after setting up the network. ​

Answers

Answer:

While the Internet was evolving and creating a way for organizations to connect to each other and the world, another revolution was taking place inside organizations. The proliferation of personal computers inside organizations led to the need to share resources such as printers, scanners, and data. Organizations solved this problem through the creation of local area networks (LANs), which allowed computers to connect to each other and to peripherals. These same networks also allowed personal computers to hook up to legacy mainframe computers.

An LAN is (by definition) a local network, usually operating in the same building or on the same campus. When an organization needed to provide a network over a wider area (with locations in different cities or states, for example), they would build a wide area network (WAN).

CLIENT-SERVER

The personal computer originally was used as a stand-alone computing device. A program was installed on the computer and then used to do word processing or number crunching. However, with the advent of networking and local area networks, computers could work together to solve problems. Higher-end computers were installed as servers, and users on the local network could run applications and share information among departments and organizations. This is called client-server computing.

INTRANET

Just as organizations set up web sites to provide global access to information about their business, they also set up internal web pages to provide information about the organization to the employees. This internal set of web pages is called an intranet. Web pages on the intranet are not accessible to those outside the company; in fact, those pages would come up as “not found” if an employee tried to access them from outside the company’s network.

EXTRANET

Sometimes an organization wants to be able to collaborate with its customers or suppliers while at the same time maintaining the security of being inside its own network. In cases like this a company may want to create an extranet, which is a part of the company’s network that can be made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers’ inventory levels.

Sometimes, an organization will need to allow someone who is not located physically within its internal network to gain access. This access can be provided by a virtual private network (VPN). VPNs will be discussed further in the chapter 6 (on information security).

Helpppppppppppppphuhuh

Answers

Answer:

B

Explanation:

You listed this as Computers and Technology where we post coding questions, or hardware related things, but ok.

If there is 7/8 jugs as the starting amount, and they have a 1/2 jug, dividing 0.875 by 0.5 gives the answer of 1.75 or 1 3/4.

define analogue computer with any four features​

Answers

Answer:

hope it helps you

Explanation:

and pls mark as brainlist ans

Which of these optical devices is fairly fragile, easy to snap or scratch

1. Flash memory
2. Magnetic tape
3. CD
4. Hard disk​

Answers

Answer:

CD

Explanation:

The optical device that is fairly fragile and easy to snap or scratch is called; 3: CD

How to identify optical devices?

An optical instrument is a device that processes light waves either to enhance an image for viewing or to analyze and determine their characteristic properties.

Now, from the given examples, they all come with protective covers except for the CD. Thus, the CD is the most fragile because it can easily be scratched or snapped.

Read more about Optical Devices at; https://brainly.com/question/23391790

#SPJ9

plz help me I need help​

Answers

Answer:

false

because it was used for the local people to have a fast calculation skill. An abacus is a manual aid to calculating that consists of beads or disks that can be moved up and down on a series of sticks or strings within a usually wooden frame. The abacus itself doesn't calculate; it's simply a device for helping a human being to calculate by remembering what has been counted.

The marketing department has hired a new employee. Prior to the new employee's first day at work, you have set up and configured a new laptop computer. The computer and all of the peripherals were purchased from the same vendor. After the new employee begins work, you receive a phone call stating that the wireless mouse is not working.

Which of the following is the MOST likely reason the mouse isn't working?

A. The USB mouse driver is too old for the current mouse.
B. The USB mouse is not a wireless mouse and needs to be plugged into the computer.
C. The USB mouse is malfunctioning.
D. The USB mouse receiver is not plugged into the computer.

Answers

Answer:the usb mouse receiver is not plugged into the computer

Explanation:

In the case above, one can say that the USB mouse receiver is not plugged into the computer.

What is a USB mouse?

A USB mouse is known to be a tool that is often attaches to a computers USB port.

In the case above, one can say that the USB mouse receiver is not plugged into the computer and as such it cannot perform the task it need to do.

Learn more about USB mouse from

https://brainly.com/question/10847782

#SPJ9

write an algorithm to verify a number as even​

Answers

Algorithm to verify a number as even is given in the picture attached.

array Write a recursive function stringReverse that takes a string and a starting subscript as arguments, prints the string backward and returns nothing. The function should stop processing and return when the end of the string is encountered. Note that like an array, the square brackets ( [ ] ) operator can be used to iterate through the characters in a string.

Answers

user_in = str ( input ("Please enter a phrase: " ))

def reverse_str (string):

e = 0

for e in range (len (string)):

x = -1

print string[x]

x += (len (string))

8. Fill in the blanks.
a) A set of instructions that performs a particular task is called a ______
b) Machine invented by William Oughted is _____
d) A memory used by second generation computer _____
e) Cyber Nepal was established in ____​

Answers

Answer:

a)It is called a program

b)Machine invented by Williams Oughted was Slide rule

d)Magnetic cores were used

Name the type of token x belongs to: x=10+20+30 a) Keyword b) Literal c) Identifier d) Operator
Computer class 11

Answers

Answer:

C) Identifier is the answer I am answering question of class 11 but I read in class7. Thank you!!!

write some difference between the third and fourth generation of computer?​

Answers

Answer:

third generation of computer are larger than fourth generation. they are slower than fourth generation. IC chips were used whereas in fourth generation microprocessor were used. fourth generation consumed less electricity than third generation.

I HOPE THIS WILL HELP YOU IF NOT THEN SORRY

HAVE A GREAT DAY :)

Explanation:

Third generation of computer

from 1965-71Integrated circuit basedLarger in size compared to fourth generation and Smaller in size compared to second generation of computer.More electricity neededHigh level languageExamples: IBM 360 & IBM 370

Fourth generation of computer

from 1971-1980VLSI microprocessor basedSmaller in size compared to third generation and Larger in size compared to Fifth generation of computerLess electricity is neededinitiate number of High level language like COBOLExamples : IBM 4341 & PUP 11

what is the right thing to do when you spot fake news​

Answers

Answer:

to tell the truth

Explanation:

l mean there is no reason to keep it secret

write any four characteristics of desktop computer​

Answers

The characteristics of computers that have made them so powerful and universally useful are speed, accuracy, diligence, versatility and storage capacity. Let us discuss them briefly. Computers work at an incredible speed. A powerful computer is capable of performing about 3-4 million simple instructions per second

You are a trainer for your company and often teach courses in a classroom located on-campus or in a hotel conference room. In your office, which is separate from the classroom, you have two external monitors connected to your laptop, and you are able to display different content on each monitor. However, when teaching, you only have your laptop and a projection unit. To make teaching easier, you want the same content to show on both the laptop monitor and the projection screen.
Which of the following multiple display options would be BEST to select when teaching?
A. Show only on 1.
B. Extend these displays.
C. Show only on 2.
D. Duplicate these displays.

Answers

Answer:

Duplicate these displays.

Explanation:

A. Show only on 1 displays only the first screen and disconnects the second one

B. Extend these displays displays two different outputs on the same computer

C. Show only on 2. displays only the second screen and disconnects the first one

D. Duplicate these displays. displays the same output for both screen

Answer:d. Duplicate these displays

Explanation:

You are in charge of installing a remote access solution for your network. You decide you need a total of four
remote access servers to service all remote clients. Because remote clients might connect to any of the four
servers, you decide that each remote access server must enforce the exact same policies. You anticipate that
the policies will change frequently.
What should you do? (Select two. Each choice is a required part of the solution.)
A. Configure network policies on the RADIUS server.
B. Make each remote access server a member of the RemoteServers group.
C. Configure the exact same network policies on each server.
D. Configure one of the remote access servers as a RADIUS server, and all other servers as RADIUS clients.
E. Use Group Policy to configure network policies in the default Domain Controllers GPO.
F. Configure each remote access server as a domain controller.

Answers

Answer: configure one of the remote access servers as a RADIUS server and all other servers as RADIUS clients

configure network access policies on the RADIUS server

Explanation:

You notice a growing number of devices, such as environmental control systems and wearable devices, are connecting to your network. These devices, known as smart devices, are sending and receiving data via wireless network connections.
Which of the following labels applies to this growing ecosystem of smart devices?
A. The smartnet
B. Internet of smart devices
C. *Internet of things*
D. Dynamic environment

Answers

Answer:

*Internet of things*

Explanation:

A network with multiple physical smart devices are known as things on the network

Why are digital computer known as general purpose computer

Answers

More intelligent and better than others

A blog is a Web site of personal or commercial origin that uses a dated log format updated, daily or very frequently, with new information about a particular subject or range of subjects. true or false

Answers

True True True True True

Why are programming languages like Java and Python ideal for rapid development?

Answers

Because Java, as well as Python, are high-level programs that don't need generating or parsing, they are perfect for quick development. This implies that engineers can code a program without testing it first and then publishing it.

What are programming languages?

A method of nomenclature for creating software applications is known as a computer program. The majority of formal programming are text-based, though they can also be graphical.

A substantial rise in the use of Python for machine learning and data analysis supports its status as the programming with the biggest growth. Python is a programming language with dynamic typing, while Java is a structured query and compiler language. Java is faster at play and simpler to debug thanks to this one difference, while Python is simpler to utilize and read.

Learn more about programming languages, Here:

https://brainly.com/question/12696037

#SPJ5

solve plz
Jenae helps maintain her school web site and needs to create a web site poll for students. Which tool will she use?

JavaScript
HTML
CSS
Text editor

Answers

Answer:

HTML

Explanation:

HTML is used is making web pages.

Answer:

what

Explanation:

why are GUI operating system more popular than CUI operating system these days?​

Answers

Answer

GUI operating system are more popular than CUI operating system because the GUI operating system is easy to use and understand because commands are graphically presented.They support extra devices and multimedia system.They support network and internet fully.They are multiuser,multitasking operating system.eg windows.

Explanation:

Hope it helps you

What is instance variable??​

Answers

Explanation:

a distance variable includes a value and a dependency. includes a value and a dependency

Other Questions
Geometry! ZK, ZL, ZM are perpendicular bisectors of AGHJ. Select two options that are true.please I need help I dont get it!!!! I NEEDVHELP FINDING COORDINATES AGAIN 3 Which of the following terms is the process by which interest groups file lawsuitsto try to change some kind of policy? what process takes place at the boundary between the capillaries and the alveoli? Simplify: n- 10 + 3 + 4n A, an or the I like french. Select the correct answer.The product of two numbers is 21. If the first number is -3, which equation represents this situation and what is the second number?The equation that represents this situation is x-3 = 21. The second number is 24..The equation that represents this situation is 3x = 21. The second number is 7..The equation that represents this situation is -3x = 21. The second number is -7.OD.The equation that represents this situation is -3 + x = 21. The second number is 18. How do i say " I arrive at the airport in Lima, Per. I want to get to know the people here. I am going to travel to the beaches by car. There are gosh at the beach and i touch them. Per is very pretty, and i'm happy to spend time here." in spanish, please help An influential, though unproven, taxonomy dividing killers into the organized and disorganized categories, makes a questionable leap from features of the _____ to the _____ of the perpetrator. Group of answer choices suspect; name crime scene; name suspect; personality traits crime scene; personality traits Put the verbs in brackets into the correct tense1 He talked about Denmark as though he had been. .. (be) there but we know he never has.2 She looks as if she .(be) really ill.3 It looks as though it ..(rain).4 She behaves as if she (be) in trouble.5 The weather here is so bad, it looks as though we .(have to) holiday abroad.6 It smells as if you .(put) lots of herbs in the stew.7 Maeve looked as though she .(have) little sleep thenight before, but she had gone to bed quite early.8 When he speaks, it sounds as if English (not be) his first language.9 She spoke about university as though she ..(spend) years there but in fact shed only spent a month there.10 I spoke to Simon last night and he sounded as though he. (be) really upset about something.11 She sounded as if she .(be) French.12 This sauce tastes as if you (put) too much pepper in it.13 My sister isnt rich but she spends money as though she .. (have) loads of it.14 She acts as though she ..(be) very confident, but in fact shes quite shy.15 She treats me as though I (be) her child.16 He talks about karate as if he (have) a black belt but we know hes only just started lessons.17 Little Tommy was trembling as though he .. (see) a ghost.18 She behaved as if nothing . (happen).19 When Moira broke off their relationship, John behaved as if the world (end).20 That woman looks as though she (faint). Bring her some water . Help very confusing to me???! Why was a weak national government created under the Articles of Confederation? Which one of the following is NOT included in the Marketing Mix?Select one:a. Promotionb. Productc. Distributiond. Pricee. Personalization solve for n if nC2=nC4 What is utilization of energy A woman bought some large frames for $17 each and some small frames for $6 each at a closeout sale. If she bought 18 frames for $141, find how many of each type she bought. She bought ____ large frames. Which details or events relating to the Russian Revolution does this passage most highlight? Select three options.A. the development of communismB. Stalins rise to power after the Russian RevolutionC.plans to overthrow Tsar Nicholas IID. the great Soviet famine of 193233E. those who preferred life under the tsar ans of thisfast to get 10 pts today." How? 5. Fill in the following table with the characteristics of the given societies. S.N Types of Society Characteristics 1. Hunting and Gathering 2 Pastoral 3 Agrarian 4 Horticulture That difforence do you find between agrarian society and industrial society? emily wants to know how green, blue and red color light affects plant growth compared to natural light. (Hint: what light affects the plant the most) Form hypothesis and design an experiment. Make sure identify the control, independent (manipulated) variable and dependent (responding) variable. Be detailed