Answer:
Sure. Here is an example of a question you can ask with this topic:
How can I try to fix an old drive that spins up but won’t seek?
You can also ask questions about the specific steps involved in this process, such as:
What is the best way to tap lightly with a screwdriver on the cover of the drive?
How can I prepare a backup media if I try this?
It is important to be aware that this is a last-ditch effort and there is no guarantee that it will work. If you are uncomfortable trying this, or if it does not work, you should send the drive out for data recovery.
Explanation:
What is the best CPU you can put inside a Dell Precision T3500?
And what would be the best graphics card you could put with this CPU?
Answer:
Whatever fits
Explanation:
If an intel i9 or a Ryzen 9 fits, use that. 3090's are very big, so try adding a 3060-3080.
Hope this helps!
Which of the following describes the process of making a copy of a website for the purpose of obtaining money or data from unsuspecting users?
A. Backing up files to an external hard drive
B. Cloning
C. Encrypting your email
D. Storing logins and passwords
Cloning is a harmful practice that users must avoid to prevent themselves from falling victim to cybercriminals. The answer is B. Cloning.
The process of making a copy of a website for the purpose of obtaining money or data from unsuspecting users is known as cloning. A clone website is an exact replica of the original website that is created to deceive users into sharing their personal information, financial details, or login credentials. The users are not aware that they are dealing with a fake website and, therefore, share their sensitive information that is later used for criminal activities such as identity theft or fraud. Cloning can be achieved by copying the entire HTML, CSS, and JavaScript code of the original website or by using website cloning software that automatically copies the website content and creates a replica.Cloning a website is illegal and unethical. It can cause severe damage to the reputation of the original website and cause financial loss to the users. Therefore, users must be aware of the authenticity of the website before sharing their personal information, financial details, or login credentials. They must look for the secure connection icon (https) in the address bar, check the website's domain name, read the privacy policy, and avoid clicking on suspicious links.
To know more about cloning visit:
brainly.com/question/30283706
#SPJ11
A speed limit sign that says "NIGHT" indicates the _____ legal speed between sunset and sunrise.
Answer:
Maximum
Explanation:
Speed limits indicate the maximum speed you are legally allowed to drive.
which of the following are benefits of designing a scalable system? choose 3 options.
-guaranteed systems access for all users
- users may never know that a site has experienced tremendous growth
- ability to respond to user volume issues more quickly
- system will never need to grow again
-ability to maintain a high level of service for customers
Within a spreadsheet, data analysts use which tools to save time and effort by automating commands? Select all that apply.
Functions
Tables
Filters
Formulas
"Functions" and "formulas" are the tools that data analysts use within a spreadsheet to save time and effort by automating commands. Functions allow for the automatic calculation of values based on given data inputs, while formulas can be used to perform calculations and manipulate data in various ways. Tables and filters are also helpful tools for organizing and analyzing data, but they do not directly contribute to automating commands.
A data analyst is a person whose job is to gather and interpret data in order to solve a specific problem. The role includes plenty of time spent with data but entails communicating findings too.
Gather data: Analysts often collect data themselves. This could include conducting surveys, tracking visitor characteristics on a company website, or buying datasets from data collection specialists.Clean data: Raw data might contain duplicates, errors, or outliers. Cleaning the data means maintaining the quality of data in a spreadsheet or through a programming language so that your interpretations won’t be wrong or skewed.Model data: This entails creating and designing the structures of a database. You might choose what types of data to store and collect, establish how data categories are related to each other, and work through how the data actually appears.Interpret data: Interpreting data will involve finding patterns or trends in data that could answer the question at hand.Present: Communicating the results of your findings will be a key part of your job. You do this by putting together visualizations like charts and graphs, writing reports, and presenting information to interested parties.To learn more about "Data analyst" visit: https://brainly.com/question/30036010
#SPJ11
What would this be?
A company is monitoring the number of cars in a parking lot each hour. each hour they save the number of cars currently in the lot into an array of integers, numcars. the company would like to query numcars such that given a starting hour hj denoting the index in numcars, they know how many times the parking lot reached peak capacity by the end of the data collection. the peak capacity is defined as the maximum number of cars that parked in the lot from hj to the end of data collection, inclusively
For this question i used JAVA.
import java.time.Duration;
import java.util.Arrays;;
class chegg1{
public static int getRandom (int min, int max){
return (int)(Math.random()*((max-min)+1))+min;
}
public static void display(int[] array){
for(int j=0; j< array.length; j++){
System.out.print(" " + array[j]);}
System.out.println("----TIME SLOT----");
}
public static void main(String[] args){
int[] parkingSlots= new int[]{ -1, -1, -1, -1, -1 };
display(parkingSlots);
for (int i = 1; i <= 5; i++) {
for(int ij=0; ij< parkingSlots.length; ij++){
if(parkingSlots[ij] >= 0){
parkingSlots[ij] -= 1;
}
else if(parkingSlots[ij]< 0){
parkingSlots[ij] = getRandom(2, 8);
}
}
display(parkingSlots);
// System.out.println('\n');
try {
Thread.sleep(2000);
} catch (InterruptedException e) {
e.printStackTrace();
}
}
}
}
output:
-1 -1 -1 -1 -1----TIME SLOT----
8 6 4 6 2----TIME SLOT----
7 5 3 5 1----TIME SLOT----
6 4 2 4 0----TIME SLOT----
5 3 1 3 -1----TIME SLOT----
4 2 0 2 4----TIME SLOT----
You can learn more through link below:
https://brainly.com/question/26803644#SPJ4
Any application that wants to be displayed on the web must use the HTTP protocol
True
False
Answer:
true
Explanation:
Someone who hacks into a computer system to find and fix security vulnerabilities is known as a(n) ________.
A local university keeps records of their students to track their progress at the institution. The name, student number, sponsorship number, physical address and phone, postal address, date of birth, gender, study mode (full time, part time, distance), faculty (Computing and Informatics, Engineering and Built Environment, Commerce and Human Sciences) and degree programme (Bachelor, Honours, masters, PhD) are recorded. The system used in the finance department requires the students’ physical address to clearly specify the erf number, location, street and city name. The students are uniquely identified by their student number and the sponsorship number. Each faculty is described by a name, faculty code, office phone, office location and phone. The faculty name and code have unique values for each faculty. Each course has a course name, description, course code, number of hours per semester, and level at which it is offered. Courses have unique course codes. A grade report has a student name, programme, letter grade and a grade (1,2,3,4). A faculty offers many courses to many students who are registered for a specific programme
The university keeps track of students, faculties, and courses through a well-organized system that records essential information. This system helps the institution monitor students' progress and manage academic programs efficiently.
The given scenario is about a local university that maintains records of its students, faculties, and courses. The university collects specific data about students, including their personal and academic information. Faculties are defined by their name, code, and other attributes, while courses are distinguished by their unique course codes. Finally, grade reports display the student's academic performance.
1. Student records include their name, student number, sponsorship number, contact information, date of birth, gender, study mode, faculty, and degree program.
2. The finance department requires a physical address that specifies the erf number, location, street, and city name.
3. Students are uniquely identified by their student number and sponsorship number.
4. Faculties have unique names and codes, along with their office phone, office location, and phone.
5. Courses are characterized by their course name, description, course code, number of hours per semester, and the level at which they are offered. They have unique course codes.
6. Grade reports contain the student's name, program, letter grade, and a numerical grade.
7. Faculties offer multiple courses to many students who are registered for a specific program.
To know more about attributes visit:
https://brainly.com/question/30169537
#SPJ11
Can someone help me with these questions it's for drivers ed
Answer:
OK
Explanation:
1= I
2= C
3= H
4= B
5= E
6= G or J
7= D
8= A
9= F
10= G or J
As a principal engineer at Borneo Cloud Services, you have the task of deciding which Flash storage device(s) the company should use in its next generation servers. Consider Borneo's two main workloads A and B, described below. Assume the table shows the numbers for each workload running on one single server that has a single Flash device. Workload #Writes/day #Reads/day Write I/O size Read I/O size (KiB) (KiB) 16 4 A B 1,500,000,000 15,000,000 10,000,000,000 800,000,000,000 64 4 Servers remain in Borneo's datacenters for 3 years before being decommissioned. Consider the following information about SLC, MLC, TLC, and QLC Flash devices. For simplicity, assume a sequential Flash read and write pattern for workloads A and B. Device NAND technology Cost per GB Page size (bytes) Pages per block Device capacity (GB) A 512 Erase/write cycles per block 1,000,000 20,000 10,000 1.000 100 SLC MLC MLC TLC QLC B C $0.75 $0.25 $0.10 $0.03 $0.01 4096 4096 4096 4096 512 1024 512 1024 64 1000 1500 1500 2000 2500 D E Note: We define erase/write cycles for a block as the number of over-writes (write then erase and write again) that a block can handle. It means the first write to a block is not an over-write and 1000 should not be counted as a cycle. Assume 1 KiB = 1024 Bytes. Device capacity uses 1GB MB = 106 KB = 109 Bytes. Assume 365 days per year. Which Flash storage device will you recommend for Workload A and for Workload B, respectively? Hint: first check what device(s) have enough erase/write cycles per block to satisfy each workload's requirements.
For Workload A, using an SLC (Single-Level Cell) Flash device due to its higher erase/write cycles per block, which can handle the workload's write-intensive nature.
For Workload B, using a QLC (Quad-Level Cell) Flash device due to its lower cost per GB and larger device capacity, which can accommodate the workload's high volume of reads and larger data size.
Workload A has a high number of writes per day, and SLC Flash devices have a higher number of erase/write cycles per block (1,000,000) compared to MLC, TLC, and QLC devices. This makes SLC devices more suitable for write-intensive workloads.
Workload B has a high number of reads per day and a large data size. QLC Flash devices have a lower cost per GB, larger device capacity, and sufficient erase/write cycles per block (1,000) to handle the workload's requirements, making them a cost-effective choice for read-intensive workloads with large data sizes.
Learn more about workloads:
https://brainly.com/question/30090258
#SPJ11
Choosing a theme in slides gives your presentation
a cartoon background
a theme song
the same background and text styles for a consistent look
a variety of styles in many slides
The same background and text styles for a consistent look is the theme in slides gives your presentation.
Thus, Techniques and Personal Presentation are the two main divisions of the formal presenting of information.
The planning, presentation, and practice of verbal and non-verbal communication are these two interrelated components.
This article outlines some of the major concepts related to presentations and explains what a presentation is.
Thus, The same background and text styles for a consistent look is the theme in slides gives your presentation.
Learn more about Presentation, refer to the link:
https://brainly.com/question/1493563
#SPJ1
The human brain can store both temporary and permanent bits of information. Which type of memory in the computer is similar to the temporary storage in your brain?
BIOS
PRM
RAM
ROM
Answer:
RAM
Explanation:
"RAM" refers to Random-Access Memory. Just like the human brain, this stores your computer files temporarily. It is considered to be a "volatile memory" which means that information can only be stored when there's power. So, when your computer shuts down, the information is lost. This is similar to the human brain, especially when it comes to learning. When a person learns new things, some of the information he read before may be forgotten.
How do you format an Apush Leq?
Unless the Apush Leq question directs the student to write two body paragraphs, students should expect three body paragraphs.
SUPPLEMENTARY PARAGRAPHS SHOULD CONTAIN CLEAR AND APPROPRIATE TOPIC SENTENCES THAT FOLLOW THE ORGANIZATIONAL LIST IN THE INTRODUCTORY PARAGRAPH.
Up until the conclusion of your topic sentence's argument, add 1-2 extra pieces of evidence and clarification. Then introduce a fresh topic sentence in a new paragraph. There is no predetermined number of paragraphs for the LEQ, but each body paragraph will adhere to this general structure (minimum or maximum.)
The LEQ and DBQ have a 100-minute time limit for students to finish. Therefore, it is suggested that you spend five minutes creating the LEQ response and thirty minutes writing the final LEQ response. 15% of your overall AP test score is determined by the extended essay.
The LEQ is a thesis-based answer to a prompt that asks students to take a position on an issue and then offer enough factual material in the context of their essay to substantiate their thesis. The Long Essay is the last component of the AP US History exam, for which you must select one of three potential prompts and write an essay on the topic.
Learn more about developing from here;
https://brainly.com/question/30053363
#SPJ4
Creating a single Scanner object in main() and passing the object to other methods is considered good practice because _____
Creating a single Scanner object in main() and passing the object to other methods is considered good practice because to it help to make subsequent reads faster and when a method needs to read user input.
Why do we pass system in Scanner?Scanner class is known to be one that allows the user to take input from console. It helps one to know the java compiler that system input will be given via console(keyboard).
When a method is said to needs to read user input, a good thing to do is to form a single Scanner object in main() and then one has to move that Scanner object to the method.
Learn more about Scanner from
https://brainly.com/question/24937533
In this problem, you will implement the class template PriorityQueue. Any type used to instantiate your class template will implement the comparison operators (==, !=, <, >, <=, >=). Our priority queue will maintain a singly linked list of Node typed objects. In your workspace, you can find the definition of Node in includes/node.hpp. The behaviors and data members of PriorityQueue follow:
PriorityQueue Member Functions
public:
PriorityQueue() Default constructor: head_ is initalized to the nullptr.
PriorityQueue(const PriorityQueue& rhs) = delete; Since we have defined a destructor for this type, we must define this function too (per the rule of three). However, we do not need it in this problem. Therefore, you should = delete this function to ensure that the compiler does not generate a definition of it for you.
PriorityQueue& operator=(const PriorityQueue& rhs) = delete; Since we have defined a destructor for this type, we must define this function too (per the rule of three). However, we do not need it in this problem. Therefore, you should = delete this function to ensure that the compiler does not generate a definition of it for you.
~PriorityQueue() Destructor: frees all dynamcially allocated objects comprising the singly linked list.
void Enqueue(const T& data); Inserts a Node storing data into the singly linked list in ascending order.
T Dequeue(); Returns a copy of the data stored in the node pointed to by head_, frees the memory associated with that node object, and updates head_ to point to the next node in the sequence. If the list is empty, an exception should be thrown.
PriorityQueue Data members
private:
Node* head_ Graded Files
Only the following files are transferred to the autograder.
solution.hpp
solution.cc
The problem requires you to implement a class template called PriorityQueue that maintains a singly linked list of Node objects. The class template can be instantiated with any type that implements the comparison operators (==, !=, <, >, <=, >=).
In this problem, you will implement a class template called PriorityQueue for any type that implements comparison operators (==, !=, <, >, <=, >=). The PriorityQueue will maintain a singly linked list of Node typed objects, and its behaviors and data members are as follows:
Member Functions:
1. PriorityQueue(): Default constructor initializing head_ to nullptr.
2. PriorityQueue(const PriorityQueue& rhs) = delete: This function is defined and deleted as per the rule of three.
3. PriorityQueue& operator=(const PriorityQueue& rhs) = delete: This function is also defined and deleted as per the rule of three.
4. ~PriorityQueue(): Destructor that frees all dynamically allocated objects in the singly linked list.
5. void Enqueue(const T& data): Inserts a Node with the given data into the singly linked list in ascending order.
6. T Dequeue(): Returns a copy of the data in the node pointed to by head_, frees the memory associated with that node, and updates head_ to point to the next node. If the list is empty, an exception should be thrown.
Data members:
1. Node* head_: A pointer to the head of the singly linked list.
Only the solution.hpp and solution.cc files will be graded in the autograder.
Know more about the class template
https://brainly.com/question/31235171
#SPJ11
assume that a network has a subnet mask of 255.255.240.0 . what is the maximum number of hosts that the subnet can handle?
4094 is the maximum number of hosts that the subnet can handle. Like an IP address, subnet masks are written in dot-decimal format.
For instance, the subnet mask for the prefix 198.51. 100.0/24 would be 255.255. 255.0. A subnetwork is a divided portion of a larger network. More specifically, subnets divide an IP network logically into numerous, smaller network pieces. Data is sent from one computer to another via the internet using the Internet Protocol (IP).
255.255.240.0 is the subnet mask (8N+8N+4N = 20N).
Network bit count = 20
Consequently, the number of host bits is 32–20–12
Therefore, the total/maximum number of hosts is equal to 2n -2 212 - 2 = 4094.
It can support up to 4094 hosts in total.
Learn more about subnet here-
https://brainly.com/question/15055849
#SPJ4
You set a sensor to transmit the position of a glacier,
Which of these languages is most likely to have been used to configure the device?
The language of most widespread programming in sensor applications is nesC, which is nothing more than a C extension developed in order to encompass the structural and model concepts running TinyOS.
Wireless Sensor NetworksWireless Sensor Networks (WSN) consist of autonomous sensors (motes) capable of to monitor the environment in which they are inserted through sensors of
LightTemperatureSoundAmong others.These motes are also able to communicate, allowing this monitoring covers large areas.
With this information, we can conclude that the language for creating glacier sensors is nesC.
Learn more about Wireless Sensor Networks in https://brainly.com/question/26235345
Answer:
[ Python ]Also:
Please provide the answers next time so other people can answer for you.
"1.10.5 Album Cover Code HS"
Create an animated album cover for your awesome band.
Find a geometric picture. Put it on the webpage, and then add any animation filter you want to it.
Don’t forget the header to tell the user what your band name is.
I'm having trouble getting my code to work for this; any help?
Here is an illustration of a straightforward animated album cover that you can make with HTML and CSS:
What is HTML?Websites are made using the programming language known as HTML (Hypertext Markup Language). It is a type of markup language that is commonly used to build websites, and it has a number of components including tags and attributes that are used to define the information on the page.
<DOCTYPE html><html>
<head>
<title>My Awesome Band</title>
<style>
#albumCover {
width: 500px;
height: 500px;
background-image: url ('geometric-picture');
animation: spin 5s infinite;
}
keyframes spin {
from { transform: rotate(0deg); }
to { transform: rotate(360deg); }
}
</style>
</head>
<body>
<h1>My Awesome Band</h1>
<div id="albumCover"></div>
</body>
</html>
To learn more about HTML
https://brainly.com/question/4056554
#SPJ1
How is primary storage different from secondary storage? Select the TWO correct statements. The CPU can only read and write data on secondary storage. Users can only read and write data on primary storage. The CPU can only read and write data on primary storage. Users can only read and write data on secondary storage.
Answer:
i don't know but you can get Socratic it scan questions and tell answers
Explanation:
Answer:
The CPU can only read and write data on primary storage.
Users can only read and write data on secondary storage
Explanation:
i got it correct
how to create an e mail account
Answer:
Go into setting; go to accounts; look for create account or add account; it will then come up with a tab asking what you want to create the for ( choose Email) it will ask who you want to create it for (yourself or Bussiness), you choose whichever you want and then fill in your information.
Hope this helps....
Explanation:
listen to exam instructions you recently purchased a copy of windows 11 from a retail store. the system that you want to install windows on does not have an optical drive. what is the best option for installing windows in this scenario?
If your system does not have an optical drive, the best option for installing Windows 11 is to create a bootable USB drive with the Windows 11 installation files.
You can create a bootable USB drive with the Windows 11 installation files and use it to install Windows 11.
Here's how to create a bootable USB drive for installing Windows 11:
Download the Windows 11 ISO file from the Microsoft website. You can use the Media Creation Tool to download the ISO file.Insert a USB drive with at least 8GB of space on your computer.Open the Rufus software and select the USB drive from the drop-down list.Select the Windows 11 ISO file by clicking on the "Select" button.Click on the "Start" button to start the process of creating a bootable USB drive.Wait for the process to complete.Once the bootable USB drive is created, you can use it to install Windows 11 on a system that does not have an optical drive. You can do this by connecting the USB drive to the system, booting from the USB drive, and following the installation wizard.To get a similar answer on Windows 11 :
https://brainly.com/question/26053777
#SPJ11
Ayy so in your opinion what is they best XXL freestyle no wrong answers except for Coi Leray and YK Osiris, my personally favorite is Denzel Curry's.
Define self-esteem: A how I feel about myself B how I visualize myself C how I esteem myself
Answer:
A how I feel about myself
Explanation:
Self-esteem is your overall opinion of yourself — how you feel about your abilities and limitations. When you have healthy self-esteem, you feel good about yourself and see yourself as deserving the respect of others. When you have low self-esteem, you put little value on your opinions and ideas.
This activity will help you meet these educational goals:
Content Knowledge—You will determine the importance of computer skills, organizational structures, labor laws, community programs and managerial qualities in an industry of your choice.
Inquiry—You will conduct online research in which you will collect information, make observations, and communicate your results in written form.
21st Century Skills—You will use critical thinking and problem solving skills, and communicate effectively.
Introduction
In this activity, you will analyze the role of computer skills, organizational structures, labor laws and community programs, and managerial skills and qualities.
__________________________________________________________________________
Directions and Analysis
Task 1: Role of Computer Skills in an Industry
In this activity, you will understand the importance of computer skills in an industry by completing the following tasks:
Select an industry of your choice. With the help of online research, explain how computer skills are necessary for the industry’s management team.
Discuss how these skills are important in terms of planning, marketing, and use of financial resources.
Discuss the ways in which a person should aim to upgrade their skills, and also discuss why this process is of importance.
Type your response here:
Law, Public Safety, Corrections & Security
Task 2: Industry, Profession, and Social Issues
In this activity, you will choose an industry of your choice and conduct an online research. You will read relevant content, take notes, and summarize the information in your own words.
Then, you need to write a paper covering the following:
Identify and describe labor issues that include employment opportunities, workers' rights and privileges, and growth opportunities in the industry.
Identify various community programs and other services that the selected industry offers to the members of the community. Also, discuss how the community affects the industry in terms of the demand for products and services, the target customer base, and the employee base.
Discuss financial responsibility within the industry.
Type your response here:
Task 3: Organizational Structures and Managerial Skills
In this activity, you will understand the role of organizational hierarchy and management skills by completing the following tasks:
Conduct online research and explore common organizational structures in any industry of your choice.
Discuss the different qualities and skills that managers working in such an industry should possess.
Type your response here:
Task 4: Diversity Awareness
Most people encounter someone at school or at work with whom they don’t really associate. Pick someone in your school whom you may have classes with but don’t really know. Write down what you think you know about the person. Then, speak with that person and write a response about what you have learned. Write an additional paragraph at the end, discussing how taking the time to get to know someone can make a difference.
Type your response here:
What are nontraditional groups? Write about nontraditional groups and the potential employment barriers for these groups. Also write about ways to overcome these barriers.
Type your response here:
Task 5: Conflict Resolution Skills
Think of a recent occasion when you became upset with a friend or family member. How did you handle the situation? How did you confront the person involved in the situation? Did you identify the problem together with the person or persons involved in the situation? What was the solution? Did you request help from an unbiased third party to reach a solution if the problem persisted.
Type your response here:
__________________________________________________________________________
Answer:
Explanation:
Content Knowledge—You will determine the importance of computer skills, organizational structures, labor laws, community programs and managerial qualities in an industry of your choice. Inquiry—You will conduct online research in which you will collect information, make observations, and communicate your results in written form. 21st Century Skills—You will use critical thinking and problem solving skills, and communicate effectively
the wireless technology that can be used to transmit data between 2 different network
Answer:
most probably that's wifi.
Let B be the set of all binary integers that can be written using exactly 5 zeros and 8 ones where leading zeros are allowed. If all possible subtractions are performed in which one element of B is subtracted from another, find the number of times the answer 1 is obtained.
The answer 1 is obtained 219 times when subtracting one element of set B from another.When performing all possible subtractions between elements of set B, the answer 1 is obtained a total of 219 times.
To find the number of times the answer 1 is obtained when subtracting one element of set B from another, we need to consider all possible pairs of elements in set B. Set B consists of binary integers with 5 zeros and 8 ones, allowing leading zeros. There are a total of 13 digits in each binary integer.To obtain an answer of 1 when subtracting one binary integer from another, we need to consider the possible combinations of zeros and ones in the two numbers.Since we have 5 zeros and 8 ones, we can subtract up to 5 zeros from the other number. This means that the possible number of ones in the difference can range from 3 to 8.To count the number of times the answer 1 is obtained, we need to sum the number of ways to choose 3, 4, 5, 6, 7, and 8 ones from the available 8 ones in set B.Using the combination formula, we can calculate this as follows:
C(8,3) + C(8,4) + C(8,5) + C(8,6) + C(8,7) + C(8,8) = 56 + 70 + 56 + 28 + 8 + 1 = 219.
To know more about number, visit:
https://brainly.com/question/3589540
#SPJ11
Which of the following jobs usually requires some level of formal higher education other than vocational training?
A.
teaching
B.
drafting
C.
restaurant chef
D.
automotive repair
Answer:
(A.) Teaching.
Explanation:
You need to go to college and get a degree for teaching.
Answer:
Yup its A
Explanation:
<3
choose the word that makes each sentence true. asking the user for four numbers is an example of . finding the average of the four numbers is an example of . telling the user the average is an example of .
Asking the user for four numbers is an example of a data collection.
Finding the average of the four numbers is an example of computation.
Telling the user the average is an example of output.
What is Data Collection ?Data collection is the process of gathering and measuring information on targeted variables in an established system, which then enables the data collector to answer relevant questions and evaluate outcomes. Data collection is a component of research in all fields of study, including physical and social sciences, humanities, and business.
Data collection can also refer to the process of gathering and storing environmental data from remote sensing devices, such as satellites and drones. This data can be used to monitor changes in the environment or predict natural disasters. The data collected is used to inform decisions and strategies for a variety of purposes, such as policy-making, business performance, and research.
To learn more about Data Collection
https://brainly.com/question/30479163
#SPJ1